diff --git a/examples/go.mod b/examples/go.mod index b314f174bc..326a51b192 100644 --- a/examples/go.mod +++ b/examples/go.mod @@ -128,7 +128,7 @@ require ( github.com/pmezard/go-difflib v1.0.0 // indirect github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 // indirect github.com/pulumi/esc v0.10.0 // indirect - github.com/pulumi/pulumi/sdk/v3 v3.133.0 // indirect + github.com/pulumi/pulumi/sdk/v3 v3.135.1 // indirect github.com/rivo/uniseg v0.4.4 // indirect github.com/rogpeppe/go-internal v1.12.0 // indirect github.com/ryanuber/go-glob v1.0.0 // indirect @@ -180,3 +180,7 @@ require ( gopkg.in/yaml.v3 v3.0.1 // indirect lukechampine.com/frand v1.4.2 // indirect ) + +replace github.com/pulumi/pulumi/pkg/v3 => github.com/pulumi/pulumi/pkg/v3 v3.135.2-0.20241008001446-4b84f92c7cb8 + +replace github.com/pulumi/pulumi/sdk/v3 => github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8 diff --git a/examples/go.sum b/examples/go.sum index 3cbb21d731..ea6d85e534 100644 --- a/examples/go.sum +++ b/examples/go.sum @@ -342,10 +342,10 @@ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435 github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE= github.com/pulumi/esc v0.10.0 h1:jzBKzkLVW0mePeanDRfqSQoCJ5yrkux0jIwAkUxpRKE= github.com/pulumi/esc v0.10.0/go.mod h1:2Bfa+FWj/xl8CKqRTWbWgDX0SOD4opdQgvYSURTGK2c= -github.com/pulumi/pulumi/pkg/v3 v3.133.0 h1:j1rd7ToLZIQc5H0427ISOXSbOIIemZ6B0MXtRhQ38Yg= -github.com/pulumi/pulumi/pkg/v3 v3.133.0/go.mod h1:JtMAnrsFIccO138WcMfPdhO0PioDukKihnZC0xTRLwo= -github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ= -github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8= +github.com/pulumi/pulumi/pkg/v3 v3.135.2-0.20241008001446-4b84f92c7cb8 h1:st3jSs0OucRb/Suy9DJY9EhGytx53fBO0eZDf42Vy0o= +github.com/pulumi/pulumi/pkg/v3 v3.135.2-0.20241008001446-4b84f92c7cb8/go.mod h1:WK3L4rXXuIR7ai1jA0ld4E7zfh3Fa/aty98vCDd1a1E= +github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8 h1:Jb8FbLpjvFctCkjBmoKaW4BA3VlmmvhRc3GJsv3n16o= +github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= diff --git a/provider/cmd/pulumi-resource-azure/schema.json b/provider/cmd/pulumi-resource-azure/schema.json index a46df5e14d..94ac159a77 100644 --- a/provider/cmd/pulumi-resource-azure/schema.json +++ b/provider/cmd/pulumi-resource-azure/schema.json @@ -102875,7 +102875,7 @@ } }, "azure:advisor/suppression:Suppression": { - "description": "Specifies a suppression for an Azure Advisor recommendation.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = azure.advisor.getRecommendations({});\nconst exampleSuppression = new azure.advisor.Suppression(\"example\", {\n name: \"HardcodedSuppressionName\",\n recommendationId: test.recommendations[0].recommendationName,\n resourceId: current.then(current =\u003e `/subscriptions/${current.subscriptionId}`),\n ttl: \"01:00:00:00\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.advisor.get_recommendations()\nexample_suppression = azure.advisor.Suppression(\"example\",\n name=\"HardcodedSuppressionName\",\n recommendation_id=test[\"recommendations\"][0][\"recommendationName\"],\n resource_id=f\"/subscriptions/{current.subscription_id}\",\n ttl=\"01:00:00:00\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = Azure.Advisor.GetRecommendations.Invoke();\n\n var exampleSuppression = new Azure.Advisor.Suppression(\"example\", new()\n {\n Name = \"HardcodedSuppressionName\",\n RecommendationId = test.Recommendations[0].RecommendationName,\n ResourceId = $\"/subscriptions/{current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId)}\",\n Ttl = \"01:00:00:00\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/advisor\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = advisor.GetRecommendations(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = advisor.NewSuppression(ctx, \"example\", \u0026advisor.SuppressionArgs{\n\t\t\tName: pulumi.String(\"HardcodedSuppressionName\"),\n\t\t\tRecommendationId: pulumi.Any(test.Recommendations[0].RecommendationName),\n\t\t\tResourceId: pulumi.Sprintf(\"/subscriptions/%v\", current.SubscriptionId),\n\t\t\tTtl: pulumi.String(\"01:00:00:00\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.advisor.AdvisorFunctions;\nimport com.pulumi.azure.advisor.inputs.GetRecommendationsArgs;\nimport com.pulumi.azure.advisor.Suppression;\nimport com.pulumi.azure.advisor.SuppressionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var example = AdvisorFunctions.getRecommendations();\n\n var exampleSuppression = new Suppression(\"exampleSuppression\", SuppressionArgs.builder()\n .name(\"HardcodedSuppressionName\")\n .recommendationId(test.recommendations()[0].recommendationName())\n .resourceId(String.format(\"/subscriptions/%s\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())))\n .ttl(\"01:00:00:00\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleSuppression:\n type: azure:advisor:Suppression\n name: example\n properties:\n name: HardcodedSuppressionName\n recommendationId: ${test.recommendations[0].recommendationName}\n resourceId: /subscriptions/${current.subscriptionId}\n ttl: 01:00:00:00\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:advisor:getRecommendations\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAdvisor suppressions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:advisor/suppression:Suppression example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Advisor/recommendations/00000000-0000-0000-0000-000000000000/suppressions/name\n```\n\n", + "description": "Specifies a suppression for an Azure Advisor recommendation.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = azure.advisor.getRecommendations({});\nconst exampleSuppression = new azure.advisor.Suppression(\"example\", {\n name: \"HardcodedSuppressionName\",\n recommendationId: test.recommendations[0].recommendationName,\n resourceId: current.then(current =\u003e `/subscriptions/${current.subscriptionId}`),\n ttl: \"01:00:00:00\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.advisor.get_recommendations()\nexample_suppression = azure.advisor.Suppression(\"example\",\n name=\"HardcodedSuppressionName\",\n recommendation_id=test[\"recommendations\"][0][\"recommendationName\"],\n resource_id=f\"/subscriptions/{current.subscription_id}\",\n ttl=\"01:00:00:00\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = Azure.Advisor.GetRecommendations.Invoke();\n\n var exampleSuppression = new Azure.Advisor.Suppression(\"example\", new()\n {\n Name = \"HardcodedSuppressionName\",\n RecommendationId = test.Recommendations[0].RecommendationName,\n ResourceId = $\"/subscriptions/{current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId)}\",\n Ttl = \"01:00:00:00\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/advisor\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = advisor.GetRecommendations(ctx, \u0026advisor.GetRecommendationsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = advisor.NewSuppression(ctx, \"example\", \u0026advisor.SuppressionArgs{\n\t\t\tName: pulumi.String(\"HardcodedSuppressionName\"),\n\t\t\tRecommendationId: pulumi.Any(test.Recommendations[0].RecommendationName),\n\t\t\tResourceId: pulumi.Sprintf(\"/subscriptions/%v\", current.SubscriptionId),\n\t\t\tTtl: pulumi.String(\"01:00:00:00\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.advisor.AdvisorFunctions;\nimport com.pulumi.azure.advisor.inputs.GetRecommendationsArgs;\nimport com.pulumi.azure.advisor.Suppression;\nimport com.pulumi.azure.advisor.SuppressionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var example = AdvisorFunctions.getRecommendations();\n\n var exampleSuppression = new Suppression(\"exampleSuppression\", SuppressionArgs.builder()\n .name(\"HardcodedSuppressionName\")\n .recommendationId(test.recommendations()[0].recommendationName())\n .resourceId(String.format(\"/subscriptions/%s\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())))\n .ttl(\"01:00:00:00\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleSuppression:\n type: azure:advisor:Suppression\n name: example\n properties:\n name: HardcodedSuppressionName\n recommendationId: ${test.recommendations[0].recommendationName}\n resourceId: /subscriptions/${current.subscriptionId}\n ttl: 01:00:00:00\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:advisor:getRecommendations\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAdvisor suppressions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:advisor/suppression:Suppression example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Advisor/recommendations/00000000-0000-0000-0000-000000000000/suppressions/name\n```\n\n", "properties": { "name": { "type": "string", @@ -105096,7 +105096,7 @@ } }, "azure:apimanagement/certificate:Certificate": { - "description": "Manages an Certificate within an API Management Service.\n\n## Example Usage\n\n### With Base64 Certificate)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleService = new azure.apimanagement.Service(\"example\", {\n name: \"example-apim\",\n location: example.location,\n resourceGroupName: example.name,\n publisherName: \"My Company\",\n publisherEmail: \"company@exmaple.com\",\n skuName: \"Developer_1\",\n});\nconst exampleCertificate = new azure.apimanagement.Certificate(\"example\", {\n name: \"example-cert\",\n apiManagementName: exampleService.name,\n resourceGroupName: example.name,\n data: std.filebase64({\n input: \"example.pfx\",\n }).then(invoke =\u003e invoke.result),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service = azure.apimanagement.Service(\"example\",\n name=\"example-apim\",\n location=example.location,\n resource_group_name=example.name,\n publisher_name=\"My Company\",\n publisher_email=\"company@exmaple.com\",\n sku_name=\"Developer_1\")\nexample_certificate = azure.apimanagement.Certificate(\"example\",\n name=\"example-cert\",\n api_management_name=example_service.name,\n resource_group_name=example.name,\n data=std.filebase64(input=\"example.pfx\").result)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleService = new Azure.ApiManagement.Service(\"example\", new()\n {\n Name = \"example-apim\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n PublisherName = \"My Company\",\n PublisherEmail = \"company@exmaple.com\",\n SkuName = \"Developer_1\",\n });\n\n var exampleCertificate = new Azure.ApiManagement.Certificate(\"example\", new()\n {\n Name = \"example-cert\",\n ApiManagementName = exampleService.Name,\n ResourceGroupName = example.Name,\n Data = Std.Filebase64.Invoke(new()\n {\n Input = \"example.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/apimanagement\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := apimanagement.NewService(ctx, \"example\", \u0026apimanagement.ServiceArgs{\n\t\t\tName: pulumi.String(\"example-apim\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tPublisherName: pulumi.String(\"My Company\"),\n\t\t\tPublisherEmail: pulumi.String(\"company@exmaple.com\"),\n\t\t\tSkuName: pulumi.String(\"Developer_1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"example.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = apimanagement.NewCertificate(ctx, \"example\", \u0026apimanagement.CertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tApiManagementName: exampleService.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tData: pulumi.String(invokeFilebase64.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.apimanagement.Service;\nimport com.pulumi.azure.apimanagement.ServiceArgs;\nimport com.pulumi.azure.apimanagement.Certificate;\nimport com.pulumi.azure.apimanagement.CertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"example-apim\")\n .location(example.location())\n .resourceGroupName(example.name())\n .publisherName(\"My Company\")\n .publisherEmail(\"company@exmaple.com\")\n .skuName(\"Developer_1\")\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"example-cert\")\n .apiManagementName(exampleService.name())\n .resourceGroupName(example.name())\n .data(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"example.pfx\")\n .build()).result())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleService:\n type: azure:apimanagement:Service\n name: example\n properties:\n name: example-apim\n location: ${example.location}\n resourceGroupName: ${example.name}\n publisherName: My Company\n publisherEmail: company@exmaple.com\n skuName: Developer_1\n exampleCertificate:\n type: azure:apimanagement:Certificate\n name: example\n properties:\n name: example-cert\n apiManagementName: ${exampleService.name}\n resourceGroupName: ${example.name}\n data:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: example.pfx\n Return: result\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Key Vault Certificate)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleService = new azure.apimanagement.Service(\"example\", {\n name: \"example-apim\",\n location: example.location,\n resourceGroupName: example.name,\n publisherName: \"My Company\",\n publisherEmail: \"company@terraform.io\",\n skuName: \"Developer_1\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleService.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleService.identity.apply(identity =\u003e identity?.principalId),\n secretPermissions: [\"Get\"],\n certificatePermissions: [\"Get\"],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"example-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"example_cert.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"terraform\",\n },\n certificatePolicy: {\n issuerParameters: {\n name: \"Self\",\n },\n keyProperties: {\n exportable: true,\n keySize: 2048,\n keyType: \"RSA\",\n reuseKey: false,\n },\n secretProperties: {\n contentType: \"application/x-pkcs12\",\n },\n },\n});\nconst exampleCertificate2 = new azure.apimanagement.Certificate(\"example\", {\n name: \"example-cert\",\n apiManagementName: exampleService.name,\n resourceGroupName: example.name,\n keyVaultSecretId: exampleCertificate.secretId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service = azure.apimanagement.Service(\"example\",\n name=\"example-apim\",\n location=example.location,\n resource_group_name=example.name,\n publisher_name=\"My Company\",\n publisher_email=\"company@terraform.io\",\n sku_name=\"Developer_1\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_service.identity.tenant_id,\n object_id=example_service.identity.principal_id,\n secret_permissions=[\"Get\"],\n certificate_permissions=[\"Get\"])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"example-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"example_cert.pfx\").result,\n \"password\": \"terraform\",\n },\n certificate_policy={\n \"issuer_parameters\": {\n \"name\": \"Self\",\n },\n \"key_properties\": {\n \"exportable\": True,\n \"key_size\": 2048,\n \"key_type\": \"RSA\",\n \"reuse_key\": False,\n },\n \"secret_properties\": {\n \"content_type\": \"application/x-pkcs12\",\n },\n })\nexample_certificate2 = azure.apimanagement.Certificate(\"example\",\n name=\"example-cert\",\n api_management_name=example_service.name,\n resource_group_name=example.name,\n key_vault_secret_id=example_certificate.secret_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleService = new Azure.ApiManagement.Service(\"example\", new()\n {\n Name = \"example-apim\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n PublisherName = \"My Company\",\n PublisherEmail = \"company@terraform.io\",\n SkuName = \"Developer_1\",\n Identity = new Azure.ApiManagement.Inputs.ServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleService.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleService.Identity.Apply(identity =\u003e identity?.PrincipalId),\n SecretPermissions = new[]\n {\n \"Get\",\n },\n CertificatePermissions = new[]\n {\n \"Get\",\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"example-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"example_cert.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"terraform\",\n },\n CertificatePolicy = new Azure.KeyVault.Inputs.CertificateCertificatePolicyArgs\n {\n IssuerParameters = new Azure.KeyVault.Inputs.CertificateCertificatePolicyIssuerParametersArgs\n {\n Name = \"Self\",\n },\n KeyProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyKeyPropertiesArgs\n {\n Exportable = true,\n KeySize = 2048,\n KeyType = \"RSA\",\n ReuseKey = false,\n },\n SecretProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicySecretPropertiesArgs\n {\n ContentType = \"application/x-pkcs12\",\n },\n },\n });\n\n var exampleCertificate2 = new Azure.ApiManagement.Certificate(\"example\", new()\n {\n Name = \"example-cert\",\n ApiManagementName = exampleService.Name,\n ResourceGroupName = example.Name,\n KeyVaultSecretId = exampleCertificate.SecretId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/apimanagement\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := apimanagement.NewService(ctx, \"example\", \u0026apimanagement.ServiceArgs{\n\t\t\tName: pulumi.String(\"example-apim\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tPublisherName: pulumi.String(\"My Company\"),\n\t\t\tPublisherEmail: pulumi.String(\"company@terraform.io\"),\n\t\t\tSkuName: pulumi.String(\"Developer_1\"),\n\t\t\tIdentity: \u0026apimanagement.ServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleService.Identity.ApplyT(func(identity apimanagement.ServiceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleService.Identity.ApplyT(func(identity apimanagement.ServiceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"example_cert.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"terraform\"),\n\t\t\t},\n\t\t\tCertificatePolicy: \u0026keyvault.CertificateCertificatePolicyArgs{\n\t\t\t\tIssuerParameters: \u0026keyvault.CertificateCertificatePolicyIssuerParametersArgs{\n\t\t\t\t\tName: pulumi.String(\"Self\"),\n\t\t\t\t},\n\t\t\t\tKeyProperties: \u0026keyvault.CertificateCertificatePolicyKeyPropertiesArgs{\n\t\t\t\t\tExportable: pulumi.Bool(true),\n\t\t\t\t\tKeySize: pulumi.Int(2048),\n\t\t\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\t\t\tReuseKey: pulumi.Bool(false),\n\t\t\t\t},\n\t\t\t\tSecretProperties: \u0026keyvault.CertificateCertificatePolicySecretPropertiesArgs{\n\t\t\t\t\tContentType: pulumi.String(\"application/x-pkcs12\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = apimanagement.NewCertificate(ctx, \"example\", \u0026apimanagement.CertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tApiManagementName: exampleService.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tKeyVaultSecretId: exampleCertificate.SecretId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.apimanagement.Service;\nimport com.pulumi.azure.apimanagement.ServiceArgs;\nimport com.pulumi.azure.apimanagement.inputs.ServiceIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyIssuerParametersArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyKeyPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicySecretPropertiesArgs;\nimport com.pulumi.azure.apimanagement.Certificate;\nimport com.pulumi.azure.apimanagement.CertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"example-apim\")\n .location(example.location())\n .resourceGroupName(example.name())\n .publisherName(\"My Company\")\n .publisherEmail(\"company@terraform.io\")\n .skuName(\"Developer_1\")\n .identity(ServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleService.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleService.identity().applyValue(identity -\u003e identity.principalId()))\n .secretPermissions(\"Get\")\n .certificatePermissions(\"Get\")\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"example-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"example_cert.pfx\")\n .build()).result())\n .password(\"terraform\")\n .build())\n .certificatePolicy(CertificateCertificatePolicyArgs.builder()\n .issuerParameters(CertificateCertificatePolicyIssuerParametersArgs.builder()\n .name(\"Self\")\n .build())\n .keyProperties(CertificateCertificatePolicyKeyPropertiesArgs.builder()\n .exportable(true)\n .keySize(2048)\n .keyType(\"RSA\")\n .reuseKey(false)\n .build())\n .secretProperties(CertificateCertificatePolicySecretPropertiesArgs.builder()\n .contentType(\"application/x-pkcs12\")\n .build())\n .build())\n .build());\n\n var exampleCertificate2 = new Certificate(\"exampleCertificate2\", CertificateArgs.builder()\n .name(\"example-cert\")\n .apiManagementName(exampleService.name())\n .resourceGroupName(example.name())\n .keyVaultSecretId(exampleCertificate.secretId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleService:\n type: azure:apimanagement:Service\n name: example\n properties:\n name: example-apim\n location: ${example.location}\n resourceGroupName: ${example.name}\n publisherName: My Company\n publisherEmail: company@terraform.io\n skuName: Developer_1\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleService.identity.tenantId}\n objectId: ${exampleService.identity.principalId}\n secretPermissions:\n - Get\n certificatePermissions:\n - Get\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: example-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: example_cert.pfx\n Return: result\n password: terraform\n certificatePolicy:\n issuerParameters:\n name: Self\n keyProperties:\n exportable: true\n keySize: 2048\n keyType: RSA\n reuseKey: false\n secretProperties:\n contentType: application/x-pkcs12\n exampleCertificate2:\n type: azure:apimanagement:Certificate\n name: example\n properties:\n name: example-cert\n apiManagementName: ${exampleService.name}\n resourceGroupName: ${example.name}\n keyVaultSecretId: ${exampleCertificate.secretId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAPI Management Certificates can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:apimanagement/certificate:Certificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.ApiManagement/service/instance1/certificates/certificate1\n```\n\n", + "description": "Manages an Certificate within an API Management Service.\n\n## Example Usage\n\n### With Base64 Certificate)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleService = new azure.apimanagement.Service(\"example\", {\n name: \"example-apim\",\n location: example.location,\n resourceGroupName: example.name,\n publisherName: \"My Company\",\n publisherEmail: \"company@exmaple.com\",\n skuName: \"Developer_1\",\n});\nconst exampleCertificate = new azure.apimanagement.Certificate(\"example\", {\n name: \"example-cert\",\n apiManagementName: exampleService.name,\n resourceGroupName: example.name,\n data: std.filebase64({\n input: \"example.pfx\",\n }).then(invoke =\u003e invoke.result),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service = azure.apimanagement.Service(\"example\",\n name=\"example-apim\",\n location=example.location,\n resource_group_name=example.name,\n publisher_name=\"My Company\",\n publisher_email=\"company@exmaple.com\",\n sku_name=\"Developer_1\")\nexample_certificate = azure.apimanagement.Certificate(\"example\",\n name=\"example-cert\",\n api_management_name=example_service.name,\n resource_group_name=example.name,\n data=std.filebase64(input=\"example.pfx\").result)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleService = new Azure.ApiManagement.Service(\"example\", new()\n {\n Name = \"example-apim\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n PublisherName = \"My Company\",\n PublisherEmail = \"company@exmaple.com\",\n SkuName = \"Developer_1\",\n });\n\n var exampleCertificate = new Azure.ApiManagement.Certificate(\"example\", new()\n {\n Name = \"example-cert\",\n ApiManagementName = exampleService.Name,\n ResourceGroupName = example.Name,\n Data = Std.Filebase64.Invoke(new()\n {\n Input = \"example.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/apimanagement\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := apimanagement.NewService(ctx, \"example\", \u0026apimanagement.ServiceArgs{\n\t\t\tName: pulumi.String(\"example-apim\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tPublisherName: pulumi.String(\"My Company\"),\n\t\t\tPublisherEmail: pulumi.String(\"company@exmaple.com\"),\n\t\t\tSkuName: pulumi.String(\"Developer_1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"example.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = apimanagement.NewCertificate(ctx, \"example\", \u0026apimanagement.CertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tApiManagementName: exampleService.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tData: pulumi.String(invokeFilebase64.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.apimanagement.Service;\nimport com.pulumi.azure.apimanagement.ServiceArgs;\nimport com.pulumi.azure.apimanagement.Certificate;\nimport com.pulumi.azure.apimanagement.CertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"example-apim\")\n .location(example.location())\n .resourceGroupName(example.name())\n .publisherName(\"My Company\")\n .publisherEmail(\"company@exmaple.com\")\n .skuName(\"Developer_1\")\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"example-cert\")\n .apiManagementName(exampleService.name())\n .resourceGroupName(example.name())\n .data(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"example.pfx\")\n .build()).result())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleService:\n type: azure:apimanagement:Service\n name: example\n properties:\n name: example-apim\n location: ${example.location}\n resourceGroupName: ${example.name}\n publisherName: My Company\n publisherEmail: company@exmaple.com\n skuName: Developer_1\n exampleCertificate:\n type: azure:apimanagement:Certificate\n name: example\n properties:\n name: example-cert\n apiManagementName: ${exampleService.name}\n resourceGroupName: ${example.name}\n data:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: example.pfx\n Return: result\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Key Vault Certificate)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleService = new azure.apimanagement.Service(\"example\", {\n name: \"example-apim\",\n location: example.location,\n resourceGroupName: example.name,\n publisherName: \"My Company\",\n publisherEmail: \"company@terraform.io\",\n skuName: \"Developer_1\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleService.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleService.identity.apply(identity =\u003e identity?.principalId),\n secretPermissions: [\"Get\"],\n certificatePermissions: [\"Get\"],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"example-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"example_cert.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"terraform\",\n },\n certificatePolicy: {\n issuerParameters: {\n name: \"Self\",\n },\n keyProperties: {\n exportable: true,\n keySize: 2048,\n keyType: \"RSA\",\n reuseKey: false,\n },\n secretProperties: {\n contentType: \"application/x-pkcs12\",\n },\n },\n});\nconst exampleCertificate2 = new azure.apimanagement.Certificate(\"example\", {\n name: \"example-cert\",\n apiManagementName: exampleService.name,\n resourceGroupName: example.name,\n keyVaultSecretId: exampleCertificate.secretId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service = azure.apimanagement.Service(\"example\",\n name=\"example-apim\",\n location=example.location,\n resource_group_name=example.name,\n publisher_name=\"My Company\",\n publisher_email=\"company@terraform.io\",\n sku_name=\"Developer_1\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_service.identity.tenant_id,\n object_id=example_service.identity.principal_id,\n secret_permissions=[\"Get\"],\n certificate_permissions=[\"Get\"])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"example-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"example_cert.pfx\").result,\n \"password\": \"terraform\",\n },\n certificate_policy={\n \"issuer_parameters\": {\n \"name\": \"Self\",\n },\n \"key_properties\": {\n \"exportable\": True,\n \"key_size\": 2048,\n \"key_type\": \"RSA\",\n \"reuse_key\": False,\n },\n \"secret_properties\": {\n \"content_type\": \"application/x-pkcs12\",\n },\n })\nexample_certificate2 = azure.apimanagement.Certificate(\"example\",\n name=\"example-cert\",\n api_management_name=example_service.name,\n resource_group_name=example.name,\n key_vault_secret_id=example_certificate.secret_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleService = new Azure.ApiManagement.Service(\"example\", new()\n {\n Name = \"example-apim\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n PublisherName = \"My Company\",\n PublisherEmail = \"company@terraform.io\",\n SkuName = \"Developer_1\",\n Identity = new Azure.ApiManagement.Inputs.ServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleService.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleService.Identity.Apply(identity =\u003e identity?.PrincipalId),\n SecretPermissions = new[]\n {\n \"Get\",\n },\n CertificatePermissions = new[]\n {\n \"Get\",\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"example-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"example_cert.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"terraform\",\n },\n CertificatePolicy = new Azure.KeyVault.Inputs.CertificateCertificatePolicyArgs\n {\n IssuerParameters = new Azure.KeyVault.Inputs.CertificateCertificatePolicyIssuerParametersArgs\n {\n Name = \"Self\",\n },\n KeyProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyKeyPropertiesArgs\n {\n Exportable = true,\n KeySize = 2048,\n KeyType = \"RSA\",\n ReuseKey = false,\n },\n SecretProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicySecretPropertiesArgs\n {\n ContentType = \"application/x-pkcs12\",\n },\n },\n });\n\n var exampleCertificate2 = new Azure.ApiManagement.Certificate(\"example\", new()\n {\n Name = \"example-cert\",\n ApiManagementName = exampleService.Name,\n ResourceGroupName = example.Name,\n KeyVaultSecretId = exampleCertificate.SecretId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/apimanagement\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := apimanagement.NewService(ctx, \"example\", \u0026apimanagement.ServiceArgs{\n\t\t\tName: pulumi.String(\"example-apim\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tPublisherName: pulumi.String(\"My Company\"),\n\t\t\tPublisherEmail: pulumi.String(\"company@terraform.io\"),\n\t\t\tSkuName: pulumi.String(\"Developer_1\"),\n\t\t\tIdentity: \u0026apimanagement.ServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleService.Identity.ApplyT(func(identity apimanagement.ServiceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleService.Identity.ApplyT(func(identity apimanagement.ServiceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"example_cert.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"terraform\"),\n\t\t\t},\n\t\t\tCertificatePolicy: \u0026keyvault.CertificateCertificatePolicyArgs{\n\t\t\t\tIssuerParameters: \u0026keyvault.CertificateCertificatePolicyIssuerParametersArgs{\n\t\t\t\t\tName: pulumi.String(\"Self\"),\n\t\t\t\t},\n\t\t\t\tKeyProperties: \u0026keyvault.CertificateCertificatePolicyKeyPropertiesArgs{\n\t\t\t\t\tExportable: pulumi.Bool(true),\n\t\t\t\t\tKeySize: pulumi.Int(2048),\n\t\t\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\t\t\tReuseKey: pulumi.Bool(false),\n\t\t\t\t},\n\t\t\t\tSecretProperties: \u0026keyvault.CertificateCertificatePolicySecretPropertiesArgs{\n\t\t\t\t\tContentType: pulumi.String(\"application/x-pkcs12\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = apimanagement.NewCertificate(ctx, \"example\", \u0026apimanagement.CertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tApiManagementName: exampleService.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tKeyVaultSecretId: exampleCertificate.SecretId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.apimanagement.Service;\nimport com.pulumi.azure.apimanagement.ServiceArgs;\nimport com.pulumi.azure.apimanagement.inputs.ServiceIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyIssuerParametersArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyKeyPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicySecretPropertiesArgs;\nimport com.pulumi.azure.apimanagement.Certificate;\nimport com.pulumi.azure.apimanagement.CertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"example-apim\")\n .location(example.location())\n .resourceGroupName(example.name())\n .publisherName(\"My Company\")\n .publisherEmail(\"company@terraform.io\")\n .skuName(\"Developer_1\")\n .identity(ServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleService.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleService.identity().applyValue(identity -\u003e identity.principalId()))\n .secretPermissions(\"Get\")\n .certificatePermissions(\"Get\")\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"example-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"example_cert.pfx\")\n .build()).result())\n .password(\"terraform\")\n .build())\n .certificatePolicy(CertificateCertificatePolicyArgs.builder()\n .issuerParameters(CertificateCertificatePolicyIssuerParametersArgs.builder()\n .name(\"Self\")\n .build())\n .keyProperties(CertificateCertificatePolicyKeyPropertiesArgs.builder()\n .exportable(true)\n .keySize(2048)\n .keyType(\"RSA\")\n .reuseKey(false)\n .build())\n .secretProperties(CertificateCertificatePolicySecretPropertiesArgs.builder()\n .contentType(\"application/x-pkcs12\")\n .build())\n .build())\n .build());\n\n var exampleCertificate2 = new Certificate(\"exampleCertificate2\", CertificateArgs.builder()\n .name(\"example-cert\")\n .apiManagementName(exampleService.name())\n .resourceGroupName(example.name())\n .keyVaultSecretId(exampleCertificate.secretId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleService:\n type: azure:apimanagement:Service\n name: example\n properties:\n name: example-apim\n location: ${example.location}\n resourceGroupName: ${example.name}\n publisherName: My Company\n publisherEmail: company@terraform.io\n skuName: Developer_1\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleService.identity.tenantId}\n objectId: ${exampleService.identity.principalId}\n secretPermissions:\n - Get\n certificatePermissions:\n - Get\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: example-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: example_cert.pfx\n Return: result\n password: terraform\n certificatePolicy:\n issuerParameters:\n name: Self\n keyProperties:\n exportable: true\n keySize: 2048\n keyType: RSA\n reuseKey: false\n secretProperties:\n contentType: application/x-pkcs12\n exampleCertificate2:\n type: azure:apimanagement:Certificate\n name: example\n properties:\n name: example-cert\n apiManagementName: ${exampleService.name}\n resourceGroupName: ${example.name}\n keyVaultSecretId: ${exampleCertificate.secretId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAPI Management Certificates can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:apimanagement/certificate:Certificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.ApiManagement/service/instance1/certificates/certificate1\n```\n\n", "properties": { "apiManagementName": { "type": "string", @@ -109115,7 +109115,7 @@ } }, "azure:appconfiguration/configurationFeature:ConfigurationFeature": { - "description": "Manages an Azure App Configuration Feature.\n\n\u003e **Note:** App Configuration Features are provisioned using a Data Plane API which requires the role `App Configuration Data Owner` on either the App Configuration or a parent scope (such as the Resource Group/Subscription). [More information can be found in the Azure Documentation for App Configuration](https://docs.microsoft.com/azure/azure-app-configuration/concept-enable-rbac#azure-built-in-roles-for-azure-app-configuration). This is similar to providing App Configuration Keys.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst appconf = new azure.appconfiguration.ConfigurationStore(\"appconf\", {\n name: \"appConf1\",\n resourceGroupName: example.name,\n location: example.location,\n});\nconst current = azure.core.getClientConfig({});\nconst appconfDataowner = new azure.authorization.Assignment(\"appconf_dataowner\", {\n scope: appconf.id,\n roleDefinitionName: \"App Configuration Data Owner\",\n principalId: current.then(current =\u003e current.objectId),\n});\nconst test = new azure.appconfiguration.ConfigurationFeature(\"test\", {\n configurationStoreId: appconf.id,\n description: \"test description\",\n name: \"test-ackey\",\n label: \"test-ackeylabel\",\n enabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nappconf = azure.appconfiguration.ConfigurationStore(\"appconf\",\n name=\"appConf1\",\n resource_group_name=example.name,\n location=example.location)\ncurrent = azure.core.get_client_config()\nappconf_dataowner = azure.authorization.Assignment(\"appconf_dataowner\",\n scope=appconf.id,\n role_definition_name=\"App Configuration Data Owner\",\n principal_id=current.object_id)\ntest = azure.appconfiguration.ConfigurationFeature(\"test\",\n configuration_store_id=appconf.id,\n description=\"test description\",\n name=\"test-ackey\",\n label=\"test-ackeylabel\",\n enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var appconf = new Azure.AppConfiguration.ConfigurationStore(\"appconf\", new()\n {\n Name = \"appConf1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var appconfDataowner = new Azure.Authorization.Assignment(\"appconf_dataowner\", new()\n {\n Scope = appconf.Id,\n RoleDefinitionName = \"App Configuration Data Owner\",\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var test = new Azure.AppConfiguration.ConfigurationFeature(\"test\", new()\n {\n ConfigurationStoreId = appconf.Id,\n Description = \"test description\",\n Name = \"test-ackey\",\n Label = \"test-ackeylabel\",\n Enabled = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconf, err := appconfiguration.NewConfigurationStore(ctx, \"appconf\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"appconf_dataowner\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: appconf.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"App Configuration Data Owner\"),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationFeature(ctx, \"test\", \u0026appconfiguration.ConfigurationFeatureArgs{\n\t\t\tConfigurationStoreId: appconf.ID(),\n\t\t\tDescription: pulumi.String(\"test description\"),\n\t\t\tName: pulumi.String(\"test-ackey\"),\n\t\t\tLabel: pulumi.String(\"test-ackeylabel\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationFeature;\nimport com.pulumi.azure.appconfiguration.ConfigurationFeatureArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var appconf = new ConfigurationStore(\"appconf\", ConfigurationStoreArgs.builder()\n .name(\"appConf1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var appconfDataowner = new Assignment(\"appconfDataowner\", AssignmentArgs.builder()\n .scope(appconf.id())\n .roleDefinitionName(\"App Configuration Data Owner\")\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var test = new ConfigurationFeature(\"test\", ConfigurationFeatureArgs.builder()\n .configurationStoreId(appconf.id())\n .description(\"test description\")\n .name(\"test-ackey\")\n .label(\"test-ackeylabel\")\n .enabled(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n appconf:\n type: azure:appconfiguration:ConfigurationStore\n properties:\n name: appConf1\n resourceGroupName: ${example.name}\n location: ${example.location}\n appconfDataowner:\n type: azure:authorization:Assignment\n name: appconf_dataowner\n properties:\n scope: ${appconf.id}\n roleDefinitionName: App Configuration Data Owner\n principalId: ${current.objectId}\n test:\n type: azure:appconfiguration:ConfigurationFeature\n properties:\n configurationStoreId: ${appconf.id}\n description: test description\n name: test-ackey\n label: test-ackeylabel\n enabled: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApp Configuration Features can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appconfiguration/configurationFeature:ConfigurationFeature test https://appconfname1.azconfig.io/kv/.appconfig.featureflag%2FkeyName?label=labelName\n```\n\nIf you wish to import with an empty label then simply leave the label's name blank:\n\n```sh\n$ pulumi import azure:appconfiguration/configurationFeature:ConfigurationFeature test https://appconfname1.azconfig.io/kv/.appconfig.featureflag%2FkeyName?label=\n```\n\n", + "description": "Manages an Azure App Configuration Feature.\n\n\u003e **Note:** App Configuration Features are provisioned using a Data Plane API which requires the role `App Configuration Data Owner` on either the App Configuration or a parent scope (such as the Resource Group/Subscription). [More information can be found in the Azure Documentation for App Configuration](https://docs.microsoft.com/azure/azure-app-configuration/concept-enable-rbac#azure-built-in-roles-for-azure-app-configuration). This is similar to providing App Configuration Keys.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst appconf = new azure.appconfiguration.ConfigurationStore(\"appconf\", {\n name: \"appConf1\",\n resourceGroupName: example.name,\n location: example.location,\n});\nconst current = azure.core.getClientConfig({});\nconst appconfDataowner = new azure.authorization.Assignment(\"appconf_dataowner\", {\n scope: appconf.id,\n roleDefinitionName: \"App Configuration Data Owner\",\n principalId: current.then(current =\u003e current.objectId),\n});\nconst test = new azure.appconfiguration.ConfigurationFeature(\"test\", {\n configurationStoreId: appconf.id,\n description: \"test description\",\n name: \"test-ackey\",\n label: \"test-ackeylabel\",\n enabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nappconf = azure.appconfiguration.ConfigurationStore(\"appconf\",\n name=\"appConf1\",\n resource_group_name=example.name,\n location=example.location)\ncurrent = azure.core.get_client_config()\nappconf_dataowner = azure.authorization.Assignment(\"appconf_dataowner\",\n scope=appconf.id,\n role_definition_name=\"App Configuration Data Owner\",\n principal_id=current.object_id)\ntest = azure.appconfiguration.ConfigurationFeature(\"test\",\n configuration_store_id=appconf.id,\n description=\"test description\",\n name=\"test-ackey\",\n label=\"test-ackeylabel\",\n enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var appconf = new Azure.AppConfiguration.ConfigurationStore(\"appconf\", new()\n {\n Name = \"appConf1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var appconfDataowner = new Azure.Authorization.Assignment(\"appconf_dataowner\", new()\n {\n Scope = appconf.Id,\n RoleDefinitionName = \"App Configuration Data Owner\",\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var test = new Azure.AppConfiguration.ConfigurationFeature(\"test\", new()\n {\n ConfigurationStoreId = appconf.Id,\n Description = \"test description\",\n Name = \"test-ackey\",\n Label = \"test-ackeylabel\",\n Enabled = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconf, err := appconfiguration.NewConfigurationStore(ctx, \"appconf\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"appconf_dataowner\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: appconf.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"App Configuration Data Owner\"),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationFeature(ctx, \"test\", \u0026appconfiguration.ConfigurationFeatureArgs{\n\t\t\tConfigurationStoreId: appconf.ID(),\n\t\t\tDescription: pulumi.String(\"test description\"),\n\t\t\tName: pulumi.String(\"test-ackey\"),\n\t\t\tLabel: pulumi.String(\"test-ackeylabel\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationFeature;\nimport com.pulumi.azure.appconfiguration.ConfigurationFeatureArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var appconf = new ConfigurationStore(\"appconf\", ConfigurationStoreArgs.builder()\n .name(\"appConf1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var appconfDataowner = new Assignment(\"appconfDataowner\", AssignmentArgs.builder()\n .scope(appconf.id())\n .roleDefinitionName(\"App Configuration Data Owner\")\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var test = new ConfigurationFeature(\"test\", ConfigurationFeatureArgs.builder()\n .configurationStoreId(appconf.id())\n .description(\"test description\")\n .name(\"test-ackey\")\n .label(\"test-ackeylabel\")\n .enabled(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n appconf:\n type: azure:appconfiguration:ConfigurationStore\n properties:\n name: appConf1\n resourceGroupName: ${example.name}\n location: ${example.location}\n appconfDataowner:\n type: azure:authorization:Assignment\n name: appconf_dataowner\n properties:\n scope: ${appconf.id}\n roleDefinitionName: App Configuration Data Owner\n principalId: ${current.objectId}\n test:\n type: azure:appconfiguration:ConfigurationFeature\n properties:\n configurationStoreId: ${appconf.id}\n description: test description\n name: test-ackey\n label: test-ackeylabel\n enabled: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApp Configuration Features can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appconfiguration/configurationFeature:ConfigurationFeature test https://appconfname1.azconfig.io/kv/.appconfig.featureflag%2FkeyName?label=labelName\n```\n\nIf you wish to import with an empty label then simply leave the label's name blank:\n\n```sh\n$ pulumi import azure:appconfiguration/configurationFeature:ConfigurationFeature test https://appconfname1.azconfig.io/kv/.appconfig.featureflag%2FkeyName?label=\n```\n\n", "properties": { "configurationStoreId": { "type": "string", @@ -109313,7 +109313,7 @@ } }, "azure:appconfiguration/configurationKey:ConfigurationKey": { - "description": "Manages an Azure App Configuration Key.\n\n\u003e **Note:** App Configuration Keys are provisioned using a Data Plane API which requires the role `App Configuration Data Owner` on either the App Configuration or a parent scope (such as the Resource Group/Subscription). [More information can be found in the Azure Documentation for App Configuration](https://docs.microsoft.com/azure/azure-app-configuration/concept-enable-rbac#azure-built-in-roles-for-azure-app-configuration).\n\n## Example Usage\n\n### `Kv` Type\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst appconf = new azure.appconfiguration.ConfigurationStore(\"appconf\", {\n name: \"appConf1\",\n resourceGroupName: example.name,\n location: example.location,\n});\nconst current = azure.core.getClientConfig({});\nconst appconfDataowner = new azure.authorization.Assignment(\"appconf_dataowner\", {\n scope: appconf.id,\n roleDefinitionName: \"App Configuration Data Owner\",\n principalId: current.then(current =\u003e current.objectId),\n});\nconst test = new azure.appconfiguration.ConfigurationKey(\"test\", {\n configurationStoreId: appconf.id,\n key: \"appConfKey1\",\n label: \"somelabel\",\n value: \"a test\",\n}, {\n dependsOn: [appconfDataowner],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nappconf = azure.appconfiguration.ConfigurationStore(\"appconf\",\n name=\"appConf1\",\n resource_group_name=example.name,\n location=example.location)\ncurrent = azure.core.get_client_config()\nappconf_dataowner = azure.authorization.Assignment(\"appconf_dataowner\",\n scope=appconf.id,\n role_definition_name=\"App Configuration Data Owner\",\n principal_id=current.object_id)\ntest = azure.appconfiguration.ConfigurationKey(\"test\",\n configuration_store_id=appconf.id,\n key=\"appConfKey1\",\n label=\"somelabel\",\n value=\"a test\",\n opts = pulumi.ResourceOptions(depends_on=[appconf_dataowner]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var appconf = new Azure.AppConfiguration.ConfigurationStore(\"appconf\", new()\n {\n Name = \"appConf1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var appconfDataowner = new Azure.Authorization.Assignment(\"appconf_dataowner\", new()\n {\n Scope = appconf.Id,\n RoleDefinitionName = \"App Configuration Data Owner\",\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var test = new Azure.AppConfiguration.ConfigurationKey(\"test\", new()\n {\n ConfigurationStoreId = appconf.Id,\n Key = \"appConfKey1\",\n Label = \"somelabel\",\n Value = \"a test\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n appconfDataowner,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconf, err := appconfiguration.NewConfigurationStore(ctx, \"appconf\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconfDataowner, err := authorization.NewAssignment(ctx, \"appconf_dataowner\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: appconf.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"App Configuration Data Owner\"),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationKey(ctx, \"test\", \u0026appconfiguration.ConfigurationKeyArgs{\n\t\t\tConfigurationStoreId: appconf.ID(),\n\t\t\tKey: pulumi.String(\"appConfKey1\"),\n\t\t\tLabel: pulumi.String(\"somelabel\"),\n\t\t\tValue: pulumi.String(\"a test\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tappconfDataowner,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationKey;\nimport com.pulumi.azure.appconfiguration.ConfigurationKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var appconf = new ConfigurationStore(\"appconf\", ConfigurationStoreArgs.builder()\n .name(\"appConf1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var appconfDataowner = new Assignment(\"appconfDataowner\", AssignmentArgs.builder()\n .scope(appconf.id())\n .roleDefinitionName(\"App Configuration Data Owner\")\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var test = new ConfigurationKey(\"test\", ConfigurationKeyArgs.builder()\n .configurationStoreId(appconf.id())\n .key(\"appConfKey1\")\n .label(\"somelabel\")\n .value(\"a test\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(appconfDataowner)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n appconf:\n type: azure:appconfiguration:ConfigurationStore\n properties:\n name: appConf1\n resourceGroupName: ${example.name}\n location: ${example.location}\n appconfDataowner:\n type: azure:authorization:Assignment\n name: appconf_dataowner\n properties:\n scope: ${appconf.id}\n roleDefinitionName: App Configuration Data Owner\n principalId: ${current.objectId}\n test:\n type: azure:appconfiguration:ConfigurationKey\n properties:\n configurationStoreId: ${appconf.id}\n key: appConfKey1\n label: somelabel\n value: a test\n options:\n dependson:\n - ${appconfDataowner}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### `Vault` Type\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst appconf = new azure.appconfiguration.ConfigurationStore(\"appconf\", {\n name: \"appConf1\",\n resourceGroupName: example.name,\n location: example.location,\n});\nconst current = azure.core.getClientConfig({});\nconst kv = new azure.keyvault.KeyVault(\"kv\", {\n name: \"kv\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }],\n});\nconst kvs = new azure.keyvault.Secret(\"kvs\", {\n name: \"kvs\",\n value: \"szechuan\",\n keyVaultId: kv.id,\n});\nconst appconfDataowner = new azure.authorization.Assignment(\"appconf_dataowner\", {\n scope: appconf.id,\n roleDefinitionName: \"App Configuration Data Owner\",\n principalId: current.then(current =\u003e current.objectId),\n});\nconst test = new azure.appconfiguration.ConfigurationKey(\"test\", {\n configurationStoreId: testAzurermAppConfiguration.id,\n key: \"key1\",\n type: \"vault\",\n label: \"label1\",\n vaultKeyReference: kvs.versionlessId,\n}, {\n dependsOn: [appconfDataowner],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nappconf = azure.appconfiguration.ConfigurationStore(\"appconf\",\n name=\"appConf1\",\n resource_group_name=example.name,\n location=example.location)\ncurrent = azure.core.get_client_config()\nkv = azure.keyvault.KeyVault(\"kv\",\n name=\"kv\",\n location=test_azurerm_resource_group[\"location\"],\n resource_group_name=test_azurerm_resource_group[\"name\"],\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }])\nkvs = azure.keyvault.Secret(\"kvs\",\n name=\"kvs\",\n value=\"szechuan\",\n key_vault_id=kv.id)\nappconf_dataowner = azure.authorization.Assignment(\"appconf_dataowner\",\n scope=appconf.id,\n role_definition_name=\"App Configuration Data Owner\",\n principal_id=current.object_id)\ntest = azure.appconfiguration.ConfigurationKey(\"test\",\n configuration_store_id=test_azurerm_app_configuration[\"id\"],\n key=\"key1\",\n type=\"vault\",\n label=\"label1\",\n vault_key_reference=kvs.versionless_id,\n opts = pulumi.ResourceOptions(depends_on=[appconf_dataowner]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var appconf = new Azure.AppConfiguration.ConfigurationStore(\"appconf\", new()\n {\n Name = \"appConf1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var kv = new Azure.KeyVault.KeyVault(\"kv\", new()\n {\n Name = \"kv\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n },\n });\n\n var kvs = new Azure.KeyVault.Secret(\"kvs\", new()\n {\n Name = \"kvs\",\n Value = \"szechuan\",\n KeyVaultId = kv.Id,\n });\n\n var appconfDataowner = new Azure.Authorization.Assignment(\"appconf_dataowner\", new()\n {\n Scope = appconf.Id,\n RoleDefinitionName = \"App Configuration Data Owner\",\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var test = new Azure.AppConfiguration.ConfigurationKey(\"test\", new()\n {\n ConfigurationStoreId = testAzurermAppConfiguration.Id,\n Key = \"key1\",\n Type = \"vault\",\n Label = \"label1\",\n VaultKeyReference = kvs.VersionlessId,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n appconfDataowner,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconf, err := appconfiguration.NewConfigurationStore(ctx, \"appconf\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tkv, err := keyvault.NewKeyVault(ctx, \"kv\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"kv\"),\n\t\t\tLocation: pulumi.Any(testAzurermResourceGroup.Location),\n\t\t\tResourceGroupName: pulumi.Any(testAzurermResourceGroup.Name),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tkvs, err := keyvault.NewSecret(ctx, \"kvs\", \u0026keyvault.SecretArgs{\n\t\t\tName: pulumi.String(\"kvs\"),\n\t\t\tValue: pulumi.String(\"szechuan\"),\n\t\t\tKeyVaultId: kv.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconfDataowner, err := authorization.NewAssignment(ctx, \"appconf_dataowner\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: appconf.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"App Configuration Data Owner\"),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationKey(ctx, \"test\", \u0026appconfiguration.ConfigurationKeyArgs{\n\t\t\tConfigurationStoreId: pulumi.Any(testAzurermAppConfiguration.Id),\n\t\t\tKey: pulumi.String(\"key1\"),\n\t\t\tType: pulumi.String(\"vault\"),\n\t\t\tLabel: pulumi.String(\"label1\"),\n\t\t\tVaultKeyReference: kvs.VersionlessId,\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tappconfDataowner,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Secret;\nimport com.pulumi.azure.keyvault.SecretArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationKey;\nimport com.pulumi.azure.appconfiguration.ConfigurationKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var appconf = new ConfigurationStore(\"appconf\", ConfigurationStoreArgs.builder()\n .name(\"appConf1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var kv = new KeyVault(\"kv\", KeyVaultArgs.builder()\n .name(\"kv\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build())\n .build());\n\n var kvs = new Secret(\"kvs\", SecretArgs.builder()\n .name(\"kvs\")\n .value(\"szechuan\")\n .keyVaultId(kv.id())\n .build());\n\n var appconfDataowner = new Assignment(\"appconfDataowner\", AssignmentArgs.builder()\n .scope(appconf.id())\n .roleDefinitionName(\"App Configuration Data Owner\")\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var test = new ConfigurationKey(\"test\", ConfigurationKeyArgs.builder()\n .configurationStoreId(testAzurermAppConfiguration.id())\n .key(\"key1\")\n .type(\"vault\")\n .label(\"label1\")\n .vaultKeyReference(kvs.versionlessId())\n .build(), CustomResourceOptions.builder()\n .dependsOn(appconfDataowner)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n appconf:\n type: azure:appconfiguration:ConfigurationStore\n properties:\n name: appConf1\n resourceGroupName: ${example.name}\n location: ${example.location}\n kv:\n type: azure:keyvault:KeyVault\n properties:\n name: kv\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n kvs:\n type: azure:keyvault:Secret\n properties:\n name: kvs\n value: szechuan\n keyVaultId: ${kv.id}\n appconfDataowner:\n type: azure:authorization:Assignment\n name: appconf_dataowner\n properties:\n scope: ${appconf.id}\n roleDefinitionName: App Configuration Data Owner\n principalId: ${current.objectId}\n test:\n type: azure:appconfiguration:ConfigurationKey\n properties:\n configurationStoreId: ${testAzurermAppConfiguration.id}\n key: key1\n type: vault\n label: label1\n vaultKeyReference: ${kvs.versionlessId}\n options:\n dependson:\n - ${appconfDataowner}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApp Configuration Keys can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appconfiguration/configurationKey:ConfigurationKey test https://appconfname1.azconfig.io/kv/keyName?label=labelName\n```\n\nIf you wish to import a key with an empty label then simply leave label's name blank:\n\n```sh\n$ pulumi import azure:appconfiguration/configurationKey:ConfigurationKey test https://appconfname1.azconfig.io/kv/keyName?label=\n```\n\n", + "description": "Manages an Azure App Configuration Key.\n\n\u003e **Note:** App Configuration Keys are provisioned using a Data Plane API which requires the role `App Configuration Data Owner` on either the App Configuration or a parent scope (such as the Resource Group/Subscription). [More information can be found in the Azure Documentation for App Configuration](https://docs.microsoft.com/azure/azure-app-configuration/concept-enable-rbac#azure-built-in-roles-for-azure-app-configuration).\n\n## Example Usage\n\n### `Kv` Type\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst appconf = new azure.appconfiguration.ConfigurationStore(\"appconf\", {\n name: \"appConf1\",\n resourceGroupName: example.name,\n location: example.location,\n});\nconst current = azure.core.getClientConfig({});\nconst appconfDataowner = new azure.authorization.Assignment(\"appconf_dataowner\", {\n scope: appconf.id,\n roleDefinitionName: \"App Configuration Data Owner\",\n principalId: current.then(current =\u003e current.objectId),\n});\nconst test = new azure.appconfiguration.ConfigurationKey(\"test\", {\n configurationStoreId: appconf.id,\n key: \"appConfKey1\",\n label: \"somelabel\",\n value: \"a test\",\n}, {\n dependsOn: [appconfDataowner],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nappconf = azure.appconfiguration.ConfigurationStore(\"appconf\",\n name=\"appConf1\",\n resource_group_name=example.name,\n location=example.location)\ncurrent = azure.core.get_client_config()\nappconf_dataowner = azure.authorization.Assignment(\"appconf_dataowner\",\n scope=appconf.id,\n role_definition_name=\"App Configuration Data Owner\",\n principal_id=current.object_id)\ntest = azure.appconfiguration.ConfigurationKey(\"test\",\n configuration_store_id=appconf.id,\n key=\"appConfKey1\",\n label=\"somelabel\",\n value=\"a test\",\n opts = pulumi.ResourceOptions(depends_on=[appconf_dataowner]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var appconf = new Azure.AppConfiguration.ConfigurationStore(\"appconf\", new()\n {\n Name = \"appConf1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var appconfDataowner = new Azure.Authorization.Assignment(\"appconf_dataowner\", new()\n {\n Scope = appconf.Id,\n RoleDefinitionName = \"App Configuration Data Owner\",\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var test = new Azure.AppConfiguration.ConfigurationKey(\"test\", new()\n {\n ConfigurationStoreId = appconf.Id,\n Key = \"appConfKey1\",\n Label = \"somelabel\",\n Value = \"a test\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n appconfDataowner,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconf, err := appconfiguration.NewConfigurationStore(ctx, \"appconf\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconfDataowner, err := authorization.NewAssignment(ctx, \"appconf_dataowner\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: appconf.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"App Configuration Data Owner\"),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationKey(ctx, \"test\", \u0026appconfiguration.ConfigurationKeyArgs{\n\t\t\tConfigurationStoreId: appconf.ID(),\n\t\t\tKey: pulumi.String(\"appConfKey1\"),\n\t\t\tLabel: pulumi.String(\"somelabel\"),\n\t\t\tValue: pulumi.String(\"a test\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tappconfDataowner,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationKey;\nimport com.pulumi.azure.appconfiguration.ConfigurationKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var appconf = new ConfigurationStore(\"appconf\", ConfigurationStoreArgs.builder()\n .name(\"appConf1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var appconfDataowner = new Assignment(\"appconfDataowner\", AssignmentArgs.builder()\n .scope(appconf.id())\n .roleDefinitionName(\"App Configuration Data Owner\")\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var test = new ConfigurationKey(\"test\", ConfigurationKeyArgs.builder()\n .configurationStoreId(appconf.id())\n .key(\"appConfKey1\")\n .label(\"somelabel\")\n .value(\"a test\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(appconfDataowner)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n appconf:\n type: azure:appconfiguration:ConfigurationStore\n properties:\n name: appConf1\n resourceGroupName: ${example.name}\n location: ${example.location}\n appconfDataowner:\n type: azure:authorization:Assignment\n name: appconf_dataowner\n properties:\n scope: ${appconf.id}\n roleDefinitionName: App Configuration Data Owner\n principalId: ${current.objectId}\n test:\n type: azure:appconfiguration:ConfigurationKey\n properties:\n configurationStoreId: ${appconf.id}\n key: appConfKey1\n label: somelabel\n value: a test\n options:\n dependson:\n - ${appconfDataowner}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### `Vault` Type\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst appconf = new azure.appconfiguration.ConfigurationStore(\"appconf\", {\n name: \"appConf1\",\n resourceGroupName: example.name,\n location: example.location,\n});\nconst current = azure.core.getClientConfig({});\nconst kv = new azure.keyvault.KeyVault(\"kv\", {\n name: \"kv\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }],\n});\nconst kvs = new azure.keyvault.Secret(\"kvs\", {\n name: \"kvs\",\n value: \"szechuan\",\n keyVaultId: kv.id,\n});\nconst appconfDataowner = new azure.authorization.Assignment(\"appconf_dataowner\", {\n scope: appconf.id,\n roleDefinitionName: \"App Configuration Data Owner\",\n principalId: current.then(current =\u003e current.objectId),\n});\nconst test = new azure.appconfiguration.ConfigurationKey(\"test\", {\n configurationStoreId: testAzurermAppConfiguration.id,\n key: \"key1\",\n type: \"vault\",\n label: \"label1\",\n vaultKeyReference: kvs.versionlessId,\n}, {\n dependsOn: [appconfDataowner],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nappconf = azure.appconfiguration.ConfigurationStore(\"appconf\",\n name=\"appConf1\",\n resource_group_name=example.name,\n location=example.location)\ncurrent = azure.core.get_client_config()\nkv = azure.keyvault.KeyVault(\"kv\",\n name=\"kv\",\n location=test_azurerm_resource_group[\"location\"],\n resource_group_name=test_azurerm_resource_group[\"name\"],\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }])\nkvs = azure.keyvault.Secret(\"kvs\",\n name=\"kvs\",\n value=\"szechuan\",\n key_vault_id=kv.id)\nappconf_dataowner = azure.authorization.Assignment(\"appconf_dataowner\",\n scope=appconf.id,\n role_definition_name=\"App Configuration Data Owner\",\n principal_id=current.object_id)\ntest = azure.appconfiguration.ConfigurationKey(\"test\",\n configuration_store_id=test_azurerm_app_configuration[\"id\"],\n key=\"key1\",\n type=\"vault\",\n label=\"label1\",\n vault_key_reference=kvs.versionless_id,\n opts = pulumi.ResourceOptions(depends_on=[appconf_dataowner]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var appconf = new Azure.AppConfiguration.ConfigurationStore(\"appconf\", new()\n {\n Name = \"appConf1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var kv = new Azure.KeyVault.KeyVault(\"kv\", new()\n {\n Name = \"kv\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n },\n });\n\n var kvs = new Azure.KeyVault.Secret(\"kvs\", new()\n {\n Name = \"kvs\",\n Value = \"szechuan\",\n KeyVaultId = kv.Id,\n });\n\n var appconfDataowner = new Azure.Authorization.Assignment(\"appconf_dataowner\", new()\n {\n Scope = appconf.Id,\n RoleDefinitionName = \"App Configuration Data Owner\",\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var test = new Azure.AppConfiguration.ConfigurationKey(\"test\", new()\n {\n ConfigurationStoreId = testAzurermAppConfiguration.Id,\n Key = \"key1\",\n Type = \"vault\",\n Label = \"label1\",\n VaultKeyReference = kvs.VersionlessId,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n appconfDataowner,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconf, err := appconfiguration.NewConfigurationStore(ctx, \"appconf\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tkv, err := keyvault.NewKeyVault(ctx, \"kv\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"kv\"),\n\t\t\tLocation: pulumi.Any(testAzurermResourceGroup.Location),\n\t\t\tResourceGroupName: pulumi.Any(testAzurermResourceGroup.Name),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tkvs, err := keyvault.NewSecret(ctx, \"kvs\", \u0026keyvault.SecretArgs{\n\t\t\tName: pulumi.String(\"kvs\"),\n\t\t\tValue: pulumi.String(\"szechuan\"),\n\t\t\tKeyVaultId: kv.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tappconfDataowner, err := authorization.NewAssignment(ctx, \"appconf_dataowner\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: appconf.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"App Configuration Data Owner\"),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationKey(ctx, \"test\", \u0026appconfiguration.ConfigurationKeyArgs{\n\t\t\tConfigurationStoreId: pulumi.Any(testAzurermAppConfiguration.Id),\n\t\t\tKey: pulumi.String(\"key1\"),\n\t\t\tType: pulumi.String(\"vault\"),\n\t\t\tLabel: pulumi.String(\"label1\"),\n\t\t\tVaultKeyReference: kvs.VersionlessId,\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tappconfDataowner,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Secret;\nimport com.pulumi.azure.keyvault.SecretArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationKey;\nimport com.pulumi.azure.appconfiguration.ConfigurationKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var appconf = new ConfigurationStore(\"appconf\", ConfigurationStoreArgs.builder()\n .name(\"appConf1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var kv = new KeyVault(\"kv\", KeyVaultArgs.builder()\n .name(\"kv\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build())\n .build());\n\n var kvs = new Secret(\"kvs\", SecretArgs.builder()\n .name(\"kvs\")\n .value(\"szechuan\")\n .keyVaultId(kv.id())\n .build());\n\n var appconfDataowner = new Assignment(\"appconfDataowner\", AssignmentArgs.builder()\n .scope(appconf.id())\n .roleDefinitionName(\"App Configuration Data Owner\")\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var test = new ConfigurationKey(\"test\", ConfigurationKeyArgs.builder()\n .configurationStoreId(testAzurermAppConfiguration.id())\n .key(\"key1\")\n .type(\"vault\")\n .label(\"label1\")\n .vaultKeyReference(kvs.versionlessId())\n .build(), CustomResourceOptions.builder()\n .dependsOn(appconfDataowner)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n appconf:\n type: azure:appconfiguration:ConfigurationStore\n properties:\n name: appConf1\n resourceGroupName: ${example.name}\n location: ${example.location}\n kv:\n type: azure:keyvault:KeyVault\n properties:\n name: kv\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n kvs:\n type: azure:keyvault:Secret\n properties:\n name: kvs\n value: szechuan\n keyVaultId: ${kv.id}\n appconfDataowner:\n type: azure:authorization:Assignment\n name: appconf_dataowner\n properties:\n scope: ${appconf.id}\n roleDefinitionName: App Configuration Data Owner\n principalId: ${current.objectId}\n test:\n type: azure:appconfiguration:ConfigurationKey\n properties:\n configurationStoreId: ${testAzurermAppConfiguration.id}\n key: key1\n type: vault\n label: label1\n vaultKeyReference: ${kvs.versionlessId}\n options:\n dependson:\n - ${appconfDataowner}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApp Configuration Keys can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appconfiguration/configurationKey:ConfigurationKey test https://appconfname1.azconfig.io/kv/keyName?label=labelName\n```\n\nIf you wish to import a key with an empty label then simply leave label's name blank:\n\n```sh\n$ pulumi import azure:appconfiguration/configurationKey:ConfigurationKey test https://appconfname1.azconfig.io/kv/keyName?label=\n```\n\n", "properties": { "configurationStoreId": { "type": "string", @@ -109471,7 +109471,7 @@ } }, "azure:appconfiguration/configurationStore:ConfigurationStore": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst appconf = new azure.appconfiguration.ConfigurationStore(\"appconf\", {\n name: \"appConf1\",\n resourceGroupName: example.name,\n location: example.location,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nappconf = azure.appconfiguration.ConfigurationStore(\"appconf\",\n name=\"appConf1\",\n resource_group_name=example.name,\n location=example.location)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var appconf = new Azure.AppConfiguration.ConfigurationStore(\"appconf\", new()\n {\n Name = \"appConf1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationStore(ctx, \"appconf\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var appconf = new ConfigurationStore(\"appconf\", ConfigurationStoreArgs.builder()\n .name(\"appConf1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n appconf:\n type: azure:appconfiguration:ConfigurationStore\n properties:\n name: appConf1\n resourceGroupName: ${example.name}\n location: ${example.location}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Encryption)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"example-identity\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"exampleKVt123\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: true,\n});\nconst server = new azure.keyvault.AccessPolicy(\"server\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"exampleKVkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n client,\n server,\n ],\n});\nconst exampleConfigurationStore = new azure.appconfiguration.ConfigurationStore(\"example\", {\n name: \"appConf2\",\n resourceGroupName: example.name,\n location: example.location,\n sku: \"standard\",\n localAuthEnabled: true,\n publicNetworkAccess: \"Enabled\",\n purgeProtectionEnabled: false,\n softDeleteRetentionDays: 1,\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n encryption: {\n keyVaultKeyIdentifier: exampleKey.id,\n identityClientId: exampleUserAssignedIdentity.clientId,\n },\n replicas: [{\n name: \"replica1\",\n location: \"West US\",\n }],\n tags: {\n environment: \"development\",\n },\n}, {\n dependsOn: [\n client,\n server,\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"example-identity\",\n location=example.location,\n resource_group_name=example.name)\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"exampleKVt123\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n purge_protection_enabled=True)\nserver = azure.keyvault.AccessPolicy(\"server\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_user_assigned_identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secret_permissions=[\"Get\"])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secret_permissions=[\"Get\"])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"exampleKVkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n server,\n ]))\nexample_configuration_store = azure.appconfiguration.ConfigurationStore(\"example\",\n name=\"appConf2\",\n resource_group_name=example.name,\n location=example.location,\n sku=\"standard\",\n local_auth_enabled=True,\n public_network_access=\"Enabled\",\n purge_protection_enabled=False,\n soft_delete_retention_days=1,\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n encryption={\n \"key_vault_key_identifier\": example_key.id,\n \"identity_client_id\": example_user_assigned_identity.client_id,\n },\n replicas=[{\n \"name\": \"replica1\",\n \"location\": \"West US\",\n }],\n tags={\n \"environment\": \"development\",\n },\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n server,\n ]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"example-identity\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"exampleKVt123\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = true,\n });\n\n var server = new Azure.KeyVault.AccessPolicy(\"server\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"exampleKVkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n server,\n },\n });\n\n var exampleConfigurationStore = new Azure.AppConfiguration.ConfigurationStore(\"example\", new()\n {\n Name = \"appConf2\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Sku = \"standard\",\n LocalAuthEnabled = true,\n PublicNetworkAccess = \"Enabled\",\n PurgeProtectionEnabled = false,\n SoftDeleteRetentionDays = 1,\n Identity = new Azure.AppConfiguration.Inputs.ConfigurationStoreIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n Encryption = new Azure.AppConfiguration.Inputs.ConfigurationStoreEncryptionArgs\n {\n KeyVaultKeyIdentifier = exampleKey.Id,\n IdentityClientId = exampleUserAssignedIdentity.ClientId,\n },\n Replicas = new[]\n {\n new Azure.AppConfiguration.Inputs.ConfigurationStoreReplicaArgs\n {\n Name = \"replica1\",\n Location = \"West US\",\n },\n },\n Tags = \n {\n { \"environment\", \"development\" },\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n server,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"example-identity\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"exampleKVt123\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tserver, err := keyvault.NewAccessPolicy(ctx, \"server\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"exampleKVkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tserver,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationStore(ctx, \"example\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf2\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSku: pulumi.String(\"standard\"),\n\t\t\tLocalAuthEnabled: pulumi.Bool(true),\n\t\t\tPublicNetworkAccess: pulumi.String(\"Enabled\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(1),\n\t\t\tIdentity: \u0026appconfiguration.ConfigurationStoreIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEncryption: \u0026appconfiguration.ConfigurationStoreEncryptionArgs{\n\t\t\t\tKeyVaultKeyIdentifier: exampleKey.ID(),\n\t\t\t\tIdentityClientId: exampleUserAssignedIdentity.ClientId,\n\t\t\t},\n\t\t\tReplicas: appconfiguration.ConfigurationStoreReplicaArray{\n\t\t\t\t\u0026appconfiguration.ConfigurationStoreReplicaArgs{\n\t\t\t\t\tName: pulumi.String(\"replica1\"),\n\t\t\t\t\tLocation: pulumi.String(\"West US\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"development\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tserver,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport com.pulumi.azure.appconfiguration.inputs.ConfigurationStoreIdentityArgs;\nimport com.pulumi.azure.appconfiguration.inputs.ConfigurationStoreEncryptionArgs;\nimport com.pulumi.azure.appconfiguration.inputs.ConfigurationStoreReplicaArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"example-identity\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"exampleKVt123\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(true)\n .build());\n\n var server = new AccessPolicy(\"server\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .secretPermissions(\"Get\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Get\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"exampleKVkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n server)\n .build());\n\n var exampleConfigurationStore = new ConfigurationStore(\"exampleConfigurationStore\", ConfigurationStoreArgs.builder()\n .name(\"appConf2\")\n .resourceGroupName(example.name())\n .location(example.location())\n .sku(\"standard\")\n .localAuthEnabled(true)\n .publicNetworkAccess(\"Enabled\")\n .purgeProtectionEnabled(false)\n .softDeleteRetentionDays(1)\n .identity(ConfigurationStoreIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .encryption(ConfigurationStoreEncryptionArgs.builder()\n .keyVaultKeyIdentifier(exampleKey.id())\n .identityClientId(exampleUserAssignedIdentity.clientId())\n .build())\n .replicas(ConfigurationStoreReplicaArgs.builder()\n .name(\"replica1\")\n .location(\"West US\")\n .build())\n .tags(Map.of(\"environment\", \"development\"))\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n server)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: example-identity\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: exampleKVt123\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: true\n server:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n secretPermissions:\n - Get\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n secretPermissions:\n - Get\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: exampleKVkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${client}\n - ${server}\n exampleConfigurationStore:\n type: azure:appconfiguration:ConfigurationStore\n name: example\n properties:\n name: appConf2\n resourceGroupName: ${example.name}\n location: ${example.location}\n sku: standard\n localAuthEnabled: true\n publicNetworkAccess: Enabled\n purgeProtectionEnabled: false\n softDeleteRetentionDays: 1\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n encryption:\n keyVaultKeyIdentifier: ${exampleKey.id}\n identityClientId: ${exampleUserAssignedIdentity.clientId}\n replicas:\n - name: replica1\n location: West US\n tags:\n environment: development\n options:\n dependson:\n - ${client}\n - ${server}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApp Configurations can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appconfiguration/configurationStore:ConfigurationStore appconf /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.AppConfiguration/configurationStores/appConf1\n```\n\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst appconf = new azure.appconfiguration.ConfigurationStore(\"appconf\", {\n name: \"appConf1\",\n resourceGroupName: example.name,\n location: example.location,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nappconf = azure.appconfiguration.ConfigurationStore(\"appconf\",\n name=\"appConf1\",\n resource_group_name=example.name,\n location=example.location)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var appconf = new Azure.AppConfiguration.ConfigurationStore(\"appconf\", new()\n {\n Name = \"appConf1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationStore(ctx, \"appconf\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var appconf = new ConfigurationStore(\"appconf\", ConfigurationStoreArgs.builder()\n .name(\"appConf1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n appconf:\n type: azure:appconfiguration:ConfigurationStore\n properties:\n name: appConf1\n resourceGroupName: ${example.name}\n location: ${example.location}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Encryption)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"example-identity\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"exampleKVt123\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: true,\n});\nconst server = new azure.keyvault.AccessPolicy(\"server\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"exampleKVkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n client,\n server,\n ],\n});\nconst exampleConfigurationStore = new azure.appconfiguration.ConfigurationStore(\"example\", {\n name: \"appConf2\",\n resourceGroupName: example.name,\n location: example.location,\n sku: \"standard\",\n localAuthEnabled: true,\n publicNetworkAccess: \"Enabled\",\n purgeProtectionEnabled: false,\n softDeleteRetentionDays: 1,\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n encryption: {\n keyVaultKeyIdentifier: exampleKey.id,\n identityClientId: exampleUserAssignedIdentity.clientId,\n },\n replicas: [{\n name: \"replica1\",\n location: \"West US\",\n }],\n tags: {\n environment: \"development\",\n },\n}, {\n dependsOn: [\n client,\n server,\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"example-identity\",\n location=example.location,\n resource_group_name=example.name)\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"exampleKVt123\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n purge_protection_enabled=True)\nserver = azure.keyvault.AccessPolicy(\"server\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_user_assigned_identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secret_permissions=[\"Get\"])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secret_permissions=[\"Get\"])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"exampleKVkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n server,\n ]))\nexample_configuration_store = azure.appconfiguration.ConfigurationStore(\"example\",\n name=\"appConf2\",\n resource_group_name=example.name,\n location=example.location,\n sku=\"standard\",\n local_auth_enabled=True,\n public_network_access=\"Enabled\",\n purge_protection_enabled=False,\n soft_delete_retention_days=1,\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n encryption={\n \"key_vault_key_identifier\": example_key.id,\n \"identity_client_id\": example_user_assigned_identity.client_id,\n },\n replicas=[{\n \"name\": \"replica1\",\n \"location\": \"West US\",\n }],\n tags={\n \"environment\": \"development\",\n },\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n server,\n ]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"example-identity\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"exampleKVt123\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = true,\n });\n\n var server = new Azure.KeyVault.AccessPolicy(\"server\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"exampleKVkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n server,\n },\n });\n\n var exampleConfigurationStore = new Azure.AppConfiguration.ConfigurationStore(\"example\", new()\n {\n Name = \"appConf2\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Sku = \"standard\",\n LocalAuthEnabled = true,\n PublicNetworkAccess = \"Enabled\",\n PurgeProtectionEnabled = false,\n SoftDeleteRetentionDays = 1,\n Identity = new Azure.AppConfiguration.Inputs.ConfigurationStoreIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n Encryption = new Azure.AppConfiguration.Inputs.ConfigurationStoreEncryptionArgs\n {\n KeyVaultKeyIdentifier = exampleKey.Id,\n IdentityClientId = exampleUserAssignedIdentity.ClientId,\n },\n Replicas = new[]\n {\n new Azure.AppConfiguration.Inputs.ConfigurationStoreReplicaArgs\n {\n Name = \"replica1\",\n Location = \"West US\",\n },\n },\n Tags = \n {\n { \"environment\", \"development\" },\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n server,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appconfiguration\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"example-identity\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"exampleKVt123\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tserver, err := keyvault.NewAccessPolicy(ctx, \"server\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"exampleKVkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tserver,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appconfiguration.NewConfigurationStore(ctx, \"example\", \u0026appconfiguration.ConfigurationStoreArgs{\n\t\t\tName: pulumi.String(\"appConf2\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSku: pulumi.String(\"standard\"),\n\t\t\tLocalAuthEnabled: pulumi.Bool(true),\n\t\t\tPublicNetworkAccess: pulumi.String(\"Enabled\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(1),\n\t\t\tIdentity: \u0026appconfiguration.ConfigurationStoreIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEncryption: \u0026appconfiguration.ConfigurationStoreEncryptionArgs{\n\t\t\t\tKeyVaultKeyIdentifier: exampleKey.ID(),\n\t\t\t\tIdentityClientId: exampleUserAssignedIdentity.ClientId,\n\t\t\t},\n\t\t\tReplicas: appconfiguration.ConfigurationStoreReplicaArray{\n\t\t\t\t\u0026appconfiguration.ConfigurationStoreReplicaArgs{\n\t\t\t\t\tName: pulumi.String(\"replica1\"),\n\t\t\t\t\tLocation: pulumi.String(\"West US\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"development\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tserver,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.appconfiguration.ConfigurationStore;\nimport com.pulumi.azure.appconfiguration.ConfigurationStoreArgs;\nimport com.pulumi.azure.appconfiguration.inputs.ConfigurationStoreIdentityArgs;\nimport com.pulumi.azure.appconfiguration.inputs.ConfigurationStoreEncryptionArgs;\nimport com.pulumi.azure.appconfiguration.inputs.ConfigurationStoreReplicaArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"example-identity\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"exampleKVt123\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(true)\n .build());\n\n var server = new AccessPolicy(\"server\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .secretPermissions(\"Get\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Get\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"exampleKVkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n server)\n .build());\n\n var exampleConfigurationStore = new ConfigurationStore(\"exampleConfigurationStore\", ConfigurationStoreArgs.builder()\n .name(\"appConf2\")\n .resourceGroupName(example.name())\n .location(example.location())\n .sku(\"standard\")\n .localAuthEnabled(true)\n .publicNetworkAccess(\"Enabled\")\n .purgeProtectionEnabled(false)\n .softDeleteRetentionDays(1)\n .identity(ConfigurationStoreIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .encryption(ConfigurationStoreEncryptionArgs.builder()\n .keyVaultKeyIdentifier(exampleKey.id())\n .identityClientId(exampleUserAssignedIdentity.clientId())\n .build())\n .replicas(ConfigurationStoreReplicaArgs.builder()\n .name(\"replica1\")\n .location(\"West US\")\n .build())\n .tags(Map.of(\"environment\", \"development\"))\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n server)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: example-identity\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: exampleKVt123\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: true\n server:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n secretPermissions:\n - Get\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n secretPermissions:\n - Get\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: exampleKVkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${client}\n - ${server}\n exampleConfigurationStore:\n type: azure:appconfiguration:ConfigurationStore\n name: example\n properties:\n name: appConf2\n resourceGroupName: ${example.name}\n location: ${example.location}\n sku: standard\n localAuthEnabled: true\n publicNetworkAccess: Enabled\n purgeProtectionEnabled: false\n softDeleteRetentionDays: 1\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n encryption:\n keyVaultKeyIdentifier: ${exampleKey.id}\n identityClientId: ${exampleUserAssignedIdentity.clientId}\n replicas:\n - name: replica1\n location: West US\n tags:\n environment: development\n options:\n dependson:\n - ${client}\n - ${server}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApp Configurations can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appconfiguration/configurationStore:ConfigurationStore appconf /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.AppConfiguration/configurationStores/appConf1\n```\n\n", "properties": { "encryption": { "$ref": "#/types/azure:appconfiguration/ConfigurationStoreEncryption:ConfigurationStoreEncryption", @@ -111191,7 +111191,7 @@ } }, "azure:appinsights/workbookTemplate:WorkbookTemplate": { - "description": "Manages an Application Insights Workbook Template.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleWorkbookTemplate = new azure.appinsights.WorkbookTemplate(\"example\", {\n name: \"example-aiwt\",\n resourceGroupName: example.name,\n location: \"West Europe\",\n author: \"test author\",\n priority: 1,\n galleries: [{\n category: \"workbook\",\n name: \"test\",\n order: 100,\n resourceType: \"microsoft.insights/components\",\n type: \"tsg\",\n }],\n templateData: JSON.stringify({\n version: \"Notebook/1.0\",\n items: [{\n type: 1,\n content: {\n json: `## New workbook\n---\n\nWelcome to your new workbook.`,\n },\n name: \"text - 2\",\n }],\n styleSettings: {},\n $schema: \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n }),\n localized: JSON.stringify({\n ar: [{\n galleries: [{\n name: \"test\",\n category: \"Failures\",\n type: \"tsg\",\n resourceType: \"microsoft.insights/components\",\n order: 100,\n }],\n templateData: {\n version: \"Notebook/1.0\",\n items: [{\n type: 1,\n content: {\n json: `## New workbook\n---\n\nWelcome to your new workbook.`,\n },\n name: \"text - 2\",\n }],\n styleSettings: {},\n $schema: \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n },\n }],\n }),\n tags: {\n key: \"value\",\n },\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_workbook_template = azure.appinsights.WorkbookTemplate(\"example\",\n name=\"example-aiwt\",\n resource_group_name=example.name,\n location=\"West Europe\",\n author=\"test author\",\n priority=1,\n galleries=[{\n \"category\": \"workbook\",\n \"name\": \"test\",\n \"order\": 100,\n \"resource_type\": \"microsoft.insights/components\",\n \"type\": \"tsg\",\n }],\n template_data=json.dumps({\n \"version\": \"Notebook/1.0\",\n \"items\": [{\n \"type\": 1,\n \"content\": {\n \"json\": \"\"\"## New workbook\n---\n\nWelcome to your new workbook.\"\"\",\n },\n \"name\": \"text - 2\",\n }],\n \"styleSettings\": {},\n \"$schema\": \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n }),\n localized=json.dumps({\n \"ar\": [{\n \"galleries\": [{\n \"name\": \"test\",\n \"category\": \"Failures\",\n \"type\": \"tsg\",\n \"resourceType\": \"microsoft.insights/components\",\n \"order\": 100,\n }],\n \"templateData\": {\n \"version\": \"Notebook/1.0\",\n \"items\": [{\n \"type\": 1,\n \"content\": {\n \"json\": \"\"\"## New workbook\n---\n\nWelcome to your new workbook.\"\"\",\n },\n \"name\": \"text - 2\",\n }],\n \"styleSettings\": {},\n \"$schema\": \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n },\n }],\n }),\n tags={\n \"key\": \"value\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleWorkbookTemplate = new Azure.AppInsights.WorkbookTemplate(\"example\", new()\n {\n Name = \"example-aiwt\",\n ResourceGroupName = example.Name,\n Location = \"West Europe\",\n Author = \"test author\",\n Priority = 1,\n Galleries = new[]\n {\n new Azure.AppInsights.Inputs.WorkbookTemplateGalleryArgs\n {\n Category = \"workbook\",\n Name = \"test\",\n Order = 100,\n ResourceType = \"microsoft.insights/components\",\n Type = \"tsg\",\n },\n },\n TemplateData = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"version\"] = \"Notebook/1.0\",\n [\"items\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"type\"] = 1,\n [\"content\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"json\"] = @\"## New workbook\n---\n\nWelcome to your new workbook.\",\n },\n [\"name\"] = \"text - 2\",\n },\n },\n [\"styleSettings\"] = new Dictionary\u003cstring, object?\u003e\n {\n },\n [\"$schema\"] = \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n }),\n Localized = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"ar\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"galleries\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"name\"] = \"test\",\n [\"category\"] = \"Failures\",\n [\"type\"] = \"tsg\",\n [\"resourceType\"] = \"microsoft.insights/components\",\n [\"order\"] = 100,\n },\n },\n [\"templateData\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"version\"] = \"Notebook/1.0\",\n [\"items\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"type\"] = 1,\n [\"content\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"json\"] = @\"## New workbook\n---\n\nWelcome to your new workbook.\",\n },\n [\"name\"] = \"text - 2\",\n },\n },\n [\"styleSettings\"] = new Dictionary\u003cstring, object?\u003e\n {\n },\n [\"$schema\"] = \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n },\n },\n },\n }),\n Tags = \n {\n { \"key\", \"value\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"version\": \"Notebook/1.0\",\n\t\t\t\"items\": []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"type\": 1,\n\t\t\t\t\t\"content\": map[string]interface{}{\n\t\t\t\t\t\t\"json\": \"## New workbook\\n---\\n\\nWelcome to your new workbook.\",\n\t\t\t\t\t},\n\t\t\t\t\t\"name\": \"text - 2\",\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"styleSettings\": nil,\n\t\t\t\"$schema\": \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"ar\": []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"galleries\": []map[string]interface{}{\n\t\t\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\t\t\"name\": \"test\",\n\t\t\t\t\t\t\t\"category\": \"Failures\",\n\t\t\t\t\t\t\t\"type\": \"tsg\",\n\t\t\t\t\t\t\t\"resourceType\": \"microsoft.insights/components\",\n\t\t\t\t\t\t\t\"order\": 100,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t\"templateData\": map[string]interface{}{\n\t\t\t\t\t\t\"version\": \"Notebook/1.0\",\n\t\t\t\t\t\t\"items\": []map[string]interface{}{\n\t\t\t\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\t\t\t\"type\": 1,\n\t\t\t\t\t\t\t\t\"content\": map[string]interface{}{\n\t\t\t\t\t\t\t\t\t\"json\": \"## New workbook\\n---\\n\\nWelcome to your new workbook.\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\"name\": \"text - 2\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"styleSettings\": nil,\n\t\t\t\t\t\t\"$schema\": \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\t_, err = appinsights.NewWorkbookTemplate(ctx, \"example\", \u0026appinsights.WorkbookTemplateArgs{\n\t\t\tName: pulumi.String(\"example-aiwt\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t\tAuthor: pulumi.String(\"test author\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tGalleries: appinsights.WorkbookTemplateGalleryArray{\n\t\t\t\t\u0026appinsights.WorkbookTemplateGalleryArgs{\n\t\t\t\t\tCategory: pulumi.String(\"workbook\"),\n\t\t\t\t\tName: pulumi.String(\"test\"),\n\t\t\t\t\tOrder: pulumi.Int(100),\n\t\t\t\t\tResourceType: pulumi.String(\"microsoft.insights/components\"),\n\t\t\t\t\tType: pulumi.String(\"tsg\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tTemplateData: pulumi.String(json0),\n\t\t\tLocalized: pulumi.String(json1),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"key\": pulumi.String(\"value\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.WorkbookTemplate;\nimport com.pulumi.azure.appinsights.WorkbookTemplateArgs;\nimport com.pulumi.azure.appinsights.inputs.WorkbookTemplateGalleryArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleWorkbookTemplate = new WorkbookTemplate(\"exampleWorkbookTemplate\", WorkbookTemplateArgs.builder()\n .name(\"example-aiwt\")\n .resourceGroupName(example.name())\n .location(\"West Europe\")\n .author(\"test author\")\n .priority(1)\n .galleries(WorkbookTemplateGalleryArgs.builder()\n .category(\"workbook\")\n .name(\"test\")\n .order(100)\n .resourceType(\"microsoft.insights/components\")\n .type(\"tsg\")\n .build())\n .templateData(serializeJson(\n jsonObject(\n jsonProperty(\"version\", \"Notebook/1.0\"),\n jsonProperty(\"items\", jsonArray(jsonObject(\n jsonProperty(\"type\", 1),\n jsonProperty(\"content\", jsonObject(\n jsonProperty(\"json\", \"\"\"\n## New workbook\n---\n\nWelcome to your new workbook. \"\"\")\n )),\n jsonProperty(\"name\", \"text - 2\")\n ))),\n jsonProperty(\"styleSettings\", jsonObject(\n\n )),\n jsonProperty(\"$schema\", \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\")\n )))\n .localized(serializeJson(\n jsonObject(\n jsonProperty(\"ar\", jsonArray(jsonObject(\n jsonProperty(\"galleries\", jsonArray(jsonObject(\n jsonProperty(\"name\", \"test\"),\n jsonProperty(\"category\", \"Failures\"),\n jsonProperty(\"type\", \"tsg\"),\n jsonProperty(\"resourceType\", \"microsoft.insights/components\"),\n jsonProperty(\"order\", 100)\n ))),\n jsonProperty(\"templateData\", jsonObject(\n jsonProperty(\"version\", \"Notebook/1.0\"),\n jsonProperty(\"items\", jsonArray(jsonObject(\n jsonProperty(\"type\", 1),\n jsonProperty(\"content\", jsonObject(\n jsonProperty(\"json\", \"\"\"\n## New workbook\n---\n\nWelcome to your new workbook. \"\"\")\n )),\n jsonProperty(\"name\", \"text - 2\")\n ))),\n jsonProperty(\"styleSettings\", jsonObject(\n\n )),\n jsonProperty(\"$schema\", \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\")\n ))\n )))\n )))\n .tags(Map.of(\"key\", \"value\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleWorkbookTemplate:\n type: azure:appinsights:WorkbookTemplate\n name: example\n properties:\n name: example-aiwt\n resourceGroupName: ${example.name}\n location: West Europe\n author: test author\n priority: 1\n galleries:\n - category: workbook\n name: test\n order: 100\n resourceType: microsoft.insights/components\n type: tsg\n templateData:\n fn::toJSON:\n version: Notebook/1.0\n items:\n - type: 1\n content:\n json: |-\n ## New workbook\n ---\n\n Welcome to your new workbook.\n name: text - 2\n styleSettings: {}\n $schema: https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\n localized:\n fn::toJSON:\n ar:\n - galleries:\n - name: test\n category: Failures\n type: tsg\n resourceType: microsoft.insights/components\n order: 100\n templateData:\n version: Notebook/1.0\n items:\n - type: 1\n content:\n json: |-\n ## New workbook\n ---\n\n Welcome to your new workbook.\n name: text - 2\n styleSettings: {}\n $schema: https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\n tags:\n key: value\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApplication Insights Workbook Template can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appinsights/workbookTemplate:WorkbookTemplate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Insights/workbookTemplates/resource1\n```\n\n", + "description": "Manages an Application Insights Workbook Template.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleWorkbookTemplate = new azure.appinsights.WorkbookTemplate(\"example\", {\n name: \"example-aiwt\",\n resourceGroupName: example.name,\n location: \"West Europe\",\n author: \"test author\",\n priority: 1,\n galleries: [{\n category: \"workbook\",\n name: \"test\",\n order: 100,\n resourceType: \"microsoft.insights/components\",\n type: \"tsg\",\n }],\n templateData: JSON.stringify({\n version: \"Notebook/1.0\",\n items: [{\n type: 1,\n content: {\n json: `## New workbook\n---\n\nWelcome to your new workbook.`,\n },\n name: \"text - 2\",\n }],\n styleSettings: {},\n $schema: \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n }),\n localized: JSON.stringify({\n ar: [{\n galleries: [{\n name: \"test\",\n category: \"Failures\",\n type: \"tsg\",\n resourceType: \"microsoft.insights/components\",\n order: 100,\n }],\n templateData: {\n version: \"Notebook/1.0\",\n items: [{\n type: 1,\n content: {\n json: `## New workbook\n---\n\nWelcome to your new workbook.`,\n },\n name: \"text - 2\",\n }],\n styleSettings: {},\n $schema: \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n },\n }],\n }),\n tags: {\n key: \"value\",\n },\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_workbook_template = azure.appinsights.WorkbookTemplate(\"example\",\n name=\"example-aiwt\",\n resource_group_name=example.name,\n location=\"West Europe\",\n author=\"test author\",\n priority=1,\n galleries=[{\n \"category\": \"workbook\",\n \"name\": \"test\",\n \"order\": 100,\n \"resource_type\": \"microsoft.insights/components\",\n \"type\": \"tsg\",\n }],\n template_data=json.dumps({\n \"version\": \"Notebook/1.0\",\n \"items\": [{\n \"type\": 1,\n \"content\": {\n \"json\": \"\"\"## New workbook\n---\n\nWelcome to your new workbook.\"\"\",\n },\n \"name\": \"text - 2\",\n }],\n \"styleSettings\": {},\n \"$schema\": \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n }),\n localized=json.dumps({\n \"ar\": [{\n \"galleries\": [{\n \"name\": \"test\",\n \"category\": \"Failures\",\n \"type\": \"tsg\",\n \"resourceType\": \"microsoft.insights/components\",\n \"order\": 100,\n }],\n \"templateData\": {\n \"version\": \"Notebook/1.0\",\n \"items\": [{\n \"type\": 1,\n \"content\": {\n \"json\": \"\"\"## New workbook\n---\n\nWelcome to your new workbook.\"\"\",\n },\n \"name\": \"text - 2\",\n }],\n \"styleSettings\": {},\n \"$schema\": \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n },\n }],\n }),\n tags={\n \"key\": \"value\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleWorkbookTemplate = new Azure.AppInsights.WorkbookTemplate(\"example\", new()\n {\n Name = \"example-aiwt\",\n ResourceGroupName = example.Name,\n Location = \"West Europe\",\n Author = \"test author\",\n Priority = 1,\n Galleries = new[]\n {\n new Azure.AppInsights.Inputs.WorkbookTemplateGalleryArgs\n {\n Category = \"workbook\",\n Name = \"test\",\n Order = 100,\n ResourceType = \"microsoft.insights/components\",\n Type = \"tsg\",\n },\n },\n TemplateData = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"version\"] = \"Notebook/1.0\",\n [\"items\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"type\"] = 1,\n [\"content\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"json\"] = @\"## New workbook\n---\n\nWelcome to your new workbook.\",\n },\n [\"name\"] = \"text - 2\",\n },\n },\n [\"styleSettings\"] = new Dictionary\u003cstring, object?\u003e\n {\n },\n [\"$schema\"] = \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n }),\n Localized = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"ar\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"galleries\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"name\"] = \"test\",\n [\"category\"] = \"Failures\",\n [\"type\"] = \"tsg\",\n [\"resourceType\"] = \"microsoft.insights/components\",\n [\"order\"] = 100,\n },\n },\n [\"templateData\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"version\"] = \"Notebook/1.0\",\n [\"items\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"type\"] = 1,\n [\"content\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"json\"] = @\"## New workbook\n---\n\nWelcome to your new workbook.\",\n },\n [\"name\"] = \"text - 2\",\n },\n },\n [\"styleSettings\"] = new Dictionary\u003cstring, object?\u003e\n {\n },\n [\"$schema\"] = \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n },\n },\n },\n }),\n Tags = \n {\n { \"key\", \"value\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"version\": \"Notebook/1.0\",\n\t\t\t\"items\": []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"type\": 1,\n\t\t\t\t\t\"content\": map[string]interface{}{\n\t\t\t\t\t\t\"json\": \"## New workbook\\n---\\n\\nWelcome to your new workbook.\",\n\t\t\t\t\t},\n\t\t\t\t\t\"name\": \"text - 2\",\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"styleSettings\": map[string]interface{}{},\n\t\t\t\"$schema\": \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"ar\": []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"galleries\": []map[string]interface{}{\n\t\t\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\t\t\"name\": \"test\",\n\t\t\t\t\t\t\t\"category\": \"Failures\",\n\t\t\t\t\t\t\t\"type\": \"tsg\",\n\t\t\t\t\t\t\t\"resourceType\": \"microsoft.insights/components\",\n\t\t\t\t\t\t\t\"order\": 100,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t\"templateData\": map[string]interface{}{\n\t\t\t\t\t\t\"version\": \"Notebook/1.0\",\n\t\t\t\t\t\t\"items\": []map[string]interface{}{\n\t\t\t\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\t\t\t\"type\": 1,\n\t\t\t\t\t\t\t\t\"content\": map[string]interface{}{\n\t\t\t\t\t\t\t\t\t\"json\": \"## New workbook\\n---\\n\\nWelcome to your new workbook.\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\"name\": \"text - 2\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"styleSettings\": map[string]interface{}{},\n\t\t\t\t\t\t\"$schema\": \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\t_, err = appinsights.NewWorkbookTemplate(ctx, \"example\", \u0026appinsights.WorkbookTemplateArgs{\n\t\t\tName: pulumi.String(\"example-aiwt\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t\tAuthor: pulumi.String(\"test author\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tGalleries: appinsights.WorkbookTemplateGalleryArray{\n\t\t\t\t\u0026appinsights.WorkbookTemplateGalleryArgs{\n\t\t\t\t\tCategory: pulumi.String(\"workbook\"),\n\t\t\t\t\tName: pulumi.String(\"test\"),\n\t\t\t\t\tOrder: pulumi.Int(100),\n\t\t\t\t\tResourceType: pulumi.String(\"microsoft.insights/components\"),\n\t\t\t\t\tType: pulumi.String(\"tsg\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tTemplateData: pulumi.String(json0),\n\t\t\tLocalized: pulumi.String(json1),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"key\": pulumi.String(\"value\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.WorkbookTemplate;\nimport com.pulumi.azure.appinsights.WorkbookTemplateArgs;\nimport com.pulumi.azure.appinsights.inputs.WorkbookTemplateGalleryArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleWorkbookTemplate = new WorkbookTemplate(\"exampleWorkbookTemplate\", WorkbookTemplateArgs.builder()\n .name(\"example-aiwt\")\n .resourceGroupName(example.name())\n .location(\"West Europe\")\n .author(\"test author\")\n .priority(1)\n .galleries(WorkbookTemplateGalleryArgs.builder()\n .category(\"workbook\")\n .name(\"test\")\n .order(100)\n .resourceType(\"microsoft.insights/components\")\n .type(\"tsg\")\n .build())\n .templateData(serializeJson(\n jsonObject(\n jsonProperty(\"version\", \"Notebook/1.0\"),\n jsonProperty(\"items\", jsonArray(jsonObject(\n jsonProperty(\"type\", 1),\n jsonProperty(\"content\", jsonObject(\n jsonProperty(\"json\", \"\"\"\n## New workbook\n---\n\nWelcome to your new workbook. \"\"\")\n )),\n jsonProperty(\"name\", \"text - 2\")\n ))),\n jsonProperty(\"styleSettings\", jsonObject(\n\n )),\n jsonProperty(\"$schema\", \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\")\n )))\n .localized(serializeJson(\n jsonObject(\n jsonProperty(\"ar\", jsonArray(jsonObject(\n jsonProperty(\"galleries\", jsonArray(jsonObject(\n jsonProperty(\"name\", \"test\"),\n jsonProperty(\"category\", \"Failures\"),\n jsonProperty(\"type\", \"tsg\"),\n jsonProperty(\"resourceType\", \"microsoft.insights/components\"),\n jsonProperty(\"order\", 100)\n ))),\n jsonProperty(\"templateData\", jsonObject(\n jsonProperty(\"version\", \"Notebook/1.0\"),\n jsonProperty(\"items\", jsonArray(jsonObject(\n jsonProperty(\"type\", 1),\n jsonProperty(\"content\", jsonObject(\n jsonProperty(\"json\", \"\"\"\n## New workbook\n---\n\nWelcome to your new workbook. \"\"\")\n )),\n jsonProperty(\"name\", \"text - 2\")\n ))),\n jsonProperty(\"styleSettings\", jsonObject(\n\n )),\n jsonProperty(\"$schema\", \"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\")\n ))\n )))\n )))\n .tags(Map.of(\"key\", \"value\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleWorkbookTemplate:\n type: azure:appinsights:WorkbookTemplate\n name: example\n properties:\n name: example-aiwt\n resourceGroupName: ${example.name}\n location: West Europe\n author: test author\n priority: 1\n galleries:\n - category: workbook\n name: test\n order: 100\n resourceType: microsoft.insights/components\n type: tsg\n templateData:\n fn::toJSON:\n version: Notebook/1.0\n items:\n - type: 1\n content:\n json: |-\n ## New workbook\n ---\n\n Welcome to your new workbook.\n name: text - 2\n styleSettings: {}\n $schema: https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\n localized:\n fn::toJSON:\n ar:\n - galleries:\n - name: test\n category: Failures\n type: tsg\n resourceType: microsoft.insights/components\n order: 100\n templateData:\n version: Notebook/1.0\n items:\n - type: 1\n content:\n json: |-\n ## New workbook\n ---\n\n Welcome to your new workbook.\n name: text - 2\n styleSettings: {}\n $schema: https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\n tags:\n key: value\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApplication Insights Workbook Template can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appinsights/workbookTemplate:WorkbookTemplate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Insights/workbookTemplates/resource1\n```\n\n", "properties": { "author": { "type": "string", @@ -112843,7 +112843,7 @@ } }, "azure:appplatform/springCloudCertificate:SpringCloudCertificate": { - "description": "Manages an Azure Spring Cloud Certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst example = azuread.getServicePrincipal({\n displayName: \"Azure Spring Cloud Resource Provider\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"keyvaultcertexample\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n secretPermissions: [\"Set\"],\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Update\",\n ],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: example.then(example =\u003e example.objectId),\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n certificatePermissions: [\n \"Get\",\n \"List\",\n ],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"cert-example\",\n keyVaultId: exampleKeyVault.id,\n certificatePolicy: {\n issuerParameters: {\n name: \"Self\",\n },\n keyProperties: {\n exportable: true,\n keySize: 2048,\n keyType: \"RSA\",\n reuseKey: true,\n },\n lifetimeActions: [{\n action: {\n actionType: \"AutoRenew\",\n },\n trigger: {\n daysBeforeExpiry: 30,\n },\n }],\n secretProperties: {\n contentType: \"application/x-pkcs12\",\n },\n x509CertificateProperties: {\n keyUsages: [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n subject: \"CN=contoso.com\",\n validityInMonths: 12,\n },\n },\n});\nconst exampleSpringCloudService = new azure.appplatform.SpringCloudService(\"example\", {\n name: \"example-springcloud\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n});\nconst exampleSpringCloudCertificate = new azure.appplatform.SpringCloudCertificate(\"example\", {\n name: \"example-scc\",\n resourceGroupName: exampleSpringCloudService.resourceGroupName,\n serviceName: exampleSpringCloudService.name,\n keyVaultCertificateId: exampleCertificate.id,\n excludePrivateKey: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample = azuread.get_service_principal(display_name=\"Azure Spring Cloud Resource Provider\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"keyvaultcertexample\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"secret_permissions\": [\"Set\"],\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Update\",\n ],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": example.object_id,\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n \"certificate_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"cert-example\",\n key_vault_id=example_key_vault.id,\n certificate_policy={\n \"issuer_parameters\": {\n \"name\": \"Self\",\n },\n \"key_properties\": {\n \"exportable\": True,\n \"key_size\": 2048,\n \"key_type\": \"RSA\",\n \"reuse_key\": True,\n },\n \"lifetime_actions\": [{\n \"action\": {\n \"action_type\": \"AutoRenew\",\n },\n \"trigger\": {\n \"days_before_expiry\": 30,\n },\n }],\n \"secret_properties\": {\n \"content_type\": \"application/x-pkcs12\",\n },\n \"x509_certificate_properties\": {\n \"key_usages\": [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n \"subject\": \"CN=contoso.com\",\n \"validity_in_months\": 12,\n },\n })\nexample_spring_cloud_service = azure.appplatform.SpringCloudService(\"example\",\n name=\"example-springcloud\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location)\nexample_spring_cloud_certificate = azure.appplatform.SpringCloudCertificate(\"example\",\n name=\"example-scc\",\n resource_group_name=example_spring_cloud_service.resource_group_name,\n service_name=example_spring_cloud_service.name,\n key_vault_certificate_id=example_certificate.id,\n exclude_private_key=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = AzureAD.GetServicePrincipal.Invoke(new()\n {\n DisplayName = \"Azure Spring Cloud Resource Provider\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"keyvaultcertexample\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Set\",\n },\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Update\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = example.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n CertificatePermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"cert-example\",\n KeyVaultId = exampleKeyVault.Id,\n CertificatePolicy = new Azure.KeyVault.Inputs.CertificateCertificatePolicyArgs\n {\n IssuerParameters = new Azure.KeyVault.Inputs.CertificateCertificatePolicyIssuerParametersArgs\n {\n Name = \"Self\",\n },\n KeyProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyKeyPropertiesArgs\n {\n Exportable = true,\n KeySize = 2048,\n KeyType = \"RSA\",\n ReuseKey = true,\n },\n LifetimeActions = new[]\n {\n new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionArgs\n {\n Action = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionActionArgs\n {\n ActionType = \"AutoRenew\",\n },\n Trigger = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionTriggerArgs\n {\n DaysBeforeExpiry = 30,\n },\n },\n },\n SecretProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicySecretPropertiesArgs\n {\n ContentType = \"application/x-pkcs12\",\n },\n X509CertificateProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs\n {\n KeyUsages = new[]\n {\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n },\n Subject = \"CN=contoso.com\",\n ValidityInMonths = 12,\n },\n },\n });\n\n var exampleSpringCloudService = new Azure.AppPlatform.SpringCloudService(\"example\", new()\n {\n Name = \"example-springcloud\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n });\n\n var exampleSpringCloudCertificate = new Azure.AppPlatform.SpringCloudCertificate(\"example\", new()\n {\n Name = \"example-scc\",\n ResourceGroupName = exampleSpringCloudService.ResourceGroupName,\n ServiceName = exampleSpringCloudService.Name,\n KeyVaultCertificateId = exampleCertificate.Id,\n ExcludePrivateKey = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appplatform\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Azure Spring Cloud Resource Provider\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"keyvaultcertexample\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(example.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"cert-example\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificatePolicy: \u0026keyvault.CertificateCertificatePolicyArgs{\n\t\t\t\tIssuerParameters: \u0026keyvault.CertificateCertificatePolicyIssuerParametersArgs{\n\t\t\t\t\tName: pulumi.String(\"Self\"),\n\t\t\t\t},\n\t\t\t\tKeyProperties: \u0026keyvault.CertificateCertificatePolicyKeyPropertiesArgs{\n\t\t\t\t\tExportable: pulumi.Bool(true),\n\t\t\t\t\tKeySize: pulumi.Int(2048),\n\t\t\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\t\t\tReuseKey: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t\tLifetimeActions: keyvault.CertificateCertificatePolicyLifetimeActionArray{\n\t\t\t\t\t\u0026keyvault.CertificateCertificatePolicyLifetimeActionArgs{\n\t\t\t\t\t\tAction: \u0026keyvault.CertificateCertificatePolicyLifetimeActionActionArgs{\n\t\t\t\t\t\t\tActionType: pulumi.String(\"AutoRenew\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tTrigger: \u0026keyvault.CertificateCertificatePolicyLifetimeActionTriggerArgs{\n\t\t\t\t\t\t\tDaysBeforeExpiry: pulumi.Int(30),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSecretProperties: \u0026keyvault.CertificateCertificatePolicySecretPropertiesArgs{\n\t\t\t\t\tContentType: pulumi.String(\"application/x-pkcs12\"),\n\t\t\t\t},\n\t\t\t\tX509CertificateProperties: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesArgs{\n\t\t\t\t\tKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"cRLSign\"),\n\t\t\t\t\t\tpulumi.String(\"dataEncipherment\"),\n\t\t\t\t\t\tpulumi.String(\"digitalSignature\"),\n\t\t\t\t\t\tpulumi.String(\"keyAgreement\"),\n\t\t\t\t\t\tpulumi.String(\"keyCertSign\"),\n\t\t\t\t\t\tpulumi.String(\"keyEncipherment\"),\n\t\t\t\t\t},\n\t\t\t\t\tSubject: pulumi.String(\"CN=contoso.com\"),\n\t\t\t\t\tValidityInMonths: pulumi.Int(12),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSpringCloudService, err := appplatform.NewSpringCloudService(ctx, \"example\", \u0026appplatform.SpringCloudServiceArgs{\n\t\t\tName: pulumi.String(\"example-springcloud\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appplatform.NewSpringCloudCertificate(ctx, \"example\", \u0026appplatform.SpringCloudCertificateArgs{\n\t\t\tName: pulumi.String(\"example-scc\"),\n\t\t\tResourceGroupName: exampleSpringCloudService.ResourceGroupName,\n\t\t\tServiceName: exampleSpringCloudService.Name,\n\t\t\tKeyVaultCertificateId: exampleCertificate.ID(),\n\t\t\tExcludePrivateKey: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyIssuerParametersArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyKeyPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicySecretPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs;\nimport com.pulumi.azure.appplatform.SpringCloudService;\nimport com.pulumi.azure.appplatform.SpringCloudServiceArgs;\nimport com.pulumi.azure.appplatform.SpringCloudCertificate;\nimport com.pulumi.azure.appplatform.SpringCloudCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n final var example = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .displayName(\"Azure Spring Cloud Resource Provider\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"keyvaultcertexample\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions(\"Set\")\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Update\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(example.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .secretPermissions( \n \"Get\",\n \"List\")\n .certificatePermissions( \n \"Get\",\n \"List\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"cert-example\")\n .keyVaultId(exampleKeyVault.id())\n .certificatePolicy(CertificateCertificatePolicyArgs.builder()\n .issuerParameters(CertificateCertificatePolicyIssuerParametersArgs.builder()\n .name(\"Self\")\n .build())\n .keyProperties(CertificateCertificatePolicyKeyPropertiesArgs.builder()\n .exportable(true)\n .keySize(2048)\n .keyType(\"RSA\")\n .reuseKey(true)\n .build())\n .lifetimeActions(CertificateCertificatePolicyLifetimeActionArgs.builder()\n .action(CertificateCertificatePolicyLifetimeActionActionArgs.builder()\n .actionType(\"AutoRenew\")\n .build())\n .trigger(CertificateCertificatePolicyLifetimeActionTriggerArgs.builder()\n .daysBeforeExpiry(30)\n .build())\n .build())\n .secretProperties(CertificateCertificatePolicySecretPropertiesArgs.builder()\n .contentType(\"application/x-pkcs12\")\n .build())\n .x509CertificateProperties(CertificateCertificatePolicyX509CertificatePropertiesArgs.builder()\n .keyUsages( \n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\")\n .subject(\"CN=contoso.com\")\n .validityInMonths(12)\n .build())\n .build())\n .build());\n\n var exampleSpringCloudService = new SpringCloudService(\"exampleSpringCloudService\", SpringCloudServiceArgs.builder()\n .name(\"example-springcloud\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .build());\n\n var exampleSpringCloudCertificate = new SpringCloudCertificate(\"exampleSpringCloudCertificate\", SpringCloudCertificateArgs.builder()\n .name(\"example-scc\")\n .resourceGroupName(exampleSpringCloudService.resourceGroupName())\n .serviceName(exampleSpringCloudService.name())\n .keyVaultCertificateId(exampleCertificate.id())\n .excludePrivateKey(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: keyvaultcertexample\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${current.tenantId}\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n secretPermissions:\n - Set\n certificatePermissions:\n - Create\n - Delete\n - Get\n - Update\n - tenantId: ${current.tenantId}\n objectId: ${example.objectId}\n secretPermissions:\n - Get\n - List\n certificatePermissions:\n - Get\n - List\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: cert-example\n keyVaultId: ${exampleKeyVault.id}\n certificatePolicy:\n issuerParameters:\n name: Self\n keyProperties:\n exportable: true\n keySize: 2048\n keyType: RSA\n reuseKey: true\n lifetimeActions:\n - action:\n actionType: AutoRenew\n trigger:\n daysBeforeExpiry: 30\n secretProperties:\n contentType: application/x-pkcs12\n x509CertificateProperties:\n keyUsages:\n - cRLSign\n - dataEncipherment\n - digitalSignature\n - keyAgreement\n - keyCertSign\n - keyEncipherment\n subject: CN=contoso.com\n validityInMonths: 12\n exampleSpringCloudService:\n type: azure:appplatform:SpringCloudService\n name: example\n properties:\n name: example-springcloud\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n exampleSpringCloudCertificate:\n type: azure:appplatform:SpringCloudCertificate\n name: example\n properties:\n name: example-scc\n resourceGroupName: ${exampleSpringCloudService.resourceGroupName}\n serviceName: ${exampleSpringCloudService.name}\n keyVaultCertificateId: ${exampleCertificate.id}\n excludePrivateKey: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n displayName: Azure Spring Cloud Resource Provider\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSpring Cloud Certificate can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appplatform/springCloudCertificate:SpringCloudCertificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourcegroup1/providers/Microsoft.AppPlatform/spring/spring1/certificates/cert1\n```\n\n", + "description": "Manages an Azure Spring Cloud Certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst example = azuread.getServicePrincipal({\n displayName: \"Azure Spring Cloud Resource Provider\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"keyvaultcertexample\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n secretPermissions: [\"Set\"],\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Update\",\n ],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: example.then(example =\u003e example.objectId),\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n certificatePermissions: [\n \"Get\",\n \"List\",\n ],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"cert-example\",\n keyVaultId: exampleKeyVault.id,\n certificatePolicy: {\n issuerParameters: {\n name: \"Self\",\n },\n keyProperties: {\n exportable: true,\n keySize: 2048,\n keyType: \"RSA\",\n reuseKey: true,\n },\n lifetimeActions: [{\n action: {\n actionType: \"AutoRenew\",\n },\n trigger: {\n daysBeforeExpiry: 30,\n },\n }],\n secretProperties: {\n contentType: \"application/x-pkcs12\",\n },\n x509CertificateProperties: {\n keyUsages: [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n subject: \"CN=contoso.com\",\n validityInMonths: 12,\n },\n },\n});\nconst exampleSpringCloudService = new azure.appplatform.SpringCloudService(\"example\", {\n name: \"example-springcloud\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n});\nconst exampleSpringCloudCertificate = new azure.appplatform.SpringCloudCertificate(\"example\", {\n name: \"example-scc\",\n resourceGroupName: exampleSpringCloudService.resourceGroupName,\n serviceName: exampleSpringCloudService.name,\n keyVaultCertificateId: exampleCertificate.id,\n excludePrivateKey: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample = azuread.get_service_principal(display_name=\"Azure Spring Cloud Resource Provider\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"keyvaultcertexample\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"secret_permissions\": [\"Set\"],\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Update\",\n ],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": example.object_id,\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n \"certificate_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"cert-example\",\n key_vault_id=example_key_vault.id,\n certificate_policy={\n \"issuer_parameters\": {\n \"name\": \"Self\",\n },\n \"key_properties\": {\n \"exportable\": True,\n \"key_size\": 2048,\n \"key_type\": \"RSA\",\n \"reuse_key\": True,\n },\n \"lifetime_actions\": [{\n \"action\": {\n \"action_type\": \"AutoRenew\",\n },\n \"trigger\": {\n \"days_before_expiry\": 30,\n },\n }],\n \"secret_properties\": {\n \"content_type\": \"application/x-pkcs12\",\n },\n \"x509_certificate_properties\": {\n \"key_usages\": [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n \"subject\": \"CN=contoso.com\",\n \"validity_in_months\": 12,\n },\n })\nexample_spring_cloud_service = azure.appplatform.SpringCloudService(\"example\",\n name=\"example-springcloud\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location)\nexample_spring_cloud_certificate = azure.appplatform.SpringCloudCertificate(\"example\",\n name=\"example-scc\",\n resource_group_name=example_spring_cloud_service.resource_group_name,\n service_name=example_spring_cloud_service.name,\n key_vault_certificate_id=example_certificate.id,\n exclude_private_key=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = AzureAD.GetServicePrincipal.Invoke(new()\n {\n DisplayName = \"Azure Spring Cloud Resource Provider\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"keyvaultcertexample\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Set\",\n },\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Update\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = example.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n CertificatePermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"cert-example\",\n KeyVaultId = exampleKeyVault.Id,\n CertificatePolicy = new Azure.KeyVault.Inputs.CertificateCertificatePolicyArgs\n {\n IssuerParameters = new Azure.KeyVault.Inputs.CertificateCertificatePolicyIssuerParametersArgs\n {\n Name = \"Self\",\n },\n KeyProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyKeyPropertiesArgs\n {\n Exportable = true,\n KeySize = 2048,\n KeyType = \"RSA\",\n ReuseKey = true,\n },\n LifetimeActions = new[]\n {\n new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionArgs\n {\n Action = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionActionArgs\n {\n ActionType = \"AutoRenew\",\n },\n Trigger = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionTriggerArgs\n {\n DaysBeforeExpiry = 30,\n },\n },\n },\n SecretProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicySecretPropertiesArgs\n {\n ContentType = \"application/x-pkcs12\",\n },\n X509CertificateProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs\n {\n KeyUsages = new[]\n {\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n },\n Subject = \"CN=contoso.com\",\n ValidityInMonths = 12,\n },\n },\n });\n\n var exampleSpringCloudService = new Azure.AppPlatform.SpringCloudService(\"example\", new()\n {\n Name = \"example-springcloud\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n });\n\n var exampleSpringCloudCertificate = new Azure.AppPlatform.SpringCloudCertificate(\"example\", new()\n {\n Name = \"example-scc\",\n ResourceGroupName = exampleSpringCloudService.ResourceGroupName,\n ServiceName = exampleSpringCloudService.Name,\n KeyVaultCertificateId = exampleCertificate.Id,\n ExcludePrivateKey = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appplatform\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Azure Spring Cloud Resource Provider\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"keyvaultcertexample\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(example.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"cert-example\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificatePolicy: \u0026keyvault.CertificateCertificatePolicyArgs{\n\t\t\t\tIssuerParameters: \u0026keyvault.CertificateCertificatePolicyIssuerParametersArgs{\n\t\t\t\t\tName: pulumi.String(\"Self\"),\n\t\t\t\t},\n\t\t\t\tKeyProperties: \u0026keyvault.CertificateCertificatePolicyKeyPropertiesArgs{\n\t\t\t\t\tExportable: pulumi.Bool(true),\n\t\t\t\t\tKeySize: pulumi.Int(2048),\n\t\t\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\t\t\tReuseKey: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t\tLifetimeActions: keyvault.CertificateCertificatePolicyLifetimeActionArray{\n\t\t\t\t\t\u0026keyvault.CertificateCertificatePolicyLifetimeActionArgs{\n\t\t\t\t\t\tAction: \u0026keyvault.CertificateCertificatePolicyLifetimeActionActionArgs{\n\t\t\t\t\t\t\tActionType: pulumi.String(\"AutoRenew\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tTrigger: \u0026keyvault.CertificateCertificatePolicyLifetimeActionTriggerArgs{\n\t\t\t\t\t\t\tDaysBeforeExpiry: pulumi.Int(30),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSecretProperties: \u0026keyvault.CertificateCertificatePolicySecretPropertiesArgs{\n\t\t\t\t\tContentType: pulumi.String(\"application/x-pkcs12\"),\n\t\t\t\t},\n\t\t\t\tX509CertificateProperties: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesArgs{\n\t\t\t\t\tKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"cRLSign\"),\n\t\t\t\t\t\tpulumi.String(\"dataEncipherment\"),\n\t\t\t\t\t\tpulumi.String(\"digitalSignature\"),\n\t\t\t\t\t\tpulumi.String(\"keyAgreement\"),\n\t\t\t\t\t\tpulumi.String(\"keyCertSign\"),\n\t\t\t\t\t\tpulumi.String(\"keyEncipherment\"),\n\t\t\t\t\t},\n\t\t\t\t\tSubject: pulumi.String(\"CN=contoso.com\"),\n\t\t\t\t\tValidityInMonths: pulumi.Int(12),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSpringCloudService, err := appplatform.NewSpringCloudService(ctx, \"example\", \u0026appplatform.SpringCloudServiceArgs{\n\t\t\tName: pulumi.String(\"example-springcloud\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appplatform.NewSpringCloudCertificate(ctx, \"example\", \u0026appplatform.SpringCloudCertificateArgs{\n\t\t\tName: pulumi.String(\"example-scc\"),\n\t\t\tResourceGroupName: exampleSpringCloudService.ResourceGroupName,\n\t\t\tServiceName: exampleSpringCloudService.Name,\n\t\t\tKeyVaultCertificateId: exampleCertificate.ID(),\n\t\t\tExcludePrivateKey: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyIssuerParametersArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyKeyPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicySecretPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs;\nimport com.pulumi.azure.appplatform.SpringCloudService;\nimport com.pulumi.azure.appplatform.SpringCloudServiceArgs;\nimport com.pulumi.azure.appplatform.SpringCloudCertificate;\nimport com.pulumi.azure.appplatform.SpringCloudCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n final var example = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .displayName(\"Azure Spring Cloud Resource Provider\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"keyvaultcertexample\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions(\"Set\")\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Update\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(example.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .secretPermissions( \n \"Get\",\n \"List\")\n .certificatePermissions( \n \"Get\",\n \"List\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"cert-example\")\n .keyVaultId(exampleKeyVault.id())\n .certificatePolicy(CertificateCertificatePolicyArgs.builder()\n .issuerParameters(CertificateCertificatePolicyIssuerParametersArgs.builder()\n .name(\"Self\")\n .build())\n .keyProperties(CertificateCertificatePolicyKeyPropertiesArgs.builder()\n .exportable(true)\n .keySize(2048)\n .keyType(\"RSA\")\n .reuseKey(true)\n .build())\n .lifetimeActions(CertificateCertificatePolicyLifetimeActionArgs.builder()\n .action(CertificateCertificatePolicyLifetimeActionActionArgs.builder()\n .actionType(\"AutoRenew\")\n .build())\n .trigger(CertificateCertificatePolicyLifetimeActionTriggerArgs.builder()\n .daysBeforeExpiry(30)\n .build())\n .build())\n .secretProperties(CertificateCertificatePolicySecretPropertiesArgs.builder()\n .contentType(\"application/x-pkcs12\")\n .build())\n .x509CertificateProperties(CertificateCertificatePolicyX509CertificatePropertiesArgs.builder()\n .keyUsages( \n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\")\n .subject(\"CN=contoso.com\")\n .validityInMonths(12)\n .build())\n .build())\n .build());\n\n var exampleSpringCloudService = new SpringCloudService(\"exampleSpringCloudService\", SpringCloudServiceArgs.builder()\n .name(\"example-springcloud\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .build());\n\n var exampleSpringCloudCertificate = new SpringCloudCertificate(\"exampleSpringCloudCertificate\", SpringCloudCertificateArgs.builder()\n .name(\"example-scc\")\n .resourceGroupName(exampleSpringCloudService.resourceGroupName())\n .serviceName(exampleSpringCloudService.name())\n .keyVaultCertificateId(exampleCertificate.id())\n .excludePrivateKey(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: keyvaultcertexample\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${current.tenantId}\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n secretPermissions:\n - Set\n certificatePermissions:\n - Create\n - Delete\n - Get\n - Update\n - tenantId: ${current.tenantId}\n objectId: ${example.objectId}\n secretPermissions:\n - Get\n - List\n certificatePermissions:\n - Get\n - List\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: cert-example\n keyVaultId: ${exampleKeyVault.id}\n certificatePolicy:\n issuerParameters:\n name: Self\n keyProperties:\n exportable: true\n keySize: 2048\n keyType: RSA\n reuseKey: true\n lifetimeActions:\n - action:\n actionType: AutoRenew\n trigger:\n daysBeforeExpiry: 30\n secretProperties:\n contentType: application/x-pkcs12\n x509CertificateProperties:\n keyUsages:\n - cRLSign\n - dataEncipherment\n - digitalSignature\n - keyAgreement\n - keyCertSign\n - keyEncipherment\n subject: CN=contoso.com\n validityInMonths: 12\n exampleSpringCloudService:\n type: azure:appplatform:SpringCloudService\n name: example\n properties:\n name: example-springcloud\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n exampleSpringCloudCertificate:\n type: azure:appplatform:SpringCloudCertificate\n name: example\n properties:\n name: example-scc\n resourceGroupName: ${exampleSpringCloudService.resourceGroupName}\n serviceName: ${exampleSpringCloudService.name}\n keyVaultCertificateId: ${exampleCertificate.id}\n excludePrivateKey: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n displayName: Azure Spring Cloud Resource Provider\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSpring Cloud Certificate can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appplatform/springCloudCertificate:SpringCloudCertificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourcegroup1/providers/Microsoft.AppPlatform/spring/spring1/certificates/cert1\n```\n\n", "properties": { "certificateContent": { "type": "string", @@ -113571,7 +113571,7 @@ } }, "azure:appplatform/springCloudDevToolPortal:SpringCloudDevToolPortal": { - "description": "\u003e **NOTE:** This resource is applicable only for Spring Cloud Service with enterprise tier.\n\nManages a Spring Cloud Dev Tool Portal.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst exampleSpringCloudService = new azure.appplatform.SpringCloudService(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"E0\",\n});\nconst exampleSpringCloudDevToolPortal = new azure.appplatform.SpringCloudDevToolPortal(\"example\", {\n name: \"default\",\n springCloudServiceId: exampleSpringCloudService.id,\n publicNetworkAccessEnabled: true,\n sso: {\n clientId: \"example id\",\n clientSecret: \"example secret\",\n metadataUrl: current.then(current =\u003e `https://login.microsoftonline.com/${current.tenantId}/v2.0/.well-known/openid-configuration`),\n scopes: [\n \"openid\",\n \"profile\",\n \"email\",\n ],\n },\n applicationAcceleratorEnabled: true,\n applicationLiveViewEnabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\nexample_spring_cloud_service = azure.appplatform.SpringCloudService(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"E0\")\nexample_spring_cloud_dev_tool_portal = azure.appplatform.SpringCloudDevToolPortal(\"example\",\n name=\"default\",\n spring_cloud_service_id=example_spring_cloud_service.id,\n public_network_access_enabled=True,\n sso={\n \"client_id\": \"example id\",\n \"client_secret\": \"example secret\",\n \"metadata_url\": f\"https://login.microsoftonline.com/{current.tenant_id}/v2.0/.well-known/openid-configuration\",\n \"scopes\": [\n \"openid\",\n \"profile\",\n \"email\",\n ],\n },\n application_accelerator_enabled=True,\n application_live_view_enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var exampleSpringCloudService = new Azure.AppPlatform.SpringCloudService(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"E0\",\n });\n\n var exampleSpringCloudDevToolPortal = new Azure.AppPlatform.SpringCloudDevToolPortal(\"example\", new()\n {\n Name = \"default\",\n SpringCloudServiceId = exampleSpringCloudService.Id,\n PublicNetworkAccessEnabled = true,\n Sso = new Azure.AppPlatform.Inputs.SpringCloudDevToolPortalSsoArgs\n {\n ClientId = \"example id\",\n ClientSecret = \"example secret\",\n MetadataUrl = $\"https://login.microsoftonline.com/{current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId)}/v2.0/.well-known/openid-configuration\",\n Scopes = new[]\n {\n \"openid\",\n \"profile\",\n \"email\",\n },\n },\n ApplicationAcceleratorEnabled = true,\n ApplicationLiveViewEnabled = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appplatform\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSpringCloudService, err := appplatform.NewSpringCloudService(ctx, \"example\", \u0026appplatform.SpringCloudServiceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"E0\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appplatform.NewSpringCloudDevToolPortal(ctx, \"example\", \u0026appplatform.SpringCloudDevToolPortalArgs{\n\t\t\tName: pulumi.String(\"default\"),\n\t\t\tSpringCloudServiceId: exampleSpringCloudService.ID(),\n\t\t\tPublicNetworkAccessEnabled: pulumi.Bool(true),\n\t\t\tSso: \u0026appplatform.SpringCloudDevToolPortalSsoArgs{\n\t\t\t\tClientId: pulumi.String(\"example id\"),\n\t\t\t\tClientSecret: pulumi.String(\"example secret\"),\n\t\t\t\tMetadataUrl: pulumi.Sprintf(\"https://login.microsoftonline.com/%v/v2.0/.well-known/openid-configuration\", current.TenantId),\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"openid\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tApplicationAcceleratorEnabled: pulumi.Bool(true),\n\t\t\tApplicationLiveViewEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appplatform.SpringCloudService;\nimport com.pulumi.azure.appplatform.SpringCloudServiceArgs;\nimport com.pulumi.azure.appplatform.SpringCloudDevToolPortal;\nimport com.pulumi.azure.appplatform.SpringCloudDevToolPortalArgs;\nimport com.pulumi.azure.appplatform.inputs.SpringCloudDevToolPortalSsoArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n var exampleSpringCloudService = new SpringCloudService(\"exampleSpringCloudService\", SpringCloudServiceArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"E0\")\n .build());\n\n var exampleSpringCloudDevToolPortal = new SpringCloudDevToolPortal(\"exampleSpringCloudDevToolPortal\", SpringCloudDevToolPortalArgs.builder()\n .name(\"default\")\n .springCloudServiceId(exampleSpringCloudService.id())\n .publicNetworkAccessEnabled(true)\n .sso(SpringCloudDevToolPortalSsoArgs.builder()\n .clientId(\"example id\")\n .clientSecret(\"example secret\")\n .metadataUrl(String.format(\"https://login.microsoftonline.com/%s/v2.0/.well-known/openid-configuration\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId())))\n .scopes( \n \"openid\",\n \"profile\",\n \"email\")\n .build())\n .applicationAcceleratorEnabled(true)\n .applicationLiveViewEnabled(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: West Europe\n exampleSpringCloudService:\n type: azure:appplatform:SpringCloudService\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: E0\n exampleSpringCloudDevToolPortal:\n type: azure:appplatform:SpringCloudDevToolPortal\n name: example\n properties:\n name: default\n springCloudServiceId: ${exampleSpringCloudService.id}\n publicNetworkAccessEnabled: true\n sso:\n clientId: example id\n clientSecret: example secret\n metadataUrl: https://login.microsoftonline.com/${current.tenantId}/v2.0/.well-known/openid-configuration\n scopes:\n - openid\n - profile\n - email\n applicationAcceleratorEnabled: true\n applicationLiveViewEnabled: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSpring Cloud Dev Tool Portals can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appplatform/springCloudDevToolPortal:SpringCloudDevToolPortal example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resourceGroup1/providers/Microsoft.AppPlatform/Spring/service1/DevToolPortals/default\n```\n\n", + "description": "\u003e **NOTE:** This resource is applicable only for Spring Cloud Service with enterprise tier.\n\nManages a Spring Cloud Dev Tool Portal.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst exampleSpringCloudService = new azure.appplatform.SpringCloudService(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"E0\",\n});\nconst exampleSpringCloudDevToolPortal = new azure.appplatform.SpringCloudDevToolPortal(\"example\", {\n name: \"default\",\n springCloudServiceId: exampleSpringCloudService.id,\n publicNetworkAccessEnabled: true,\n sso: {\n clientId: \"example id\",\n clientSecret: \"example secret\",\n metadataUrl: current.then(current =\u003e `https://login.microsoftonline.com/${current.tenantId}/v2.0/.well-known/openid-configuration`),\n scopes: [\n \"openid\",\n \"profile\",\n \"email\",\n ],\n },\n applicationAcceleratorEnabled: true,\n applicationLiveViewEnabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\nexample_spring_cloud_service = azure.appplatform.SpringCloudService(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"E0\")\nexample_spring_cloud_dev_tool_portal = azure.appplatform.SpringCloudDevToolPortal(\"example\",\n name=\"default\",\n spring_cloud_service_id=example_spring_cloud_service.id,\n public_network_access_enabled=True,\n sso={\n \"client_id\": \"example id\",\n \"client_secret\": \"example secret\",\n \"metadata_url\": f\"https://login.microsoftonline.com/{current.tenant_id}/v2.0/.well-known/openid-configuration\",\n \"scopes\": [\n \"openid\",\n \"profile\",\n \"email\",\n ],\n },\n application_accelerator_enabled=True,\n application_live_view_enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var exampleSpringCloudService = new Azure.AppPlatform.SpringCloudService(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"E0\",\n });\n\n var exampleSpringCloudDevToolPortal = new Azure.AppPlatform.SpringCloudDevToolPortal(\"example\", new()\n {\n Name = \"default\",\n SpringCloudServiceId = exampleSpringCloudService.Id,\n PublicNetworkAccessEnabled = true,\n Sso = new Azure.AppPlatform.Inputs.SpringCloudDevToolPortalSsoArgs\n {\n ClientId = \"example id\",\n ClientSecret = \"example secret\",\n MetadataUrl = $\"https://login.microsoftonline.com/{current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId)}/v2.0/.well-known/openid-configuration\",\n Scopes = new[]\n {\n \"openid\",\n \"profile\",\n \"email\",\n },\n },\n ApplicationAcceleratorEnabled = true,\n ApplicationLiveViewEnabled = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appplatform\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSpringCloudService, err := appplatform.NewSpringCloudService(ctx, \"example\", \u0026appplatform.SpringCloudServiceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"E0\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appplatform.NewSpringCloudDevToolPortal(ctx, \"example\", \u0026appplatform.SpringCloudDevToolPortalArgs{\n\t\t\tName: pulumi.String(\"default\"),\n\t\t\tSpringCloudServiceId: exampleSpringCloudService.ID(),\n\t\t\tPublicNetworkAccessEnabled: pulumi.Bool(true),\n\t\t\tSso: \u0026appplatform.SpringCloudDevToolPortalSsoArgs{\n\t\t\t\tClientId: pulumi.String(\"example id\"),\n\t\t\t\tClientSecret: pulumi.String(\"example secret\"),\n\t\t\t\tMetadataUrl: pulumi.Sprintf(\"https://login.microsoftonline.com/%v/v2.0/.well-known/openid-configuration\", current.TenantId),\n\t\t\t\tScopes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"openid\"),\n\t\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\t\tpulumi.String(\"email\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tApplicationAcceleratorEnabled: pulumi.Bool(true),\n\t\t\tApplicationLiveViewEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appplatform.SpringCloudService;\nimport com.pulumi.azure.appplatform.SpringCloudServiceArgs;\nimport com.pulumi.azure.appplatform.SpringCloudDevToolPortal;\nimport com.pulumi.azure.appplatform.SpringCloudDevToolPortalArgs;\nimport com.pulumi.azure.appplatform.inputs.SpringCloudDevToolPortalSsoArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n var exampleSpringCloudService = new SpringCloudService(\"exampleSpringCloudService\", SpringCloudServiceArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"E0\")\n .build());\n\n var exampleSpringCloudDevToolPortal = new SpringCloudDevToolPortal(\"exampleSpringCloudDevToolPortal\", SpringCloudDevToolPortalArgs.builder()\n .name(\"default\")\n .springCloudServiceId(exampleSpringCloudService.id())\n .publicNetworkAccessEnabled(true)\n .sso(SpringCloudDevToolPortalSsoArgs.builder()\n .clientId(\"example id\")\n .clientSecret(\"example secret\")\n .metadataUrl(String.format(\"https://login.microsoftonline.com/%s/v2.0/.well-known/openid-configuration\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId())))\n .scopes( \n \"openid\",\n \"profile\",\n \"email\")\n .build())\n .applicationAcceleratorEnabled(true)\n .applicationLiveViewEnabled(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: West Europe\n exampleSpringCloudService:\n type: azure:appplatform:SpringCloudService\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: E0\n exampleSpringCloudDevToolPortal:\n type: azure:appplatform:SpringCloudDevToolPortal\n name: example\n properties:\n name: default\n springCloudServiceId: ${exampleSpringCloudService.id}\n publicNetworkAccessEnabled: true\n sso:\n clientId: example id\n clientSecret: example secret\n metadataUrl: https://login.microsoftonline.com/${current.tenantId}/v2.0/.well-known/openid-configuration\n scopes:\n - openid\n - profile\n - email\n applicationAcceleratorEnabled: true\n applicationLiveViewEnabled: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSpring Cloud Dev Tool Portals can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appplatform/springCloudDevToolPortal:SpringCloudDevToolPortal example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resourceGroup1/providers/Microsoft.AppPlatform/Spring/service1/DevToolPortals/default\n```\n\n", "properties": { "applicationAcceleratorEnabled": { "type": "boolean", @@ -117100,7 +117100,7 @@ } }, "azure:appservice/functionAppActiveSlot:FunctionAppActiveSlot": { - "description": "Manages a Function App Active Slot.\n\n## Example Usage\n\n### Windows Function App\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"windowsfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"Y1\",\n});\nconst exampleWindowsFunctionApp = new azure.appservice.WindowsFunctionApp(\"example\", {\n name: \"example-windows-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n storageAccountName: exampleAccount.name,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsFunctionAppSlot = new azure.appservice.WindowsFunctionAppSlot(\"example\", {\n name: \"example-windows-function-app-slot\",\n functionAppId: exampleWindowsFunctionApp.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\nconst exampleFunctionAppActiveSlot = new azure.appservice.FunctionAppActiveSlot(\"example\", {slotId: exampleWindowsFunctionAppSlot.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"windowsfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"Y1\")\nexample_windows_function_app = azure.appservice.WindowsFunctionApp(\"example\",\n name=\"example-windows-function-app\",\n resource_group_name=example.name,\n location=example.location,\n storage_account_name=example_account.name,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_function_app_slot = azure.appservice.WindowsFunctionAppSlot(\"example\",\n name=\"example-windows-function-app-slot\",\n function_app_id=example_windows_function_app.id,\n storage_account_name=example_account.name,\n site_config={})\nexample_function_app_active_slot = azure.appservice.FunctionAppActiveSlot(\"example\", slot_id=example_windows_function_app_slot.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"windowsfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"Y1\",\n });\n\n var exampleWindowsFunctionApp = new Azure.AppService.WindowsFunctionApp(\"example\", new()\n {\n Name = \"example-windows-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageAccountName = exampleAccount.Name,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsFunctionAppSlot = new Azure.AppService.WindowsFunctionAppSlot(\"example\", new()\n {\n Name = \"example-windows-function-app-slot\",\n FunctionAppId = exampleWindowsFunctionApp.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n var exampleFunctionAppActiveSlot = new Azure.AppService.FunctionAppActiveSlot(\"example\", new()\n {\n SlotId = exampleWindowsFunctionAppSlot.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"windowsfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsFunctionApp, err := appservice.NewWindowsFunctionApp(ctx, \"example\", \u0026appservice.WindowsFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsFunctionAppSlot, err := appservice.NewWindowsFunctionAppSlot(ctx, \"example\", \u0026appservice.WindowsFunctionAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-windows-function-app-slot\"),\n\t\t\tFunctionAppId: exampleWindowsFunctionApp.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewFunctionAppActiveSlot(ctx, \"example\", \u0026appservice.FunctionAppActiveSlotArgs{\n\t\t\tSlotId: exampleWindowsFunctionAppSlot.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionApp;\nimport com.pulumi.azure.appservice.WindowsFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionAppSlot;\nimport com.pulumi.azure.appservice.WindowsFunctionAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSlotSiteConfigArgs;\nimport com.pulumi.azure.appservice.FunctionAppActiveSlot;\nimport com.pulumi.azure.appservice.FunctionAppActiveSlotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"windowsfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"Y1\")\n .build());\n\n var exampleWindowsFunctionApp = new WindowsFunctionApp(\"exampleWindowsFunctionApp\", WindowsFunctionAppArgs.builder()\n .name(\"example-windows-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageAccountName(exampleAccount.name())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsFunctionAppSlot = new WindowsFunctionAppSlot(\"exampleWindowsFunctionAppSlot\", WindowsFunctionAppSlotArgs.builder()\n .name(\"example-windows-function-app-slot\")\n .functionAppId(exampleWindowsFunctionApp.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n var exampleFunctionAppActiveSlot = new FunctionAppActiveSlot(\"exampleFunctionAppActiveSlot\", FunctionAppActiveSlotArgs.builder()\n .slotId(exampleWindowsFunctionAppSlot.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: windowsfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: Y1\n exampleWindowsFunctionApp:\n type: azure:appservice:WindowsFunctionApp\n name: example\n properties:\n name: example-windows-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageAccountName: ${exampleAccount.name}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsFunctionAppSlot:\n type: azure:appservice:WindowsFunctionAppSlot\n name: example\n properties:\n name: example-windows-function-app-slot\n functionAppId: ${exampleWindowsFunctionApp.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n exampleFunctionAppActiveSlot:\n type: azure:appservice:FunctionAppActiveSlot\n name: example\n properties:\n slotId: ${exampleWindowsFunctionAppSlot.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Linux Function App\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"linuxfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"Y1\",\n});\nconst exampleLinuxFunctionApp = new azure.appservice.LinuxFunctionApp(\"example\", {\n name: \"example-linux-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n servicePlanId: exampleServicePlan.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\nconst exampleLinuxFunctionAppSlot = new azure.appservice.LinuxFunctionAppSlot(\"example\", {\n name: \"example-linux-function-app-slot\",\n functionAppId: exampleLinuxFunctionApp.name,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\nconst exampleFunctionAppActiveSlot = new azure.appservice.FunctionAppActiveSlot(\"example\", {slotId: exampleLinuxFunctionAppSlot.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"linuxfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"Y1\")\nexample_linux_function_app = azure.appservice.LinuxFunctionApp(\"example\",\n name=\"example-linux-function-app\",\n resource_group_name=example.name,\n location=example.location,\n service_plan_id=example_service_plan.id,\n storage_account_name=example_account.name,\n site_config={})\nexample_linux_function_app_slot = azure.appservice.LinuxFunctionAppSlot(\"example\",\n name=\"example-linux-function-app-slot\",\n function_app_id=example_linux_function_app.name,\n storage_account_name=example_account.name,\n site_config={})\nexample_function_app_active_slot = azure.appservice.FunctionAppActiveSlot(\"example\", slot_id=example_linux_function_app_slot.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"linuxfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"Y1\",\n });\n\n var exampleLinuxFunctionApp = new Azure.AppService.LinuxFunctionApp(\"example\", new()\n {\n Name = \"example-linux-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n ServicePlanId = exampleServicePlan.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n var exampleLinuxFunctionAppSlot = new Azure.AppService.LinuxFunctionAppSlot(\"example\", new()\n {\n Name = \"example-linux-function-app-slot\",\n FunctionAppId = exampleLinuxFunctionApp.Name,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n var exampleFunctionAppActiveSlot = new Azure.AppService.FunctionAppActiveSlot(\"example\", new()\n {\n SlotId = exampleLinuxFunctionAppSlot.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"linuxfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxFunctionApp, err := appservice.NewLinuxFunctionApp(ctx, \"example\", \u0026appservice.LinuxFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxFunctionAppSlot, err := appservice.NewLinuxFunctionAppSlot(ctx, \"example\", \u0026appservice.LinuxFunctionAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app-slot\"),\n\t\t\tFunctionAppId: exampleLinuxFunctionApp.Name,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewFunctionAppActiveSlot(ctx, \"example\", \u0026appservice.FunctionAppActiveSlotArgs{\n\t\t\tSlotId: exampleLinuxFunctionAppSlot.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionApp;\nimport com.pulumi.azure.appservice.LinuxFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionAppSlot;\nimport com.pulumi.azure.appservice.LinuxFunctionAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSlotSiteConfigArgs;\nimport com.pulumi.azure.appservice.FunctionAppActiveSlot;\nimport com.pulumi.azure.appservice.FunctionAppActiveSlotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"linuxfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"Y1\")\n .build());\n\n var exampleLinuxFunctionApp = new LinuxFunctionApp(\"exampleLinuxFunctionApp\", LinuxFunctionAppArgs.builder()\n .name(\"example-linux-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .servicePlanId(exampleServicePlan.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n var exampleLinuxFunctionAppSlot = new LinuxFunctionAppSlot(\"exampleLinuxFunctionAppSlot\", LinuxFunctionAppSlotArgs.builder()\n .name(\"example-linux-function-app-slot\")\n .functionAppId(exampleLinuxFunctionApp.name())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n var exampleFunctionAppActiveSlot = new FunctionAppActiveSlot(\"exampleFunctionAppActiveSlot\", FunctionAppActiveSlotArgs.builder()\n .slotId(exampleLinuxFunctionAppSlot.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: linuxfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: Y1\n exampleLinuxFunctionApp:\n type: azure:appservice:LinuxFunctionApp\n name: example\n properties:\n name: example-linux-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n servicePlanId: ${exampleServicePlan.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n exampleLinuxFunctionAppSlot:\n type: azure:appservice:LinuxFunctionAppSlot\n name: example\n properties:\n name: example-linux-function-app-slot\n functionAppId: ${exampleLinuxFunctionApp.name}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n exampleFunctionAppActiveSlot:\n type: azure:appservice:FunctionAppActiveSlot\n name: example\n properties:\n slotId: ${exampleLinuxFunctionAppSlot.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\na Function App Active Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/functionAppActiveSlot:FunctionAppActiveSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\"\n```\n\n", + "description": "Manages a Function App Active Slot.\n\n## Example Usage\n\n### Windows Function App\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"windowsfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"Y1\",\n});\nconst exampleWindowsFunctionApp = new azure.appservice.WindowsFunctionApp(\"example\", {\n name: \"example-windows-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n storageAccountName: exampleAccount.name,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsFunctionAppSlot = new azure.appservice.WindowsFunctionAppSlot(\"example\", {\n name: \"example-windows-function-app-slot\",\n functionAppId: exampleWindowsFunctionApp.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\nconst exampleFunctionAppActiveSlot = new azure.appservice.FunctionAppActiveSlot(\"example\", {slotId: exampleWindowsFunctionAppSlot.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"windowsfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"Y1\")\nexample_windows_function_app = azure.appservice.WindowsFunctionApp(\"example\",\n name=\"example-windows-function-app\",\n resource_group_name=example.name,\n location=example.location,\n storage_account_name=example_account.name,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_function_app_slot = azure.appservice.WindowsFunctionAppSlot(\"example\",\n name=\"example-windows-function-app-slot\",\n function_app_id=example_windows_function_app.id,\n storage_account_name=example_account.name,\n site_config={})\nexample_function_app_active_slot = azure.appservice.FunctionAppActiveSlot(\"example\", slot_id=example_windows_function_app_slot.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"windowsfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"Y1\",\n });\n\n var exampleWindowsFunctionApp = new Azure.AppService.WindowsFunctionApp(\"example\", new()\n {\n Name = \"example-windows-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageAccountName = exampleAccount.Name,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsFunctionAppSlot = new Azure.AppService.WindowsFunctionAppSlot(\"example\", new()\n {\n Name = \"example-windows-function-app-slot\",\n FunctionAppId = exampleWindowsFunctionApp.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n var exampleFunctionAppActiveSlot = new Azure.AppService.FunctionAppActiveSlot(\"example\", new()\n {\n SlotId = exampleWindowsFunctionAppSlot.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"windowsfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsFunctionApp, err := appservice.NewWindowsFunctionApp(ctx, \"example\", \u0026appservice.WindowsFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsFunctionAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsFunctionAppSlot, err := appservice.NewWindowsFunctionAppSlot(ctx, \"example\", \u0026appservice.WindowsFunctionAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-windows-function-app-slot\"),\n\t\t\tFunctionAppId: exampleWindowsFunctionApp.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: \u0026appservice.WindowsFunctionAppSlotSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewFunctionAppActiveSlot(ctx, \"example\", \u0026appservice.FunctionAppActiveSlotArgs{\n\t\t\tSlotId: exampleWindowsFunctionAppSlot.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionApp;\nimport com.pulumi.azure.appservice.WindowsFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionAppSlot;\nimport com.pulumi.azure.appservice.WindowsFunctionAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSlotSiteConfigArgs;\nimport com.pulumi.azure.appservice.FunctionAppActiveSlot;\nimport com.pulumi.azure.appservice.FunctionAppActiveSlotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"windowsfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"Y1\")\n .build());\n\n var exampleWindowsFunctionApp = new WindowsFunctionApp(\"exampleWindowsFunctionApp\", WindowsFunctionAppArgs.builder()\n .name(\"example-windows-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageAccountName(exampleAccount.name())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsFunctionAppSlot = new WindowsFunctionAppSlot(\"exampleWindowsFunctionAppSlot\", WindowsFunctionAppSlotArgs.builder()\n .name(\"example-windows-function-app-slot\")\n .functionAppId(exampleWindowsFunctionApp.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n var exampleFunctionAppActiveSlot = new FunctionAppActiveSlot(\"exampleFunctionAppActiveSlot\", FunctionAppActiveSlotArgs.builder()\n .slotId(exampleWindowsFunctionAppSlot.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: windowsfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: Y1\n exampleWindowsFunctionApp:\n type: azure:appservice:WindowsFunctionApp\n name: example\n properties:\n name: example-windows-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageAccountName: ${exampleAccount.name}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsFunctionAppSlot:\n type: azure:appservice:WindowsFunctionAppSlot\n name: example\n properties:\n name: example-windows-function-app-slot\n functionAppId: ${exampleWindowsFunctionApp.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n exampleFunctionAppActiveSlot:\n type: azure:appservice:FunctionAppActiveSlot\n name: example\n properties:\n slotId: ${exampleWindowsFunctionAppSlot.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Linux Function App\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"linuxfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"Y1\",\n});\nconst exampleLinuxFunctionApp = new azure.appservice.LinuxFunctionApp(\"example\", {\n name: \"example-linux-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n servicePlanId: exampleServicePlan.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\nconst exampleLinuxFunctionAppSlot = new azure.appservice.LinuxFunctionAppSlot(\"example\", {\n name: \"example-linux-function-app-slot\",\n functionAppId: exampleLinuxFunctionApp.name,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\nconst exampleFunctionAppActiveSlot = new azure.appservice.FunctionAppActiveSlot(\"example\", {slotId: exampleLinuxFunctionAppSlot.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"linuxfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"Y1\")\nexample_linux_function_app = azure.appservice.LinuxFunctionApp(\"example\",\n name=\"example-linux-function-app\",\n resource_group_name=example.name,\n location=example.location,\n service_plan_id=example_service_plan.id,\n storage_account_name=example_account.name,\n site_config={})\nexample_linux_function_app_slot = azure.appservice.LinuxFunctionAppSlot(\"example\",\n name=\"example-linux-function-app-slot\",\n function_app_id=example_linux_function_app.name,\n storage_account_name=example_account.name,\n site_config={})\nexample_function_app_active_slot = azure.appservice.FunctionAppActiveSlot(\"example\", slot_id=example_linux_function_app_slot.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"linuxfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"Y1\",\n });\n\n var exampleLinuxFunctionApp = new Azure.AppService.LinuxFunctionApp(\"example\", new()\n {\n Name = \"example-linux-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n ServicePlanId = exampleServicePlan.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n var exampleLinuxFunctionAppSlot = new Azure.AppService.LinuxFunctionAppSlot(\"example\", new()\n {\n Name = \"example-linux-function-app-slot\",\n FunctionAppId = exampleLinuxFunctionApp.Name,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n var exampleFunctionAppActiveSlot = new Azure.AppService.FunctionAppActiveSlot(\"example\", new()\n {\n SlotId = exampleLinuxFunctionAppSlot.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"linuxfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxFunctionApp, err := appservice.NewLinuxFunctionApp(ctx, \"example\", \u0026appservice.LinuxFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: \u0026appservice.LinuxFunctionAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxFunctionAppSlot, err := appservice.NewLinuxFunctionAppSlot(ctx, \"example\", \u0026appservice.LinuxFunctionAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app-slot\"),\n\t\t\tFunctionAppId: exampleLinuxFunctionApp.Name,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: \u0026appservice.LinuxFunctionAppSlotSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewFunctionAppActiveSlot(ctx, \"example\", \u0026appservice.FunctionAppActiveSlotArgs{\n\t\t\tSlotId: exampleLinuxFunctionAppSlot.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionApp;\nimport com.pulumi.azure.appservice.LinuxFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionAppSlot;\nimport com.pulumi.azure.appservice.LinuxFunctionAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSlotSiteConfigArgs;\nimport com.pulumi.azure.appservice.FunctionAppActiveSlot;\nimport com.pulumi.azure.appservice.FunctionAppActiveSlotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"linuxfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"Y1\")\n .build());\n\n var exampleLinuxFunctionApp = new LinuxFunctionApp(\"exampleLinuxFunctionApp\", LinuxFunctionAppArgs.builder()\n .name(\"example-linux-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .servicePlanId(exampleServicePlan.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n var exampleLinuxFunctionAppSlot = new LinuxFunctionAppSlot(\"exampleLinuxFunctionAppSlot\", LinuxFunctionAppSlotArgs.builder()\n .name(\"example-linux-function-app-slot\")\n .functionAppId(exampleLinuxFunctionApp.name())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n var exampleFunctionAppActiveSlot = new FunctionAppActiveSlot(\"exampleFunctionAppActiveSlot\", FunctionAppActiveSlotArgs.builder()\n .slotId(exampleLinuxFunctionAppSlot.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: linuxfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: Y1\n exampleLinuxFunctionApp:\n type: azure:appservice:LinuxFunctionApp\n name: example\n properties:\n name: example-linux-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n servicePlanId: ${exampleServicePlan.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n exampleLinuxFunctionAppSlot:\n type: azure:appservice:LinuxFunctionAppSlot\n name: example\n properties:\n name: example-linux-function-app-slot\n functionAppId: ${exampleLinuxFunctionApp.name}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n exampleFunctionAppActiveSlot:\n type: azure:appservice:FunctionAppActiveSlot\n name: example\n properties:\n slotId: ${exampleLinuxFunctionAppSlot.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\na Function App Active Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/functionAppActiveSlot:FunctionAppActiveSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\"\n```\n\n", "properties": { "lastSuccessfulSwap": { "type": "string", @@ -117338,7 +117338,7 @@ } }, "azure:appservice/functionAppHybridConnection:FunctionAppHybridConnection": { - "description": "Manages a Function App Hybrid Connection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n location: example.location,\n resourceGroupName: example.name,\n osType: \"Windows\",\n skuName: \"S1\",\n});\nconst exampleNamespace = new azure.relay.Namespace(\"example\", {\n name: \"example-relay\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"Standard\",\n});\nconst exampleHybridConnection = new azure.relay.HybridConnection(\"example\", {\n name: \"examplerhc1\",\n resourceGroupName: example.name,\n relayNamespaceName: exampleNamespace.name,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsFunctionApp = new azure.appservice.WindowsFunctionApp(\"example\", {\n name: \"example-function-app\",\n location: example.location,\n resourceGroupName: example.name,\n servicePlanId: exampleServicePlan.id,\n storageAccountName: exampleAccount.name,\n storageAccountAccessKey: exampleAccount.primaryAccessKey,\n siteConfig: {},\n});\nconst exampleFunctionAppHybridConnection = new azure.appservice.FunctionAppHybridConnection(\"example\", {\n functionAppId: exampleWindowsWebApp.id,\n relayId: exampleHybridConnection.id,\n hostname: \"myhostname.example\",\n port: 8081,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n location=example.location,\n resource_group_name=example.name,\n os_type=\"Windows\",\n sku_name=\"S1\")\nexample_namespace = azure.relay.Namespace(\"example\",\n name=\"example-relay\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"Standard\")\nexample_hybrid_connection = azure.relay.HybridConnection(\"example\",\n name=\"examplerhc1\",\n resource_group_name=example.name,\n relay_namespace_name=example_namespace.name)\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_function_app = azure.appservice.WindowsFunctionApp(\"example\",\n name=\"example-function-app\",\n location=example.location,\n resource_group_name=example.name,\n service_plan_id=example_service_plan.id,\n storage_account_name=example_account.name,\n storage_account_access_key=example_account.primary_access_key,\n site_config={})\nexample_function_app_hybrid_connection = azure.appservice.FunctionAppHybridConnection(\"example\",\n function_app_id=example_windows_web_app.id,\n relay_id=example_hybrid_connection.id,\n hostname=\"myhostname.example\",\n port=8081)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OsType = \"Windows\",\n SkuName = \"S1\",\n });\n\n var exampleNamespace = new Azure.Relay.Namespace(\"example\", new()\n {\n Name = \"example-relay\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"Standard\",\n });\n\n var exampleHybridConnection = new Azure.Relay.HybridConnection(\"example\", new()\n {\n Name = \"examplerhc1\",\n ResourceGroupName = example.Name,\n RelayNamespaceName = exampleNamespace.Name,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsFunctionApp = new Azure.AppService.WindowsFunctionApp(\"example\", new()\n {\n Name = \"example-function-app\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ServicePlanId = exampleServicePlan.Id,\n StorageAccountName = exampleAccount.Name,\n StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,\n SiteConfig = null,\n });\n\n var exampleFunctionAppHybridConnection = new Azure.AppService.FunctionAppHybridConnection(\"example\", new()\n {\n FunctionAppId = exampleWindowsWebApp.Id,\n RelayId = exampleHybridConnection.Id,\n Hostname = \"myhostname.example\",\n Port = 8081,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/relay\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"S1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNamespace, err := relay.NewNamespace(ctx, \"example\", \u0026relay.NamespaceArgs{\n\t\t\tName: pulumi.String(\"example-relay\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleHybridConnection, err := relay.NewHybridConnection(ctx, \"example\", \u0026relay.HybridConnectionArgs{\n\t\t\tName: pulumi.String(\"examplerhc1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tRelayNamespaceName: exampleNamespace.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebApp, err := appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsFunctionApp(ctx, \"example\", \u0026appservice.WindowsFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-function-app\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tStorageAccountAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewFunctionAppHybridConnection(ctx, \"example\", \u0026appservice.FunctionAppHybridConnectionArgs{\n\t\t\tFunctionAppId: exampleWindowsWebApp.ID(),\n\t\t\tRelayId: exampleHybridConnection.ID(),\n\t\t\tHostname: pulumi.String(\"myhostname.example\"),\n\t\t\tPort: pulumi.Int(8081),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.relay.Namespace;\nimport com.pulumi.azure.relay.NamespaceArgs;\nimport com.pulumi.azure.relay.HybridConnection;\nimport com.pulumi.azure.relay.HybridConnectionArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionApp;\nimport com.pulumi.azure.appservice.WindowsFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.FunctionAppHybridConnection;\nimport com.pulumi.azure.appservice.FunctionAppHybridConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .location(example.location())\n .resourceGroupName(example.name())\n .osType(\"Windows\")\n .skuName(\"S1\")\n .build());\n\n var exampleNamespace = new Namespace(\"exampleNamespace\", NamespaceArgs.builder()\n .name(\"example-relay\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"Standard\")\n .build());\n\n var exampleHybridConnection = new HybridConnection(\"exampleHybridConnection\", HybridConnectionArgs.builder()\n .name(\"examplerhc1\")\n .resourceGroupName(example.name())\n .relayNamespaceName(exampleNamespace.name())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsFunctionApp = new WindowsFunctionApp(\"exampleWindowsFunctionApp\", WindowsFunctionAppArgs.builder()\n .name(\"example-function-app\")\n .location(example.location())\n .resourceGroupName(example.name())\n .servicePlanId(exampleServicePlan.id())\n .storageAccountName(exampleAccount.name())\n .storageAccountAccessKey(exampleAccount.primaryAccessKey())\n .siteConfig()\n .build());\n\n var exampleFunctionAppHybridConnection = new FunctionAppHybridConnection(\"exampleFunctionAppHybridConnection\", FunctionAppHybridConnectionArgs.builder()\n .functionAppId(exampleWindowsWebApp.id())\n .relayId(exampleHybridConnection.id())\n .hostname(\"myhostname.example\")\n .port(8081)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n location: ${example.location}\n resourceGroupName: ${example.name}\n osType: Windows\n skuName: S1\n exampleNamespace:\n type: azure:relay:Namespace\n name: example\n properties:\n name: example-relay\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: Standard\n exampleHybridConnection:\n type: azure:relay:HybridConnection\n name: example\n properties:\n name: examplerhc1\n resourceGroupName: ${example.name}\n relayNamespaceName: ${exampleNamespace.name}\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: GRS\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsFunctionApp:\n type: azure:appservice:WindowsFunctionApp\n name: example\n properties:\n name: example-function-app\n location: ${example.location}\n resourceGroupName: ${example.name}\n servicePlanId: ${exampleServicePlan.id}\n storageAccountName: ${exampleAccount.name}\n storageAccountAccessKey: ${exampleAccount.primaryAccessKey}\n siteConfig: {}\n exampleFunctionAppHybridConnection:\n type: azure:appservice:FunctionAppHybridConnection\n name: example\n properties:\n functionAppId: ${exampleWindowsWebApp.id}\n relayId: ${exampleHybridConnection.id}\n hostname: myhostname.example\n port: 8081\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\na Function App Hybrid Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/functionAppHybridConnection:FunctionAppHybridConnection example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/hybridConnectionNamespaces/hybridConnectionNamespace1/relays/relay1\"\n```\n\n", + "description": "Manages a Function App Hybrid Connection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n location: example.location,\n resourceGroupName: example.name,\n osType: \"Windows\",\n skuName: \"S1\",\n});\nconst exampleNamespace = new azure.relay.Namespace(\"example\", {\n name: \"example-relay\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"Standard\",\n});\nconst exampleHybridConnection = new azure.relay.HybridConnection(\"example\", {\n name: \"examplerhc1\",\n resourceGroupName: example.name,\n relayNamespaceName: exampleNamespace.name,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsFunctionApp = new azure.appservice.WindowsFunctionApp(\"example\", {\n name: \"example-function-app\",\n location: example.location,\n resourceGroupName: example.name,\n servicePlanId: exampleServicePlan.id,\n storageAccountName: exampleAccount.name,\n storageAccountAccessKey: exampleAccount.primaryAccessKey,\n siteConfig: {},\n});\nconst exampleFunctionAppHybridConnection = new azure.appservice.FunctionAppHybridConnection(\"example\", {\n functionAppId: exampleWindowsWebApp.id,\n relayId: exampleHybridConnection.id,\n hostname: \"myhostname.example\",\n port: 8081,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n location=example.location,\n resource_group_name=example.name,\n os_type=\"Windows\",\n sku_name=\"S1\")\nexample_namespace = azure.relay.Namespace(\"example\",\n name=\"example-relay\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"Standard\")\nexample_hybrid_connection = azure.relay.HybridConnection(\"example\",\n name=\"examplerhc1\",\n resource_group_name=example.name,\n relay_namespace_name=example_namespace.name)\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_function_app = azure.appservice.WindowsFunctionApp(\"example\",\n name=\"example-function-app\",\n location=example.location,\n resource_group_name=example.name,\n service_plan_id=example_service_plan.id,\n storage_account_name=example_account.name,\n storage_account_access_key=example_account.primary_access_key,\n site_config={})\nexample_function_app_hybrid_connection = azure.appservice.FunctionAppHybridConnection(\"example\",\n function_app_id=example_windows_web_app.id,\n relay_id=example_hybrid_connection.id,\n hostname=\"myhostname.example\",\n port=8081)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OsType = \"Windows\",\n SkuName = \"S1\",\n });\n\n var exampleNamespace = new Azure.Relay.Namespace(\"example\", new()\n {\n Name = \"example-relay\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"Standard\",\n });\n\n var exampleHybridConnection = new Azure.Relay.HybridConnection(\"example\", new()\n {\n Name = \"examplerhc1\",\n ResourceGroupName = example.Name,\n RelayNamespaceName = exampleNamespace.Name,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsFunctionApp = new Azure.AppService.WindowsFunctionApp(\"example\", new()\n {\n Name = \"example-function-app\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ServicePlanId = exampleServicePlan.Id,\n StorageAccountName = exampleAccount.Name,\n StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,\n SiteConfig = null,\n });\n\n var exampleFunctionAppHybridConnection = new Azure.AppService.FunctionAppHybridConnection(\"example\", new()\n {\n FunctionAppId = exampleWindowsWebApp.Id,\n RelayId = exampleHybridConnection.Id,\n Hostname = \"myhostname.example\",\n Port = 8081,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/relay\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"S1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNamespace, err := relay.NewNamespace(ctx, \"example\", \u0026relay.NamespaceArgs{\n\t\t\tName: pulumi.String(\"example-relay\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleHybridConnection, err := relay.NewHybridConnection(ctx, \"example\", \u0026relay.HybridConnectionArgs{\n\t\t\tName: pulumi.String(\"examplerhc1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tRelayNamespaceName: exampleNamespace.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebApp, err := appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsFunctionApp(ctx, \"example\", \u0026appservice.WindowsFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-function-app\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tStorageAccountAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t\tSiteConfig: \u0026appservice.WindowsFunctionAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewFunctionAppHybridConnection(ctx, \"example\", \u0026appservice.FunctionAppHybridConnectionArgs{\n\t\t\tFunctionAppId: exampleWindowsWebApp.ID(),\n\t\t\tRelayId: exampleHybridConnection.ID(),\n\t\t\tHostname: pulumi.String(\"myhostname.example\"),\n\t\t\tPort: pulumi.Int(8081),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.relay.Namespace;\nimport com.pulumi.azure.relay.NamespaceArgs;\nimport com.pulumi.azure.relay.HybridConnection;\nimport com.pulumi.azure.relay.HybridConnectionArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionApp;\nimport com.pulumi.azure.appservice.WindowsFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.FunctionAppHybridConnection;\nimport com.pulumi.azure.appservice.FunctionAppHybridConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .location(example.location())\n .resourceGroupName(example.name())\n .osType(\"Windows\")\n .skuName(\"S1\")\n .build());\n\n var exampleNamespace = new Namespace(\"exampleNamespace\", NamespaceArgs.builder()\n .name(\"example-relay\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"Standard\")\n .build());\n\n var exampleHybridConnection = new HybridConnection(\"exampleHybridConnection\", HybridConnectionArgs.builder()\n .name(\"examplerhc1\")\n .resourceGroupName(example.name())\n .relayNamespaceName(exampleNamespace.name())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsFunctionApp = new WindowsFunctionApp(\"exampleWindowsFunctionApp\", WindowsFunctionAppArgs.builder()\n .name(\"example-function-app\")\n .location(example.location())\n .resourceGroupName(example.name())\n .servicePlanId(exampleServicePlan.id())\n .storageAccountName(exampleAccount.name())\n .storageAccountAccessKey(exampleAccount.primaryAccessKey())\n .siteConfig()\n .build());\n\n var exampleFunctionAppHybridConnection = new FunctionAppHybridConnection(\"exampleFunctionAppHybridConnection\", FunctionAppHybridConnectionArgs.builder()\n .functionAppId(exampleWindowsWebApp.id())\n .relayId(exampleHybridConnection.id())\n .hostname(\"myhostname.example\")\n .port(8081)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n location: ${example.location}\n resourceGroupName: ${example.name}\n osType: Windows\n skuName: S1\n exampleNamespace:\n type: azure:relay:Namespace\n name: example\n properties:\n name: example-relay\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: Standard\n exampleHybridConnection:\n type: azure:relay:HybridConnection\n name: example\n properties:\n name: examplerhc1\n resourceGroupName: ${example.name}\n relayNamespaceName: ${exampleNamespace.name}\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: GRS\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsFunctionApp:\n type: azure:appservice:WindowsFunctionApp\n name: example\n properties:\n name: example-function-app\n location: ${example.location}\n resourceGroupName: ${example.name}\n servicePlanId: ${exampleServicePlan.id}\n storageAccountName: ${exampleAccount.name}\n storageAccountAccessKey: ${exampleAccount.primaryAccessKey}\n siteConfig: {}\n exampleFunctionAppHybridConnection:\n type: azure:appservice:FunctionAppHybridConnection\n name: example\n properties:\n functionAppId: ${exampleWindowsWebApp.id}\n relayId: ${exampleHybridConnection.id}\n hostname: myhostname.example\n port: 8081\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\na Function App Hybrid Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/functionAppHybridConnection:FunctionAppHybridConnection example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/hybridConnectionNamespaces/hybridConnectionNamespace1/relays/relay1\"\n```\n\n", "properties": { "functionAppId": { "type": "string", @@ -117980,7 +117980,7 @@ } }, "azure:appservice/linuxFunctionApp:LinuxFunctionApp": { - "description": "Manages a Linux Function App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"linuxfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"Y1\",\n});\nconst exampleLinuxFunctionApp = new azure.appservice.LinuxFunctionApp(\"example\", {\n name: \"example-linux-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n storageAccountName: exampleAccount.name,\n storageAccountAccessKey: exampleAccount.primaryAccessKey,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"linuxfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"Y1\")\nexample_linux_function_app = azure.appservice.LinuxFunctionApp(\"example\",\n name=\"example-linux-function-app\",\n resource_group_name=example.name,\n location=example.location,\n storage_account_name=example_account.name,\n storage_account_access_key=example_account.primary_access_key,\n service_plan_id=example_service_plan.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"linuxfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"Y1\",\n });\n\n var exampleLinuxFunctionApp = new Azure.AppService.LinuxFunctionApp(\"example\", new()\n {\n Name = \"example-linux-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageAccountName = exampleAccount.Name,\n StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"linuxfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewLinuxFunctionApp(ctx, \"example\", \u0026appservice.LinuxFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tStorageAccountAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionApp;\nimport com.pulumi.azure.appservice.LinuxFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"linuxfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"Y1\")\n .build());\n\n var exampleLinuxFunctionApp = new LinuxFunctionApp(\"exampleLinuxFunctionApp\", LinuxFunctionAppArgs.builder()\n .name(\"example-linux-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageAccountName(exampleAccount.name())\n .storageAccountAccessKey(exampleAccount.primaryAccessKey())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: linuxfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: Y1\n exampleLinuxFunctionApp:\n type: azure:appservice:LinuxFunctionApp\n name: example\n properties:\n name: example-linux-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageAccountName: ${exampleAccount.name}\n storageAccountAccessKey: ${exampleAccount.primaryAccessKey}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLinux Function Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/linuxFunctionApp:LinuxFunctionApp example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", + "description": "Manages a Linux Function App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"linuxfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"Y1\",\n});\nconst exampleLinuxFunctionApp = new azure.appservice.LinuxFunctionApp(\"example\", {\n name: \"example-linux-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n storageAccountName: exampleAccount.name,\n storageAccountAccessKey: exampleAccount.primaryAccessKey,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"linuxfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"Y1\")\nexample_linux_function_app = azure.appservice.LinuxFunctionApp(\"example\",\n name=\"example-linux-function-app\",\n resource_group_name=example.name,\n location=example.location,\n storage_account_name=example_account.name,\n storage_account_access_key=example_account.primary_access_key,\n service_plan_id=example_service_plan.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"linuxfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"Y1\",\n });\n\n var exampleLinuxFunctionApp = new Azure.AppService.LinuxFunctionApp(\"example\", new()\n {\n Name = \"example-linux-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageAccountName = exampleAccount.Name,\n StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"linuxfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewLinuxFunctionApp(ctx, \"example\", \u0026appservice.LinuxFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tStorageAccountAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.LinuxFunctionAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionApp;\nimport com.pulumi.azure.appservice.LinuxFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"linuxfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"Y1\")\n .build());\n\n var exampleLinuxFunctionApp = new LinuxFunctionApp(\"exampleLinuxFunctionApp\", LinuxFunctionAppArgs.builder()\n .name(\"example-linux-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageAccountName(exampleAccount.name())\n .storageAccountAccessKey(exampleAccount.primaryAccessKey())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: linuxfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: Y1\n exampleLinuxFunctionApp:\n type: azure:appservice:LinuxFunctionApp\n name: example\n properties:\n name: example-linux-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageAccountName: ${exampleAccount.name}\n storageAccountAccessKey: ${exampleAccount.primaryAccessKey}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLinux Function Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/linuxFunctionApp:LinuxFunctionApp example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", "properties": { "appSettings": { "type": "object", @@ -118560,7 +118560,7 @@ } }, "azure:appservice/linuxFunctionAppSlot:LinuxFunctionAppSlot": { - "description": "Manages a Linux Function App Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"linuxfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"Y1\",\n});\nconst exampleLinuxFunctionApp = new azure.appservice.LinuxFunctionApp(\"example\", {\n name: \"example-linux-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n servicePlanId: exampleServicePlan.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\nconst exampleLinuxFunctionAppSlot = new azure.appservice.LinuxFunctionAppSlot(\"example\", {\n name: \"example-linux-function-app-slot\",\n functionAppId: exampleLinuxFunctionApp.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"linuxfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"Y1\")\nexample_linux_function_app = azure.appservice.LinuxFunctionApp(\"example\",\n name=\"example-linux-function-app\",\n resource_group_name=example.name,\n location=example.location,\n service_plan_id=example_service_plan.id,\n storage_account_name=example_account.name,\n site_config={})\nexample_linux_function_app_slot = azure.appservice.LinuxFunctionAppSlot(\"example\",\n name=\"example-linux-function-app-slot\",\n function_app_id=example_linux_function_app.id,\n storage_account_name=example_account.name,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"linuxfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"Y1\",\n });\n\n var exampleLinuxFunctionApp = new Azure.AppService.LinuxFunctionApp(\"example\", new()\n {\n Name = \"example-linux-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n ServicePlanId = exampleServicePlan.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n var exampleLinuxFunctionAppSlot = new Azure.AppService.LinuxFunctionAppSlot(\"example\", new()\n {\n Name = \"example-linux-function-app-slot\",\n FunctionAppId = exampleLinuxFunctionApp.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"linuxfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxFunctionApp, err := appservice.NewLinuxFunctionApp(ctx, \"example\", \u0026appservice.LinuxFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewLinuxFunctionAppSlot(ctx, \"example\", \u0026appservice.LinuxFunctionAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app-slot\"),\n\t\t\tFunctionAppId: exampleLinuxFunctionApp.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionApp;\nimport com.pulumi.azure.appservice.LinuxFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionAppSlot;\nimport com.pulumi.azure.appservice.LinuxFunctionAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSlotSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"linuxfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"Y1\")\n .build());\n\n var exampleLinuxFunctionApp = new LinuxFunctionApp(\"exampleLinuxFunctionApp\", LinuxFunctionAppArgs.builder()\n .name(\"example-linux-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .servicePlanId(exampleServicePlan.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n var exampleLinuxFunctionAppSlot = new LinuxFunctionAppSlot(\"exampleLinuxFunctionAppSlot\", LinuxFunctionAppSlotArgs.builder()\n .name(\"example-linux-function-app-slot\")\n .functionAppId(exampleLinuxFunctionApp.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: linuxfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: Y1\n exampleLinuxFunctionApp:\n type: azure:appservice:LinuxFunctionApp\n name: example\n properties:\n name: example-linux-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n servicePlanId: ${exampleServicePlan.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n exampleLinuxFunctionAppSlot:\n type: azure:appservice:LinuxFunctionAppSlot\n name: example\n properties:\n name: example-linux-function-app-slot\n functionAppId: ${exampleLinuxFunctionApp.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Linux Function App Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/linuxFunctionAppSlot:LinuxFunctionAppSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\"\n```\n\n", + "description": "Manages a Linux Function App Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"linuxfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"Y1\",\n});\nconst exampleLinuxFunctionApp = new azure.appservice.LinuxFunctionApp(\"example\", {\n name: \"example-linux-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n servicePlanId: exampleServicePlan.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\nconst exampleLinuxFunctionAppSlot = new azure.appservice.LinuxFunctionAppSlot(\"example\", {\n name: \"example-linux-function-app-slot\",\n functionAppId: exampleLinuxFunctionApp.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"linuxfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"Y1\")\nexample_linux_function_app = azure.appservice.LinuxFunctionApp(\"example\",\n name=\"example-linux-function-app\",\n resource_group_name=example.name,\n location=example.location,\n service_plan_id=example_service_plan.id,\n storage_account_name=example_account.name,\n site_config={})\nexample_linux_function_app_slot = azure.appservice.LinuxFunctionAppSlot(\"example\",\n name=\"example-linux-function-app-slot\",\n function_app_id=example_linux_function_app.id,\n storage_account_name=example_account.name,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"linuxfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"Y1\",\n });\n\n var exampleLinuxFunctionApp = new Azure.AppService.LinuxFunctionApp(\"example\", new()\n {\n Name = \"example-linux-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n ServicePlanId = exampleServicePlan.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n var exampleLinuxFunctionAppSlot = new Azure.AppService.LinuxFunctionAppSlot(\"example\", new()\n {\n Name = \"example-linux-function-app-slot\",\n FunctionAppId = exampleLinuxFunctionApp.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"linuxfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxFunctionApp, err := appservice.NewLinuxFunctionApp(ctx, \"example\", \u0026appservice.LinuxFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: \u0026appservice.LinuxFunctionAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewLinuxFunctionAppSlot(ctx, \"example\", \u0026appservice.LinuxFunctionAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-linux-function-app-slot\"),\n\t\t\tFunctionAppId: exampleLinuxFunctionApp.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: \u0026appservice.LinuxFunctionAppSlotSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionApp;\nimport com.pulumi.azure.appservice.LinuxFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionAppSlot;\nimport com.pulumi.azure.appservice.LinuxFunctionAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSlotSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"linuxfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"Y1\")\n .build());\n\n var exampleLinuxFunctionApp = new LinuxFunctionApp(\"exampleLinuxFunctionApp\", LinuxFunctionAppArgs.builder()\n .name(\"example-linux-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .servicePlanId(exampleServicePlan.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n var exampleLinuxFunctionAppSlot = new LinuxFunctionAppSlot(\"exampleLinuxFunctionAppSlot\", LinuxFunctionAppSlotArgs.builder()\n .name(\"example-linux-function-app-slot\")\n .functionAppId(exampleLinuxFunctionApp.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: linuxfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: Y1\n exampleLinuxFunctionApp:\n type: azure:appservice:LinuxFunctionApp\n name: example\n properties:\n name: example-linux-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n servicePlanId: ${exampleServicePlan.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n exampleLinuxFunctionAppSlot:\n type: azure:appservice:LinuxFunctionAppSlot\n name: example\n properties:\n name: example-linux-function-app-slot\n functionAppId: ${exampleLinuxFunctionApp.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Linux Function App Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/linuxFunctionAppSlot:LinuxFunctionAppSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\"\n```\n\n", "properties": { "appSettings": { "type": "object", @@ -119098,7 +119098,7 @@ } }, "azure:appservice/linuxWebApp:LinuxWebApp": { - "description": "Manages a Linux Web App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"P1v2\",\n});\nconst exampleLinuxWebApp = new azure.appservice.LinuxWebApp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"P1v2\")\nexample_linux_web_app = azure.appservice.LinuxWebApp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"P1v2\",\n });\n\n var exampleLinuxWebApp = new Azure.AppService.LinuxWebApp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewLinuxWebApp(ctx, \"example\", \u0026appservice.LinuxWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxWebApp;\nimport com.pulumi.azure.appservice.LinuxWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleLinuxWebApp = new LinuxWebApp(\"exampleLinuxWebApp\", LinuxWebAppArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLinux Web Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/linuxWebApp:LinuxWebApp example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", + "description": "Manages a Linux Web App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"P1v2\",\n});\nconst exampleLinuxWebApp = new azure.appservice.LinuxWebApp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"P1v2\")\nexample_linux_web_app = azure.appservice.LinuxWebApp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"P1v2\",\n });\n\n var exampleLinuxWebApp = new Azure.AppService.LinuxWebApp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewLinuxWebApp(ctx, \"example\", \u0026appservice.LinuxWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.LinuxWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxWebApp;\nimport com.pulumi.azure.appservice.LinuxWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleLinuxWebApp = new LinuxWebApp(\"exampleLinuxWebApp\", LinuxWebAppArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLinux Web Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/linuxWebApp:LinuxWebApp example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", "properties": { "appSettings": { "type": "object", @@ -119588,7 +119588,7 @@ } }, "azure:appservice/linuxWebAppSlot:LinuxWebAppSlot": { - "description": "Manages a Linux Web App Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"P1v2\",\n});\nconst exampleLinuxWebApp = new azure.appservice.LinuxWebApp(\"example\", {\n name: \"example-linux-web-app\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleLinuxWebAppSlot = new azure.appservice.LinuxWebAppSlot(\"example\", {\n name: \"example-slot\",\n appServiceId: exampleLinuxWebApp.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"P1v2\")\nexample_linux_web_app = azure.appservice.LinuxWebApp(\"example\",\n name=\"example-linux-web-app\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_linux_web_app_slot = azure.appservice.LinuxWebAppSlot(\"example\",\n name=\"example-slot\",\n app_service_id=example_linux_web_app.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"P1v2\",\n });\n\n var exampleLinuxWebApp = new Azure.AppService.LinuxWebApp(\"example\", new()\n {\n Name = \"example-linux-web-app\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleLinuxWebAppSlot = new Azure.AppService.LinuxWebAppSlot(\"example\", new()\n {\n Name = \"example-slot\",\n AppServiceId = exampleLinuxWebApp.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxWebApp, err := appservice.NewLinuxWebApp(ctx, \"example\", \u0026appservice.LinuxWebAppArgs{\n\t\t\tName: pulumi.String(\"example-linux-web-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewLinuxWebAppSlot(ctx, \"example\", \u0026appservice.LinuxWebAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-slot\"),\n\t\t\tAppServiceId: exampleLinuxWebApp.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxWebApp;\nimport com.pulumi.azure.appservice.LinuxWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.LinuxWebAppSlot;\nimport com.pulumi.azure.appservice.LinuxWebAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSlotSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleLinuxWebApp = new LinuxWebApp(\"exampleLinuxWebApp\", LinuxWebAppArgs.builder()\n .name(\"example-linux-web-app\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleLinuxWebAppSlot = new LinuxWebAppSlot(\"exampleLinuxWebAppSlot\", LinuxWebAppSlotArgs.builder()\n .name(\"example-slot\")\n .appServiceId(exampleLinuxWebApp.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example-linux-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleLinuxWebAppSlot:\n type: azure:appservice:LinuxWebAppSlot\n name: example\n properties:\n name: example-slot\n appServiceId: ${exampleLinuxWebApp.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLinux Web Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/linuxWebAppSlot:LinuxWebAppSlot example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\n```\n\n", + "description": "Manages a Linux Web App Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"P1v2\",\n});\nconst exampleLinuxWebApp = new azure.appservice.LinuxWebApp(\"example\", {\n name: \"example-linux-web-app\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleLinuxWebAppSlot = new azure.appservice.LinuxWebAppSlot(\"example\", {\n name: \"example-slot\",\n appServiceId: exampleLinuxWebApp.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"P1v2\")\nexample_linux_web_app = azure.appservice.LinuxWebApp(\"example\",\n name=\"example-linux-web-app\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_linux_web_app_slot = azure.appservice.LinuxWebAppSlot(\"example\",\n name=\"example-slot\",\n app_service_id=example_linux_web_app.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"P1v2\",\n });\n\n var exampleLinuxWebApp = new Azure.AppService.LinuxWebApp(\"example\", new()\n {\n Name = \"example-linux-web-app\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleLinuxWebAppSlot = new Azure.AppService.LinuxWebAppSlot(\"example\", new()\n {\n Name = \"example-slot\",\n AppServiceId = exampleLinuxWebApp.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxWebApp, err := appservice.NewLinuxWebApp(ctx, \"example\", \u0026appservice.LinuxWebAppArgs{\n\t\t\tName: pulumi.String(\"example-linux-web-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.LinuxWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewLinuxWebAppSlot(ctx, \"example\", \u0026appservice.LinuxWebAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-slot\"),\n\t\t\tAppServiceId: exampleLinuxWebApp.ID(),\n\t\t\tSiteConfig: \u0026appservice.LinuxWebAppSlotSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxWebApp;\nimport com.pulumi.azure.appservice.LinuxWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.LinuxWebAppSlot;\nimport com.pulumi.azure.appservice.LinuxWebAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSlotSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleLinuxWebApp = new LinuxWebApp(\"exampleLinuxWebApp\", LinuxWebAppArgs.builder()\n .name(\"example-linux-web-app\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleLinuxWebAppSlot = new LinuxWebAppSlot(\"exampleLinuxWebAppSlot\", LinuxWebAppSlotArgs.builder()\n .name(\"example-slot\")\n .appServiceId(exampleLinuxWebApp.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example-linux-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleLinuxWebAppSlot:\n type: azure:appservice:LinuxWebAppSlot\n name: example\n properties:\n name: example-slot\n appServiceId: ${exampleLinuxWebApp.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLinux Web Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/linuxWebAppSlot:LinuxWebAppSlot example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\n```\n\n", "properties": { "appMetadata": { "type": "object", @@ -121233,7 +121233,7 @@ } }, "azure:appservice/sourceControl:SourceControl": { - "description": "Manages an App Service Web App or Function App Source Control Configuration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"P1v2\",\n});\nconst exampleLinuxWebApp = new azure.appservice.LinuxWebApp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleSourceControl = new azure.appservice.SourceControl(\"example\", {\n appId: exampleLinuxWebApp.id,\n repoUrl: \"https://github.com/Azure-Samples/python-docs-hello-world\",\n branch: \"master\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"P1v2\")\nexample_linux_web_app = azure.appservice.LinuxWebApp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_source_control = azure.appservice.SourceControl(\"example\",\n app_id=example_linux_web_app.id,\n repo_url=\"https://github.com/Azure-Samples/python-docs-hello-world\",\n branch=\"master\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"P1v2\",\n });\n\n var exampleLinuxWebApp = new Azure.AppService.LinuxWebApp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleSourceControl = new Azure.AppService.SourceControl(\"example\", new()\n {\n AppId = exampleLinuxWebApp.Id,\n RepoUrl = \"https://github.com/Azure-Samples/python-docs-hello-world\",\n Branch = \"master\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxWebApp, err := appservice.NewLinuxWebApp(ctx, \"example\", \u0026appservice.LinuxWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewSourceControl(ctx, \"example\", \u0026appservice.SourceControlArgs{\n\t\t\tAppId: exampleLinuxWebApp.ID(),\n\t\t\tRepoUrl: pulumi.String(\"https://github.com/Azure-Samples/python-docs-hello-world\"),\n\t\t\tBranch: pulumi.String(\"master\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxWebApp;\nimport com.pulumi.azure.appservice.LinuxWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.SourceControl;\nimport com.pulumi.azure.appservice.SourceControlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleLinuxWebApp = new LinuxWebApp(\"exampleLinuxWebApp\", LinuxWebAppArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleSourceControl = new SourceControl(\"exampleSourceControl\", SourceControlArgs.builder()\n .appId(exampleLinuxWebApp.id())\n .repoUrl(\"https://github.com/Azure-Samples/python-docs-hello-world\")\n .branch(\"master\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleSourceControl:\n type: azure:appservice:SourceControl\n name: example\n properties:\n appId: ${exampleLinuxWebApp.id}\n repoUrl: https://github.com/Azure-Samples/python-docs-hello-world\n branch: master\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApp Service Source Controls can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/sourceControl:SourceControl example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", + "description": "Manages an App Service Web App or Function App Source Control Configuration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"P1v2\",\n});\nconst exampleLinuxWebApp = new azure.appservice.LinuxWebApp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleSourceControl = new azure.appservice.SourceControl(\"example\", {\n appId: exampleLinuxWebApp.id,\n repoUrl: \"https://github.com/Azure-Samples/python-docs-hello-world\",\n branch: \"master\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"P1v2\")\nexample_linux_web_app = azure.appservice.LinuxWebApp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_source_control = azure.appservice.SourceControl(\"example\",\n app_id=example_linux_web_app.id,\n repo_url=\"https://github.com/Azure-Samples/python-docs-hello-world\",\n branch=\"master\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"P1v2\",\n });\n\n var exampleLinuxWebApp = new Azure.AppService.LinuxWebApp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleSourceControl = new Azure.AppService.SourceControl(\"example\", new()\n {\n AppId = exampleLinuxWebApp.Id,\n RepoUrl = \"https://github.com/Azure-Samples/python-docs-hello-world\",\n Branch = \"master\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxWebApp, err := appservice.NewLinuxWebApp(ctx, \"example\", \u0026appservice.LinuxWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.LinuxWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewSourceControl(ctx, \"example\", \u0026appservice.SourceControlArgs{\n\t\t\tAppId: exampleLinuxWebApp.ID(),\n\t\t\tRepoUrl: pulumi.String(\"https://github.com/Azure-Samples/python-docs-hello-world\"),\n\t\t\tBranch: pulumi.String(\"master\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxWebApp;\nimport com.pulumi.azure.appservice.LinuxWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.SourceControl;\nimport com.pulumi.azure.appservice.SourceControlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleLinuxWebApp = new LinuxWebApp(\"exampleLinuxWebApp\", LinuxWebAppArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleSourceControl = new SourceControl(\"exampleSourceControl\", SourceControlArgs.builder()\n .appId(exampleLinuxWebApp.id())\n .repoUrl(\"https://github.com/Azure-Samples/python-docs-hello-world\")\n .branch(\"master\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleSourceControl:\n type: azure:appservice:SourceControl\n name: example\n properties:\n appId: ${exampleLinuxWebApp.id}\n repoUrl: https://github.com/Azure-Samples/python-docs-hello-world\n branch: master\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nApp Service Source Controls can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/sourceControl:SourceControl example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", "properties": { "appId": { "type": "string", @@ -121384,7 +121384,7 @@ } }, "azure:appservice/sourceControlSlot:SourceControlSlot": { - "description": "Manages an App Service Source Control Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"P1v2\",\n});\nconst exampleLinuxWebApp = new azure.appservice.LinuxWebApp(\"example\", {\n name: \"example-web-app\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleLinuxWebAppSlot = new azure.appservice.LinuxWebAppSlot(\"example\", {\n name: \"example-slot\",\n appServiceId: exampleLinuxWebApp.id,\n siteConfig: {},\n});\nconst exampleSourceControlSlot = new azure.appservice.SourceControlSlot(\"example\", {\n slotId: exampleLinuxWebAppSlot.id,\n repoUrl: \"https://github.com/Azure-Samples/python-docs-hello-world\",\n branch: \"master\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"P1v2\")\nexample_linux_web_app = azure.appservice.LinuxWebApp(\"example\",\n name=\"example-web-app\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_linux_web_app_slot = azure.appservice.LinuxWebAppSlot(\"example\",\n name=\"example-slot\",\n app_service_id=example_linux_web_app.id,\n site_config={})\nexample_source_control_slot = azure.appservice.SourceControlSlot(\"example\",\n slot_id=example_linux_web_app_slot.id,\n repo_url=\"https://github.com/Azure-Samples/python-docs-hello-world\",\n branch=\"master\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"P1v2\",\n });\n\n var exampleLinuxWebApp = new Azure.AppService.LinuxWebApp(\"example\", new()\n {\n Name = \"example-web-app\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleLinuxWebAppSlot = new Azure.AppService.LinuxWebAppSlot(\"example\", new()\n {\n Name = \"example-slot\",\n AppServiceId = exampleLinuxWebApp.Id,\n SiteConfig = null,\n });\n\n var exampleSourceControlSlot = new Azure.AppService.SourceControlSlot(\"example\", new()\n {\n SlotId = exampleLinuxWebAppSlot.Id,\n RepoUrl = \"https://github.com/Azure-Samples/python-docs-hello-world\",\n Branch = \"master\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxWebApp, err := appservice.NewLinuxWebApp(ctx, \"example\", \u0026appservice.LinuxWebAppArgs{\n\t\t\tName: pulumi.String(\"example-web-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxWebAppSlot, err := appservice.NewLinuxWebAppSlot(ctx, \"example\", \u0026appservice.LinuxWebAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-slot\"),\n\t\t\tAppServiceId: exampleLinuxWebApp.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewSourceControlSlot(ctx, \"example\", \u0026appservice.SourceControlSlotArgs{\n\t\t\tSlotId: exampleLinuxWebAppSlot.ID(),\n\t\t\tRepoUrl: pulumi.String(\"https://github.com/Azure-Samples/python-docs-hello-world\"),\n\t\t\tBranch: pulumi.String(\"master\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxWebApp;\nimport com.pulumi.azure.appservice.LinuxWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.LinuxWebAppSlot;\nimport com.pulumi.azure.appservice.LinuxWebAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSlotSiteConfigArgs;\nimport com.pulumi.azure.appservice.SourceControlSlot;\nimport com.pulumi.azure.appservice.SourceControlSlotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleLinuxWebApp = new LinuxWebApp(\"exampleLinuxWebApp\", LinuxWebAppArgs.builder()\n .name(\"example-web-app\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleLinuxWebAppSlot = new LinuxWebAppSlot(\"exampleLinuxWebAppSlot\", LinuxWebAppSlotArgs.builder()\n .name(\"example-slot\")\n .appServiceId(exampleLinuxWebApp.id())\n .siteConfig()\n .build());\n\n var exampleSourceControlSlot = new SourceControlSlot(\"exampleSourceControlSlot\", SourceControlSlotArgs.builder()\n .slotId(exampleLinuxWebAppSlot.id())\n .repoUrl(\"https://github.com/Azure-Samples/python-docs-hello-world\")\n .branch(\"master\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleLinuxWebAppSlot:\n type: azure:appservice:LinuxWebAppSlot\n name: example\n properties:\n name: example-slot\n appServiceId: ${exampleLinuxWebApp.id}\n siteConfig: {}\n exampleSourceControlSlot:\n type: azure:appservice:SourceControlSlot\n name: example\n properties:\n slotId: ${exampleLinuxWebAppSlot.id}\n repoUrl: https://github.com/Azure-Samples/python-docs-hello-world\n branch: master\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nan App Service Source Control Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/sourceControlSlot:SourceControlSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\"\n```\n\n", + "description": "Manages an App Service Source Control Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Linux\",\n skuName: \"P1v2\",\n});\nconst exampleLinuxWebApp = new azure.appservice.LinuxWebApp(\"example\", {\n name: \"example-web-app\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleLinuxWebAppSlot = new azure.appservice.LinuxWebAppSlot(\"example\", {\n name: \"example-slot\",\n appServiceId: exampleLinuxWebApp.id,\n siteConfig: {},\n});\nconst exampleSourceControlSlot = new azure.appservice.SourceControlSlot(\"example\", {\n slotId: exampleLinuxWebAppSlot.id,\n repoUrl: \"https://github.com/Azure-Samples/python-docs-hello-world\",\n branch: \"master\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Linux\",\n sku_name=\"P1v2\")\nexample_linux_web_app = azure.appservice.LinuxWebApp(\"example\",\n name=\"example-web-app\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_linux_web_app_slot = azure.appservice.LinuxWebAppSlot(\"example\",\n name=\"example-slot\",\n app_service_id=example_linux_web_app.id,\n site_config={})\nexample_source_control_slot = azure.appservice.SourceControlSlot(\"example\",\n slot_id=example_linux_web_app_slot.id,\n repo_url=\"https://github.com/Azure-Samples/python-docs-hello-world\",\n branch=\"master\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Linux\",\n SkuName = \"P1v2\",\n });\n\n var exampleLinuxWebApp = new Azure.AppService.LinuxWebApp(\"example\", new()\n {\n Name = \"example-web-app\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleLinuxWebAppSlot = new Azure.AppService.LinuxWebAppSlot(\"example\", new()\n {\n Name = \"example-slot\",\n AppServiceId = exampleLinuxWebApp.Id,\n SiteConfig = null,\n });\n\n var exampleSourceControlSlot = new Azure.AppService.SourceControlSlot(\"example\", new()\n {\n SlotId = exampleLinuxWebAppSlot.Id,\n RepoUrl = \"https://github.com/Azure-Samples/python-docs-hello-world\",\n Branch = \"master\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxWebApp, err := appservice.NewLinuxWebApp(ctx, \"example\", \u0026appservice.LinuxWebAppArgs{\n\t\t\tName: pulumi.String(\"example-web-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.LinuxWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxWebAppSlot, err := appservice.NewLinuxWebAppSlot(ctx, \"example\", \u0026appservice.LinuxWebAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-slot\"),\n\t\t\tAppServiceId: exampleLinuxWebApp.ID(),\n\t\t\tSiteConfig: \u0026appservice.LinuxWebAppSlotSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewSourceControlSlot(ctx, \"example\", \u0026appservice.SourceControlSlotArgs{\n\t\t\tSlotId: exampleLinuxWebAppSlot.ID(),\n\t\t\tRepoUrl: pulumi.String(\"https://github.com/Azure-Samples/python-docs-hello-world\"),\n\t\t\tBranch: pulumi.String(\"master\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxWebApp;\nimport com.pulumi.azure.appservice.LinuxWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.LinuxWebAppSlot;\nimport com.pulumi.azure.appservice.LinuxWebAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxWebAppSlotSiteConfigArgs;\nimport com.pulumi.azure.appservice.SourceControlSlot;\nimport com.pulumi.azure.appservice.SourceControlSlotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Linux\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleLinuxWebApp = new LinuxWebApp(\"exampleLinuxWebApp\", LinuxWebAppArgs.builder()\n .name(\"example-web-app\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleLinuxWebAppSlot = new LinuxWebAppSlot(\"exampleLinuxWebAppSlot\", LinuxWebAppSlotArgs.builder()\n .name(\"example-slot\")\n .appServiceId(exampleLinuxWebApp.id())\n .siteConfig()\n .build());\n\n var exampleSourceControlSlot = new SourceControlSlot(\"exampleSourceControlSlot\", SourceControlSlotArgs.builder()\n .slotId(exampleLinuxWebAppSlot.id())\n .repoUrl(\"https://github.com/Azure-Samples/python-docs-hello-world\")\n .branch(\"master\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleLinuxWebAppSlot:\n type: azure:appservice:LinuxWebAppSlot\n name: example\n properties:\n name: example-slot\n appServiceId: ${exampleLinuxWebApp.id}\n siteConfig: {}\n exampleSourceControlSlot:\n type: azure:appservice:SourceControlSlot\n name: example\n properties:\n slotId: ${exampleLinuxWebAppSlot.id}\n repoUrl: https://github.com/Azure-Samples/python-docs-hello-world\n branch: master\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nan App Service Source Control Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/sourceControlSlot:SourceControlSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\"\n```\n\n", "properties": { "branch": { "type": "string", @@ -122118,7 +122118,7 @@ } }, "azure:appservice/staticWebAppFunctionAppRegistration:StaticWebAppFunctionAppRegistration": { - "description": "Manages an App Service Static Web App Function App Registration.\n\n\u003e **NOTE:** This resource registers the specified Function App to the `Production` build of the Static Web App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleStaticWebApp = new azure.appservice.StaticWebApp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesstorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-service-plan\",\n location: example.location,\n resourceGroupName: example.name,\n osType: \"Linux\",\n skuName: \"S1\",\n});\nconst exampleLinuxFunctionApp = new azure.appservice.LinuxFunctionApp(\"example\", {\n name: \"example-function-app\",\n location: example.location,\n resourceGroupName: example.name,\n servicePlanId: exampleServicePlan.id,\n storageAccountName: exampleAccount.name,\n storageAccountAccessKey: exampleAccount.primaryAccessKey,\n siteConfig: {},\n});\nconst exampleStaticWebAppFunctionAppRegistration = new azure.appservice.StaticWebAppFunctionAppRegistration(\"example\", {\n staticWebAppId: exampleStaticWebApp.id,\n functionAppId: exampleLinuxFunctionApp.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_static_web_app = azure.appservice.StaticWebApp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesstorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-service-plan\",\n location=example.location,\n resource_group_name=example.name,\n os_type=\"Linux\",\n sku_name=\"S1\")\nexample_linux_function_app = azure.appservice.LinuxFunctionApp(\"example\",\n name=\"example-function-app\",\n location=example.location,\n resource_group_name=example.name,\n service_plan_id=example_service_plan.id,\n storage_account_name=example_account.name,\n storage_account_access_key=example_account.primary_access_key,\n site_config={})\nexample_static_web_app_function_app_registration = azure.appservice.StaticWebAppFunctionAppRegistration(\"example\",\n static_web_app_id=example_static_web_app.id,\n function_app_id=example_linux_function_app.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleStaticWebApp = new Azure.AppService.StaticWebApp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesstorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-service-plan\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OsType = \"Linux\",\n SkuName = \"S1\",\n });\n\n var exampleLinuxFunctionApp = new Azure.AppService.LinuxFunctionApp(\"example\", new()\n {\n Name = \"example-function-app\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ServicePlanId = exampleServicePlan.Id,\n StorageAccountName = exampleAccount.Name,\n StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,\n SiteConfig = null,\n });\n\n var exampleStaticWebAppFunctionAppRegistration = new Azure.AppService.StaticWebAppFunctionAppRegistration(\"example\", new()\n {\n StaticWebAppId = exampleStaticWebApp.Id,\n FunctionAppId = exampleLinuxFunctionApp.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStaticWebApp, err := appservice.NewStaticWebApp(ctx, \"example\", \u0026appservice.StaticWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesstorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-service-plan\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"S1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxFunctionApp, err := appservice.NewLinuxFunctionApp(ctx, \"example\", \u0026appservice.LinuxFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-function-app\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tStorageAccountAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewStaticWebAppFunctionAppRegistration(ctx, \"example\", \u0026appservice.StaticWebAppFunctionAppRegistrationArgs{\n\t\t\tStaticWebAppId: exampleStaticWebApp.ID(),\n\t\t\tFunctionAppId: exampleLinuxFunctionApp.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.StaticWebApp;\nimport com.pulumi.azure.appservice.StaticWebAppArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionApp;\nimport com.pulumi.azure.appservice.LinuxFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.StaticWebAppFunctionAppRegistration;\nimport com.pulumi.azure.appservice.StaticWebAppFunctionAppRegistrationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleStaticWebApp = new StaticWebApp(\"exampleStaticWebApp\", StaticWebAppArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesstorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-service-plan\")\n .location(example.location())\n .resourceGroupName(example.name())\n .osType(\"Linux\")\n .skuName(\"S1\")\n .build());\n\n var exampleLinuxFunctionApp = new LinuxFunctionApp(\"exampleLinuxFunctionApp\", LinuxFunctionAppArgs.builder()\n .name(\"example-function-app\")\n .location(example.location())\n .resourceGroupName(example.name())\n .servicePlanId(exampleServicePlan.id())\n .storageAccountName(exampleAccount.name())\n .storageAccountAccessKey(exampleAccount.primaryAccessKey())\n .siteConfig()\n .build());\n\n var exampleStaticWebAppFunctionAppRegistration = new StaticWebAppFunctionAppRegistration(\"exampleStaticWebAppFunctionAppRegistration\", StaticWebAppFunctionAppRegistrationArgs.builder()\n .staticWebAppId(exampleStaticWebApp.id())\n .functionAppId(exampleLinuxFunctionApp.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleStaticWebApp:\n type: azure:appservice:StaticWebApp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesstorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-service-plan\n location: ${example.location}\n resourceGroupName: ${example.name}\n osType: Linux\n skuName: S1\n exampleLinuxFunctionApp:\n type: azure:appservice:LinuxFunctionApp\n name: example\n properties:\n name: example-function-app\n location: ${example.location}\n resourceGroupName: ${example.name}\n servicePlanId: ${exampleServicePlan.id}\n storageAccountName: ${exampleAccount.name}\n storageAccountAccessKey: ${exampleAccount.primaryAccessKey}\n siteConfig: {}\n exampleStaticWebAppFunctionAppRegistration:\n type: azure:appservice:StaticWebAppFunctionAppRegistration\n name: example\n properties:\n staticWebAppId: ${exampleStaticWebApp.id}\n functionAppId: ${exampleLinuxFunctionApp.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nStatic Web App Function App Registration can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/staticWebAppFunctionAppRegistration:StaticWebAppFunctionAppRegistration example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.Web/staticSites/my-static-site1/userProvidedFunctionApps/myFunctionApp\n```\n\n", + "description": "Manages an App Service Static Web App Function App Registration.\n\n\u003e **NOTE:** This resource registers the specified Function App to the `Production` build of the Static Web App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleStaticWebApp = new azure.appservice.StaticWebApp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesstorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-service-plan\",\n location: example.location,\n resourceGroupName: example.name,\n osType: \"Linux\",\n skuName: \"S1\",\n});\nconst exampleLinuxFunctionApp = new azure.appservice.LinuxFunctionApp(\"example\", {\n name: \"example-function-app\",\n location: example.location,\n resourceGroupName: example.name,\n servicePlanId: exampleServicePlan.id,\n storageAccountName: exampleAccount.name,\n storageAccountAccessKey: exampleAccount.primaryAccessKey,\n siteConfig: {},\n});\nconst exampleStaticWebAppFunctionAppRegistration = new azure.appservice.StaticWebAppFunctionAppRegistration(\"example\", {\n staticWebAppId: exampleStaticWebApp.id,\n functionAppId: exampleLinuxFunctionApp.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_static_web_app = azure.appservice.StaticWebApp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesstorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-service-plan\",\n location=example.location,\n resource_group_name=example.name,\n os_type=\"Linux\",\n sku_name=\"S1\")\nexample_linux_function_app = azure.appservice.LinuxFunctionApp(\"example\",\n name=\"example-function-app\",\n location=example.location,\n resource_group_name=example.name,\n service_plan_id=example_service_plan.id,\n storage_account_name=example_account.name,\n storage_account_access_key=example_account.primary_access_key,\n site_config={})\nexample_static_web_app_function_app_registration = azure.appservice.StaticWebAppFunctionAppRegistration(\"example\",\n static_web_app_id=example_static_web_app.id,\n function_app_id=example_linux_function_app.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleStaticWebApp = new Azure.AppService.StaticWebApp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesstorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-service-plan\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OsType = \"Linux\",\n SkuName = \"S1\",\n });\n\n var exampleLinuxFunctionApp = new Azure.AppService.LinuxFunctionApp(\"example\", new()\n {\n Name = \"example-function-app\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ServicePlanId = exampleServicePlan.Id,\n StorageAccountName = exampleAccount.Name,\n StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,\n SiteConfig = null,\n });\n\n var exampleStaticWebAppFunctionAppRegistration = new Azure.AppService.StaticWebAppFunctionAppRegistration(\"example\", new()\n {\n StaticWebAppId = exampleStaticWebApp.Id,\n FunctionAppId = exampleLinuxFunctionApp.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStaticWebApp, err := appservice.NewStaticWebApp(ctx, \"example\", \u0026appservice.StaticWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesstorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-service-plan\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\tSkuName: pulumi.String(\"S1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinuxFunctionApp, err := appservice.NewLinuxFunctionApp(ctx, \"example\", \u0026appservice.LinuxFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-function-app\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tStorageAccountAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t\tSiteConfig: \u0026appservice.LinuxFunctionAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewStaticWebAppFunctionAppRegistration(ctx, \"example\", \u0026appservice.StaticWebAppFunctionAppRegistrationArgs{\n\t\t\tStaticWebAppId: exampleStaticWebApp.ID(),\n\t\t\tFunctionAppId: exampleLinuxFunctionApp.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.StaticWebApp;\nimport com.pulumi.azure.appservice.StaticWebAppArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.LinuxFunctionApp;\nimport com.pulumi.azure.appservice.LinuxFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.LinuxFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.StaticWebAppFunctionAppRegistration;\nimport com.pulumi.azure.appservice.StaticWebAppFunctionAppRegistrationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleStaticWebApp = new StaticWebApp(\"exampleStaticWebApp\", StaticWebAppArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesstorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-service-plan\")\n .location(example.location())\n .resourceGroupName(example.name())\n .osType(\"Linux\")\n .skuName(\"S1\")\n .build());\n\n var exampleLinuxFunctionApp = new LinuxFunctionApp(\"exampleLinuxFunctionApp\", LinuxFunctionAppArgs.builder()\n .name(\"example-function-app\")\n .location(example.location())\n .resourceGroupName(example.name())\n .servicePlanId(exampleServicePlan.id())\n .storageAccountName(exampleAccount.name())\n .storageAccountAccessKey(exampleAccount.primaryAccessKey())\n .siteConfig()\n .build());\n\n var exampleStaticWebAppFunctionAppRegistration = new StaticWebAppFunctionAppRegistration(\"exampleStaticWebAppFunctionAppRegistration\", StaticWebAppFunctionAppRegistrationArgs.builder()\n .staticWebAppId(exampleStaticWebApp.id())\n .functionAppId(exampleLinuxFunctionApp.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleStaticWebApp:\n type: azure:appservice:StaticWebApp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesstorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-service-plan\n location: ${example.location}\n resourceGroupName: ${example.name}\n osType: Linux\n skuName: S1\n exampleLinuxFunctionApp:\n type: azure:appservice:LinuxFunctionApp\n name: example\n properties:\n name: example-function-app\n location: ${example.location}\n resourceGroupName: ${example.name}\n servicePlanId: ${exampleServicePlan.id}\n storageAccountName: ${exampleAccount.name}\n storageAccountAccessKey: ${exampleAccount.primaryAccessKey}\n siteConfig: {}\n exampleStaticWebAppFunctionAppRegistration:\n type: azure:appservice:StaticWebAppFunctionAppRegistration\n name: example\n properties:\n staticWebAppId: ${exampleStaticWebApp.id}\n functionAppId: ${exampleLinuxFunctionApp.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nStatic Web App Function App Registration can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/staticWebAppFunctionAppRegistration:StaticWebAppFunctionAppRegistration example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.Web/staticSites/my-static-site1/userProvidedFunctionApps/myFunctionApp\n```\n\n", "properties": { "functionAppId": { "type": "string", @@ -122214,7 +122214,7 @@ } }, "azure:appservice/webAppActiveSlot:WebAppActiveSlot": { - "description": "Manages a Web App Active Slot.\n\n## Example Usage\n\n### Windows Web App\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"P1v2\",\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example-windows-web-app\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsWebAppSlot = new azure.appservice.WindowsWebAppSlot(\"example\", {\n name: \"example-windows-web-app-slot\",\n appServiceId: exampleWindowsWebApp.name,\n siteConfig: {},\n});\nconst exampleWebAppActiveSlot = new azure.appservice.WebAppActiveSlot(\"example\", {slotId: exampleWindowsWebAppSlot.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"P1v2\")\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example-windows-web-app\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_web_app_slot = azure.appservice.WindowsWebAppSlot(\"example\",\n name=\"example-windows-web-app-slot\",\n app_service_id=example_windows_web_app.name,\n site_config={})\nexample_web_app_active_slot = azure.appservice.WebAppActiveSlot(\"example\", slot_id=example_windows_web_app_slot.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"P1v2\",\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example-windows-web-app\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsWebAppSlot = new Azure.AppService.WindowsWebAppSlot(\"example\", new()\n {\n Name = \"example-windows-web-app-slot\",\n AppServiceId = exampleWindowsWebApp.Name,\n SiteConfig = null,\n });\n\n var exampleWebAppActiveSlot = new Azure.AppService.WebAppActiveSlot(\"example\", new()\n {\n SlotId = exampleWindowsWebAppSlot.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebApp, err := appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-web-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebAppSlot, err := appservice.NewWindowsWebAppSlot(ctx, \"example\", \u0026appservice.WindowsWebAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-windows-web-app-slot\"),\n\t\t\tAppServiceId: exampleWindowsWebApp.Name,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWebAppActiveSlot(ctx, \"example\", \u0026appservice.WebAppActiveSlotArgs{\n\t\t\tSlotId: exampleWindowsWebAppSlot.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsWebAppSlot;\nimport com.pulumi.azure.appservice.WindowsWebAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSlotSiteConfigArgs;\nimport com.pulumi.azure.appservice.WebAppActiveSlot;\nimport com.pulumi.azure.appservice.WebAppActiveSlotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example-windows-web-app\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsWebAppSlot = new WindowsWebAppSlot(\"exampleWindowsWebAppSlot\", WindowsWebAppSlotArgs.builder()\n .name(\"example-windows-web-app-slot\")\n .appServiceId(exampleWindowsWebApp.name())\n .siteConfig()\n .build());\n\n var exampleWebAppActiveSlot = new WebAppActiveSlot(\"exampleWebAppActiveSlot\", WebAppActiveSlotArgs.builder()\n .slotId(exampleWindowsWebAppSlot.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: P1v2\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example-windows-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsWebAppSlot:\n type: azure:appservice:WindowsWebAppSlot\n name: example\n properties:\n name: example-windows-web-app-slot\n appServiceId: ${exampleWindowsWebApp.name}\n siteConfig: {}\n exampleWebAppActiveSlot:\n type: azure:appservice:WebAppActiveSlot\n name: example\n properties:\n slotId: ${exampleWindowsWebAppSlot.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Linux Web App\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example-linux-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleLinuxWebAppSlot:\n type: azure:appservice:LinuxWebAppSlot\n name: example\n properties:\n name: example-linux-web-app-slot\n appServiceName: ${exampleLinuxWebApp.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWebAppActiveSlot:\n type: azure:appservice:WebAppActiveSlot\n name: example\n properties:\n slotId: ${exampleLinuxWebAppSlot.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\na Web App Active Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/webAppActiveSlot:WebAppActiveSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\"\n```\n\n", + "description": "Manages a Web App Active Slot.\n\n## Example Usage\n\n### Windows Web App\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"P1v2\",\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example-windows-web-app\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsWebAppSlot = new azure.appservice.WindowsWebAppSlot(\"example\", {\n name: \"example-windows-web-app-slot\",\n appServiceId: exampleWindowsWebApp.name,\n siteConfig: {},\n});\nconst exampleWebAppActiveSlot = new azure.appservice.WebAppActiveSlot(\"example\", {slotId: exampleWindowsWebAppSlot.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"P1v2\")\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example-windows-web-app\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_web_app_slot = azure.appservice.WindowsWebAppSlot(\"example\",\n name=\"example-windows-web-app-slot\",\n app_service_id=example_windows_web_app.name,\n site_config={})\nexample_web_app_active_slot = azure.appservice.WebAppActiveSlot(\"example\", slot_id=example_windows_web_app_slot.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"P1v2\",\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example-windows-web-app\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsWebAppSlot = new Azure.AppService.WindowsWebAppSlot(\"example\", new()\n {\n Name = \"example-windows-web-app-slot\",\n AppServiceId = exampleWindowsWebApp.Name,\n SiteConfig = null,\n });\n\n var exampleWebAppActiveSlot = new Azure.AppService.WebAppActiveSlot(\"example\", new()\n {\n SlotId = exampleWindowsWebAppSlot.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebApp, err := appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-web-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebAppSlot, err := appservice.NewWindowsWebAppSlot(ctx, \"example\", \u0026appservice.WindowsWebAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-windows-web-app-slot\"),\n\t\t\tAppServiceId: exampleWindowsWebApp.Name,\n\t\t\tSiteConfig: \u0026appservice.WindowsWebAppSlotSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWebAppActiveSlot(ctx, \"example\", \u0026appservice.WebAppActiveSlotArgs{\n\t\t\tSlotId: exampleWindowsWebAppSlot.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsWebAppSlot;\nimport com.pulumi.azure.appservice.WindowsWebAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSlotSiteConfigArgs;\nimport com.pulumi.azure.appservice.WebAppActiveSlot;\nimport com.pulumi.azure.appservice.WebAppActiveSlotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example-windows-web-app\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsWebAppSlot = new WindowsWebAppSlot(\"exampleWindowsWebAppSlot\", WindowsWebAppSlotArgs.builder()\n .name(\"example-windows-web-app-slot\")\n .appServiceId(exampleWindowsWebApp.name())\n .siteConfig()\n .build());\n\n var exampleWebAppActiveSlot = new WebAppActiveSlot(\"exampleWebAppActiveSlot\", WebAppActiveSlotArgs.builder()\n .slotId(exampleWindowsWebAppSlot.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: P1v2\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example-windows-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsWebAppSlot:\n type: azure:appservice:WindowsWebAppSlot\n name: example\n properties:\n name: example-windows-web-app-slot\n appServiceId: ${exampleWindowsWebApp.name}\n siteConfig: {}\n exampleWebAppActiveSlot:\n type: azure:appservice:WebAppActiveSlot\n name: example\n properties:\n slotId: ${exampleWindowsWebAppSlot.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Linux Web App\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Linux\n skuName: P1v2\n exampleLinuxWebApp:\n type: azure:appservice:LinuxWebApp\n name: example\n properties:\n name: example-linux-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleLinuxWebAppSlot:\n type: azure:appservice:LinuxWebAppSlot\n name: example\n properties:\n name: example-linux-web-app-slot\n appServiceName: ${exampleLinuxWebApp.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWebAppActiveSlot:\n type: azure:appservice:WebAppActiveSlot\n name: example\n properties:\n slotId: ${exampleLinuxWebAppSlot.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\na Web App Active Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/webAppActiveSlot:WebAppActiveSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\"\n```\n\n", "properties": { "lastSuccessfulSwap": { "type": "string", @@ -122268,7 +122268,7 @@ } }, "azure:appservice/webAppHybridConnection:WebAppHybridConnection": { - "description": "Manages a Web App Hybrid Connection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n location: example.location,\n resourceGroupName: example.name,\n osType: \"Windows\",\n skuName: \"S1\",\n});\nconst exampleNamespace = new azure.relay.Namespace(\"example\", {\n name: \"example-relay\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"Standard\",\n});\nconst exampleHybridConnection = new azure.relay.HybridConnection(\"example\", {\n name: \"examplerhc1\",\n resourceGroupName: example.name,\n relayNamespaceName: exampleNamespace.name,\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example-web-app\",\n location: example.location,\n resourceGroupName: example.name,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWebAppHybridConnection = new azure.appservice.WebAppHybridConnection(\"example\", {\n webAppId: exampleWindowsWebApp.id,\n relayId: exampleHybridConnection.id,\n hostname: \"myhostname.example\",\n port: 8081,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n location=example.location,\n resource_group_name=example.name,\n os_type=\"Windows\",\n sku_name=\"S1\")\nexample_namespace = azure.relay.Namespace(\"example\",\n name=\"example-relay\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"Standard\")\nexample_hybrid_connection = azure.relay.HybridConnection(\"example\",\n name=\"examplerhc1\",\n resource_group_name=example.name,\n relay_namespace_name=example_namespace.name)\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example-web-app\",\n location=example.location,\n resource_group_name=example.name,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_web_app_hybrid_connection = azure.appservice.WebAppHybridConnection(\"example\",\n web_app_id=example_windows_web_app.id,\n relay_id=example_hybrid_connection.id,\n hostname=\"myhostname.example\",\n port=8081)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OsType = \"Windows\",\n SkuName = \"S1\",\n });\n\n var exampleNamespace = new Azure.Relay.Namespace(\"example\", new()\n {\n Name = \"example-relay\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"Standard\",\n });\n\n var exampleHybridConnection = new Azure.Relay.HybridConnection(\"example\", new()\n {\n Name = \"examplerhc1\",\n ResourceGroupName = example.Name,\n RelayNamespaceName = exampleNamespace.Name,\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example-web-app\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWebAppHybridConnection = new Azure.AppService.WebAppHybridConnection(\"example\", new()\n {\n WebAppId = exampleWindowsWebApp.Id,\n RelayId = exampleHybridConnection.Id,\n Hostname = \"myhostname.example\",\n Port = 8081,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/relay\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"S1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNamespace, err := relay.NewNamespace(ctx, \"example\", \u0026relay.NamespaceArgs{\n\t\t\tName: pulumi.String(\"example-relay\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleHybridConnection, err := relay.NewHybridConnection(ctx, \"example\", \u0026relay.HybridConnectionArgs{\n\t\t\tName: pulumi.String(\"examplerhc1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tRelayNamespaceName: exampleNamespace.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebApp, err := appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example-web-app\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWebAppHybridConnection(ctx, \"example\", \u0026appservice.WebAppHybridConnectionArgs{\n\t\t\tWebAppId: exampleWindowsWebApp.ID(),\n\t\t\tRelayId: exampleHybridConnection.ID(),\n\t\t\tHostname: pulumi.String(\"myhostname.example\"),\n\t\t\tPort: pulumi.Int(8081),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.relay.Namespace;\nimport com.pulumi.azure.relay.NamespaceArgs;\nimport com.pulumi.azure.relay.HybridConnection;\nimport com.pulumi.azure.relay.HybridConnectionArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WebAppHybridConnection;\nimport com.pulumi.azure.appservice.WebAppHybridConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .location(example.location())\n .resourceGroupName(example.name())\n .osType(\"Windows\")\n .skuName(\"S1\")\n .build());\n\n var exampleNamespace = new Namespace(\"exampleNamespace\", NamespaceArgs.builder()\n .name(\"example-relay\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"Standard\")\n .build());\n\n var exampleHybridConnection = new HybridConnection(\"exampleHybridConnection\", HybridConnectionArgs.builder()\n .name(\"examplerhc1\")\n .resourceGroupName(example.name())\n .relayNamespaceName(exampleNamespace.name())\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example-web-app\")\n .location(example.location())\n .resourceGroupName(example.name())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWebAppHybridConnection = new WebAppHybridConnection(\"exampleWebAppHybridConnection\", WebAppHybridConnectionArgs.builder()\n .webAppId(exampleWindowsWebApp.id())\n .relayId(exampleHybridConnection.id())\n .hostname(\"myhostname.example\")\n .port(8081)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n location: ${example.location}\n resourceGroupName: ${example.name}\n osType: Windows\n skuName: S1\n exampleNamespace:\n type: azure:relay:Namespace\n name: example\n properties:\n name: example-relay\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: Standard\n exampleHybridConnection:\n type: azure:relay:HybridConnection\n name: example\n properties:\n name: examplerhc1\n resourceGroupName: ${example.name}\n relayNamespaceName: ${exampleNamespace.name}\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example-web-app\n location: ${example.location}\n resourceGroupName: ${example.name}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWebAppHybridConnection:\n type: azure:appservice:WebAppHybridConnection\n name: example\n properties:\n webAppId: ${exampleWindowsWebApp.id}\n relayId: ${exampleHybridConnection.id}\n hostname: myhostname.example\n port: 8081\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\na Web App Hybrid Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/webAppHybridConnection:WebAppHybridConnection example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/hybridConnectionNamespaces/hybridConnectionNamespace1/relays/relay1\"\n```\n\n", + "description": "Manages a Web App Hybrid Connection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n location: example.location,\n resourceGroupName: example.name,\n osType: \"Windows\",\n skuName: \"S1\",\n});\nconst exampleNamespace = new azure.relay.Namespace(\"example\", {\n name: \"example-relay\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"Standard\",\n});\nconst exampleHybridConnection = new azure.relay.HybridConnection(\"example\", {\n name: \"examplerhc1\",\n resourceGroupName: example.name,\n relayNamespaceName: exampleNamespace.name,\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example-web-app\",\n location: example.location,\n resourceGroupName: example.name,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWebAppHybridConnection = new azure.appservice.WebAppHybridConnection(\"example\", {\n webAppId: exampleWindowsWebApp.id,\n relayId: exampleHybridConnection.id,\n hostname: \"myhostname.example\",\n port: 8081,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n location=example.location,\n resource_group_name=example.name,\n os_type=\"Windows\",\n sku_name=\"S1\")\nexample_namespace = azure.relay.Namespace(\"example\",\n name=\"example-relay\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"Standard\")\nexample_hybrid_connection = azure.relay.HybridConnection(\"example\",\n name=\"examplerhc1\",\n resource_group_name=example.name,\n relay_namespace_name=example_namespace.name)\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example-web-app\",\n location=example.location,\n resource_group_name=example.name,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_web_app_hybrid_connection = azure.appservice.WebAppHybridConnection(\"example\",\n web_app_id=example_windows_web_app.id,\n relay_id=example_hybrid_connection.id,\n hostname=\"myhostname.example\",\n port=8081)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OsType = \"Windows\",\n SkuName = \"S1\",\n });\n\n var exampleNamespace = new Azure.Relay.Namespace(\"example\", new()\n {\n Name = \"example-relay\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"Standard\",\n });\n\n var exampleHybridConnection = new Azure.Relay.HybridConnection(\"example\", new()\n {\n Name = \"examplerhc1\",\n ResourceGroupName = example.Name,\n RelayNamespaceName = exampleNamespace.Name,\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example-web-app\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWebAppHybridConnection = new Azure.AppService.WebAppHybridConnection(\"example\", new()\n {\n WebAppId = exampleWindowsWebApp.Id,\n RelayId = exampleHybridConnection.Id,\n Hostname = \"myhostname.example\",\n Port = 8081,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/relay\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"S1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNamespace, err := relay.NewNamespace(ctx, \"example\", \u0026relay.NamespaceArgs{\n\t\t\tName: pulumi.String(\"example-relay\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleHybridConnection, err := relay.NewHybridConnection(ctx, \"example\", \u0026relay.HybridConnectionArgs{\n\t\t\tName: pulumi.String(\"examplerhc1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tRelayNamespaceName: exampleNamespace.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebApp, err := appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example-web-app\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWebAppHybridConnection(ctx, \"example\", \u0026appservice.WebAppHybridConnectionArgs{\n\t\t\tWebAppId: exampleWindowsWebApp.ID(),\n\t\t\tRelayId: exampleHybridConnection.ID(),\n\t\t\tHostname: pulumi.String(\"myhostname.example\"),\n\t\t\tPort: pulumi.Int(8081),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.relay.Namespace;\nimport com.pulumi.azure.relay.NamespaceArgs;\nimport com.pulumi.azure.relay.HybridConnection;\nimport com.pulumi.azure.relay.HybridConnectionArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WebAppHybridConnection;\nimport com.pulumi.azure.appservice.WebAppHybridConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .location(example.location())\n .resourceGroupName(example.name())\n .osType(\"Windows\")\n .skuName(\"S1\")\n .build());\n\n var exampleNamespace = new Namespace(\"exampleNamespace\", NamespaceArgs.builder()\n .name(\"example-relay\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"Standard\")\n .build());\n\n var exampleHybridConnection = new HybridConnection(\"exampleHybridConnection\", HybridConnectionArgs.builder()\n .name(\"examplerhc1\")\n .resourceGroupName(example.name())\n .relayNamespaceName(exampleNamespace.name())\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example-web-app\")\n .location(example.location())\n .resourceGroupName(example.name())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWebAppHybridConnection = new WebAppHybridConnection(\"exampleWebAppHybridConnection\", WebAppHybridConnectionArgs.builder()\n .webAppId(exampleWindowsWebApp.id())\n .relayId(exampleHybridConnection.id())\n .hostname(\"myhostname.example\")\n .port(8081)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n location: ${example.location}\n resourceGroupName: ${example.name}\n osType: Windows\n skuName: S1\n exampleNamespace:\n type: azure:relay:Namespace\n name: example\n properties:\n name: example-relay\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: Standard\n exampleHybridConnection:\n type: azure:relay:HybridConnection\n name: example\n properties:\n name: examplerhc1\n resourceGroupName: ${example.name}\n relayNamespaceName: ${exampleNamespace.name}\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example-web-app\n location: ${example.location}\n resourceGroupName: ${example.name}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWebAppHybridConnection:\n type: azure:appservice:WebAppHybridConnection\n name: example\n properties:\n webAppId: ${exampleWindowsWebApp.id}\n relayId: ${exampleHybridConnection.id}\n hostname: myhostname.example\n port: 8081\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\na Web App Hybrid Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/webAppHybridConnection:WebAppHybridConnection example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/hybridConnectionNamespaces/hybridConnectionNamespace1/relays/relay1\"\n```\n\n", "properties": { "hostname": { "type": "string", @@ -122404,7 +122404,7 @@ } }, "azure:appservice/windowsFunctionApp:WindowsFunctionApp": { - "description": "Manages a Windows Function App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"windowsfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"Y1\",\n});\nconst exampleWindowsFunctionApp = new azure.appservice.WindowsFunctionApp(\"example\", {\n name: \"example-windows-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n storageAccountName: exampleAccount.name,\n storageAccountAccessKey: exampleAccount.primaryAccessKey,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"windowsfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"Y1\")\nexample_windows_function_app = azure.appservice.WindowsFunctionApp(\"example\",\n name=\"example-windows-function-app\",\n resource_group_name=example.name,\n location=example.location,\n storage_account_name=example_account.name,\n storage_account_access_key=example_account.primary_access_key,\n service_plan_id=example_service_plan.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"windowsfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"Y1\",\n });\n\n var exampleWindowsFunctionApp = new Azure.AppService.WindowsFunctionApp(\"example\", new()\n {\n Name = \"example-windows-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageAccountName = exampleAccount.Name,\n StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"windowsfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsFunctionApp(ctx, \"example\", \u0026appservice.WindowsFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tStorageAccountAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionApp;\nimport com.pulumi.azure.appservice.WindowsFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"windowsfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"Y1\")\n .build());\n\n var exampleWindowsFunctionApp = new WindowsFunctionApp(\"exampleWindowsFunctionApp\", WindowsFunctionAppArgs.builder()\n .name(\"example-windows-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageAccountName(exampleAccount.name())\n .storageAccountAccessKey(exampleAccount.primaryAccessKey())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: windowsfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: Y1\n exampleWindowsFunctionApp:\n type: azure:appservice:WindowsFunctionApp\n name: example\n properties:\n name: example-windows-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageAccountName: ${exampleAccount.name}\n storageAccountAccessKey: ${exampleAccount.primaryAccessKey}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWindows Function Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/windowsFunctionApp:WindowsFunctionApp example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", + "description": "Manages a Windows Function App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"windowsfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"Y1\",\n});\nconst exampleWindowsFunctionApp = new azure.appservice.WindowsFunctionApp(\"example\", {\n name: \"example-windows-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n storageAccountName: exampleAccount.name,\n storageAccountAccessKey: exampleAccount.primaryAccessKey,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"windowsfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"Y1\")\nexample_windows_function_app = azure.appservice.WindowsFunctionApp(\"example\",\n name=\"example-windows-function-app\",\n resource_group_name=example.name,\n location=example.location,\n storage_account_name=example_account.name,\n storage_account_access_key=example_account.primary_access_key,\n service_plan_id=example_service_plan.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"windowsfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"Y1\",\n });\n\n var exampleWindowsFunctionApp = new Azure.AppService.WindowsFunctionApp(\"example\", new()\n {\n Name = \"example-windows-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageAccountName = exampleAccount.Name,\n StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"windowsfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsFunctionApp(ctx, \"example\", \u0026appservice.WindowsFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tStorageAccountAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsFunctionAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionApp;\nimport com.pulumi.azure.appservice.WindowsFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"windowsfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"Y1\")\n .build());\n\n var exampleWindowsFunctionApp = new WindowsFunctionApp(\"exampleWindowsFunctionApp\", WindowsFunctionAppArgs.builder()\n .name(\"example-windows-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageAccountName(exampleAccount.name())\n .storageAccountAccessKey(exampleAccount.primaryAccessKey())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: windowsfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: Y1\n exampleWindowsFunctionApp:\n type: azure:appservice:WindowsFunctionApp\n name: example\n properties:\n name: example-windows-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageAccountName: ${exampleAccount.name}\n storageAccountAccessKey: ${exampleAccount.primaryAccessKey}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWindows Function Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/windowsFunctionApp:WindowsFunctionApp example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", "properties": { "appSettings": { "type": "object", @@ -122985,7 +122985,7 @@ } }, "azure:appservice/windowsFunctionAppSlot:WindowsFunctionAppSlot": { - "description": "Manages a Windows Function App Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"windowsfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"Y1\",\n});\nconst exampleWindowsFunctionApp = new azure.appservice.WindowsFunctionApp(\"example\", {\n name: \"example-windows-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n storageAccountName: exampleAccount.name,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsFunctionAppSlot = new azure.appservice.WindowsFunctionAppSlot(\"example\", {\n name: \"example-slot\",\n functionAppId: exampleWindowsFunctionApp.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"windowsfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"Y1\")\nexample_windows_function_app = azure.appservice.WindowsFunctionApp(\"example\",\n name=\"example-windows-function-app\",\n resource_group_name=example.name,\n location=example.location,\n storage_account_name=example_account.name,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_function_app_slot = azure.appservice.WindowsFunctionAppSlot(\"example\",\n name=\"example-slot\",\n function_app_id=example_windows_function_app.id,\n storage_account_name=example_account.name,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"windowsfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"Y1\",\n });\n\n var exampleWindowsFunctionApp = new Azure.AppService.WindowsFunctionApp(\"example\", new()\n {\n Name = \"example-windows-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageAccountName = exampleAccount.Name,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsFunctionAppSlot = new Azure.AppService.WindowsFunctionAppSlot(\"example\", new()\n {\n Name = \"example-slot\",\n FunctionAppId = exampleWindowsFunctionApp.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"windowsfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsFunctionApp, err := appservice.NewWindowsFunctionApp(ctx, \"example\", \u0026appservice.WindowsFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsFunctionAppSlot(ctx, \"example\", \u0026appservice.WindowsFunctionAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-slot\"),\n\t\t\tFunctionAppId: exampleWindowsFunctionApp.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionApp;\nimport com.pulumi.azure.appservice.WindowsFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionAppSlot;\nimport com.pulumi.azure.appservice.WindowsFunctionAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSlotSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"windowsfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"Y1\")\n .build());\n\n var exampleWindowsFunctionApp = new WindowsFunctionApp(\"exampleWindowsFunctionApp\", WindowsFunctionAppArgs.builder()\n .name(\"example-windows-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageAccountName(exampleAccount.name())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsFunctionAppSlot = new WindowsFunctionAppSlot(\"exampleWindowsFunctionAppSlot\", WindowsFunctionAppSlotArgs.builder()\n .name(\"example-slot\")\n .functionAppId(exampleWindowsFunctionApp.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: windowsfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: Y1\n exampleWindowsFunctionApp:\n type: azure:appservice:WindowsFunctionApp\n name: example\n properties:\n name: example-windows-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageAccountName: ${exampleAccount.name}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsFunctionAppSlot:\n type: azure:appservice:WindowsFunctionAppSlot\n name: example\n properties:\n name: example-slot\n functionAppId: ${exampleWindowsFunctionApp.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Windows Function App Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/windowsFunctionAppSlot:WindowsFunctionAppSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\"\n```\n\n", + "description": "Manages a Windows Function App Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"windowsfunctionappsa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-app-service-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"Y1\",\n});\nconst exampleWindowsFunctionApp = new azure.appservice.WindowsFunctionApp(\"example\", {\n name: \"example-windows-function-app\",\n resourceGroupName: example.name,\n location: example.location,\n storageAccountName: exampleAccount.name,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsFunctionAppSlot = new azure.appservice.WindowsFunctionAppSlot(\"example\", {\n name: \"example-slot\",\n functionAppId: exampleWindowsFunctionApp.id,\n storageAccountName: exampleAccount.name,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"windowsfunctionappsa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-app-service-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"Y1\")\nexample_windows_function_app = azure.appservice.WindowsFunctionApp(\"example\",\n name=\"example-windows-function-app\",\n resource_group_name=example.name,\n location=example.location,\n storage_account_name=example_account.name,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_function_app_slot = azure.appservice.WindowsFunctionAppSlot(\"example\",\n name=\"example-slot\",\n function_app_id=example_windows_function_app.id,\n storage_account_name=example_account.name,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"windowsfunctionappsa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-app-service-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"Y1\",\n });\n\n var exampleWindowsFunctionApp = new Azure.AppService.WindowsFunctionApp(\"example\", new()\n {\n Name = \"example-windows-function-app\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageAccountName = exampleAccount.Name,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsFunctionAppSlot = new Azure.AppService.WindowsFunctionAppSlot(\"example\", new()\n {\n Name = \"example-slot\",\n FunctionAppId = exampleWindowsFunctionApp.Id,\n StorageAccountName = exampleAccount.Name,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"windowsfunctionappsa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-app-service-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"Y1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsFunctionApp, err := appservice.NewWindowsFunctionApp(ctx, \"example\", \u0026appservice.WindowsFunctionAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-function-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsFunctionAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsFunctionAppSlot(ctx, \"example\", \u0026appservice.WindowsFunctionAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-slot\"),\n\t\t\tFunctionAppId: exampleWindowsFunctionApp.ID(),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tSiteConfig: \u0026appservice.WindowsFunctionAppSlotSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionApp;\nimport com.pulumi.azure.appservice.WindowsFunctionAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsFunctionAppSlot;\nimport com.pulumi.azure.appservice.WindowsFunctionAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsFunctionAppSlotSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"windowsfunctionappsa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-app-service-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"Y1\")\n .build());\n\n var exampleWindowsFunctionApp = new WindowsFunctionApp(\"exampleWindowsFunctionApp\", WindowsFunctionAppArgs.builder()\n .name(\"example-windows-function-app\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageAccountName(exampleAccount.name())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsFunctionAppSlot = new WindowsFunctionAppSlot(\"exampleWindowsFunctionAppSlot\", WindowsFunctionAppSlotArgs.builder()\n .name(\"example-slot\")\n .functionAppId(exampleWindowsFunctionApp.id())\n .storageAccountName(exampleAccount.name())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: windowsfunctionappsa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-app-service-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: Y1\n exampleWindowsFunctionApp:\n type: azure:appservice:WindowsFunctionApp\n name: example\n properties:\n name: example-windows-function-app\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageAccountName: ${exampleAccount.name}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsFunctionAppSlot:\n type: azure:appservice:WindowsFunctionAppSlot\n name: example\n properties:\n name: example-slot\n functionAppId: ${exampleWindowsFunctionApp.id}\n storageAccountName: ${exampleAccount.name}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Windows Function App Slot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/windowsFunctionAppSlot:WindowsFunctionAppSlot example \"/subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\"\n```\n\n", "properties": { "appSettings": { "type": "object", @@ -123523,7 +123523,7 @@ } }, "azure:appservice/windowsWebApp:WindowsWebApp": { - "description": "Manages a Windows Web App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n skuName: \"P1v2\",\n osType: \"Windows\",\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n sku_name=\"P1v2\",\n os_type=\"Windows\")\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n SkuName = \"P1v2\",\n OsType = \"Windows\",\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .skuName(\"P1v2\")\n .osType(\"Windows\")\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n skuName: P1v2\n osType: Windows\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWindows Web Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/windowsWebApp:WindowsWebApp example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", + "description": "Manages a Windows Web App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n skuName: \"P1v2\",\n osType: \"Windows\",\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n sku_name=\"P1v2\",\n os_type=\"Windows\")\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n SkuName = \"P1v2\",\n OsType = \"Windows\",\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .skuName(\"P1v2\")\n .osType(\"Windows\")\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n skuName: P1v2\n osType: Windows\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWindows Web Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/windowsWebApp:WindowsWebApp example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1\n```\n\n", "properties": { "appSettings": { "type": "object", @@ -124016,7 +124016,7 @@ } }, "azure:appservice/windowsWebAppSlot:WindowsWebAppSlot": { - "description": "Manages a Windows Web App Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"P1v2\",\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example-windows-web-app\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsWebAppSlot = new azure.appservice.WindowsWebAppSlot(\"example\", {\n name: \"example-slot\",\n appServiceId: exampleWindowsWebApp.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"P1v2\")\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example-windows-web-app\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_web_app_slot = azure.appservice.WindowsWebAppSlot(\"example\",\n name=\"example-slot\",\n app_service_id=example_windows_web_app.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"P1v2\",\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example-windows-web-app\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsWebAppSlot = new Azure.AppService.WindowsWebAppSlot(\"example\", new()\n {\n Name = \"example-slot\",\n AppServiceId = exampleWindowsWebApp.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebApp, err := appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-web-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsWebAppSlot(ctx, \"example\", \u0026appservice.WindowsWebAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-slot\"),\n\t\t\tAppServiceId: exampleWindowsWebApp.ID(),\n\t\t\tSiteConfig: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsWebAppSlot;\nimport com.pulumi.azure.appservice.WindowsWebAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSlotSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example-windows-web-app\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsWebAppSlot = new WindowsWebAppSlot(\"exampleWindowsWebAppSlot\", WindowsWebAppSlotArgs.builder()\n .name(\"example-slot\")\n .appServiceId(exampleWindowsWebApp.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: P1v2\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example-windows-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsWebAppSlot:\n type: azure:appservice:WindowsWebAppSlot\n name: example\n properties:\n name: example-slot\n appServiceId: ${exampleWindowsWebApp.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWindows Web Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/windowsWebAppSlot:WindowsWebAppSlot example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\n```\n\n", + "description": "Manages a Windows Web App Slot.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicePlan = new azure.appservice.ServicePlan(\"example\", {\n name: \"example-plan\",\n resourceGroupName: example.name,\n location: example.location,\n osType: \"Windows\",\n skuName: \"P1v2\",\n});\nconst exampleWindowsWebApp = new azure.appservice.WindowsWebApp(\"example\", {\n name: \"example-windows-web-app\",\n resourceGroupName: example.name,\n location: exampleServicePlan.location,\n servicePlanId: exampleServicePlan.id,\n siteConfig: {},\n});\nconst exampleWindowsWebAppSlot = new azure.appservice.WindowsWebAppSlot(\"example\", {\n name: \"example-slot\",\n appServiceId: exampleWindowsWebApp.id,\n siteConfig: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service_plan = azure.appservice.ServicePlan(\"example\",\n name=\"example-plan\",\n resource_group_name=example.name,\n location=example.location,\n os_type=\"Windows\",\n sku_name=\"P1v2\")\nexample_windows_web_app = azure.appservice.WindowsWebApp(\"example\",\n name=\"example-windows-web-app\",\n resource_group_name=example.name,\n location=example_service_plan.location,\n service_plan_id=example_service_plan.id,\n site_config={})\nexample_windows_web_app_slot = azure.appservice.WindowsWebAppSlot(\"example\",\n name=\"example-slot\",\n app_service_id=example_windows_web_app.id,\n site_config={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicePlan = new Azure.AppService.ServicePlan(\"example\", new()\n {\n Name = \"example-plan\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n OsType = \"Windows\",\n SkuName = \"P1v2\",\n });\n\n var exampleWindowsWebApp = new Azure.AppService.WindowsWebApp(\"example\", new()\n {\n Name = \"example-windows-web-app\",\n ResourceGroupName = example.Name,\n Location = exampleServicePlan.Location,\n ServicePlanId = exampleServicePlan.Id,\n SiteConfig = null,\n });\n\n var exampleWindowsWebAppSlot = new Azure.AppService.WindowsWebAppSlot(\"example\", new()\n {\n Name = \"example-slot\",\n AppServiceId = exampleWindowsWebApp.Id,\n SiteConfig = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePlan, err := appservice.NewServicePlan(ctx, \"example\", \u0026appservice.ServicePlanArgs{\n\t\t\tName: pulumi.String(\"example-plan\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tOsType: pulumi.String(\"Windows\"),\n\t\t\tSkuName: pulumi.String(\"P1v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWindowsWebApp, err := appservice.NewWindowsWebApp(ctx, \"example\", \u0026appservice.WindowsWebAppArgs{\n\t\t\tName: pulumi.String(\"example-windows-web-app\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: exampleServicePlan.Location,\n\t\t\tServicePlanId: exampleServicePlan.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsWebAppSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = appservice.NewWindowsWebAppSlot(ctx, \"example\", \u0026appservice.WindowsWebAppSlotArgs{\n\t\t\tName: pulumi.String(\"example-slot\"),\n\t\t\tAppServiceId: exampleWindowsWebApp.ID(),\n\t\t\tSiteConfig: \u0026appservice.WindowsWebAppSlotSiteConfigArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appservice.ServicePlan;\nimport com.pulumi.azure.appservice.ServicePlanArgs;\nimport com.pulumi.azure.appservice.WindowsWebApp;\nimport com.pulumi.azure.appservice.WindowsWebAppArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSiteConfigArgs;\nimport com.pulumi.azure.appservice.WindowsWebAppSlot;\nimport com.pulumi.azure.appservice.WindowsWebAppSlotArgs;\nimport com.pulumi.azure.appservice.inputs.WindowsWebAppSlotSiteConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicePlan = new ServicePlan(\"exampleServicePlan\", ServicePlanArgs.builder()\n .name(\"example-plan\")\n .resourceGroupName(example.name())\n .location(example.location())\n .osType(\"Windows\")\n .skuName(\"P1v2\")\n .build());\n\n var exampleWindowsWebApp = new WindowsWebApp(\"exampleWindowsWebApp\", WindowsWebAppArgs.builder()\n .name(\"example-windows-web-app\")\n .resourceGroupName(example.name())\n .location(exampleServicePlan.location())\n .servicePlanId(exampleServicePlan.id())\n .siteConfig()\n .build());\n\n var exampleWindowsWebAppSlot = new WindowsWebAppSlot(\"exampleWindowsWebAppSlot\", WindowsWebAppSlotArgs.builder()\n .name(\"example-slot\")\n .appServiceId(exampleWindowsWebApp.id())\n .siteConfig()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicePlan:\n type: azure:appservice:ServicePlan\n name: example\n properties:\n name: example-plan\n resourceGroupName: ${example.name}\n location: ${example.location}\n osType: Windows\n skuName: P1v2\n exampleWindowsWebApp:\n type: azure:appservice:WindowsWebApp\n name: example\n properties:\n name: example-windows-web-app\n resourceGroupName: ${example.name}\n location: ${exampleServicePlan.location}\n servicePlanId: ${exampleServicePlan.id}\n siteConfig: {}\n exampleWindowsWebAppSlot:\n type: azure:appservice:WindowsWebAppSlot\n name: example\n properties:\n name: example-slot\n appServiceId: ${exampleWindowsWebApp.id}\n siteConfig: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWindows Web Apps can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:appservice/windowsWebAppSlot:WindowsWebAppSlot example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.Web/sites/site1/slots/slot1\n```\n\n", "properties": { "appServiceId": { "type": "string", @@ -125812,7 +125812,7 @@ } }, "azure:authorization/assignment:Assignment": { - "description": "Assigns a given Principal (User or Group) to a given Role.\n\n## Example Usage\n\n### Using A Built-In Role)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionName: \"Reader\",\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_assignment = azure.authorization.Assignment(\"example\",\n scope=primary.id,\n role_definition_name=\"Reader\",\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionName = \"Reader\",\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionName(\"Reader\")\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n scope: ${primary.id}\n roleDefinitionName: Reader\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 Service Principal)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary.id,\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primary.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 User)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary.id,\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primary.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 Management Group)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleGetGroup = azure.management.getGroup({\n name: \"00000000-0000-0000-0000-000000000000\",\n});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primaryAzurermManagementGroup.id,\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_get_group = azure.management.get_group(name=\"00000000-0000-0000-0000-000000000000\")\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary_azurerm_management_group[\"id\"],\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetGroup = Azure.Management.GetGroup.Invoke(new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n });\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primaryAzurermManagementGroup.Id,\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.LookupGroup(ctx, \u0026management.LookupGroupArgs{\n\t\t\tName: pulumi.StringRef(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.Any(primaryAzurermManagementGroup.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.ManagementFunctions;\nimport com.pulumi.azure.management.inputs.GetGroupArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetGroup = ManagementFunctions.getGroup(GetGroupArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .build());\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primaryAzurermManagementGroup.id())\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primaryAzurermManagementGroup.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetGroup:\n fn::invoke:\n Function: azure:management:getGroup\n Arguments:\n name: 00000000-0000-0000-0000-000000000000\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### ABAC Condition)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n roleDefinitionName: \"Role Based Access Control Administrator\",\n scope: primary.then(primary =\u003e primary.id),\n principalId: example.then(example =\u003e example.objectId),\n principalType: \"ServicePrincipal\",\n description: \"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n conditionVersion: \"2.0\",\n condition: Promise.all([builtin.then(builtin =\u003e std.basename({\n input: builtin.roleDefinitionId,\n })), builtin.then(builtin =\u003e std.basename({\n input: builtin.roleDefinitionId,\n }))]).then(([invoke, invoke1]) =\u003e `(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${invoke.result}}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${invoke1.result}}\n )\n)\n`),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nbuiltin = azure.authorization.get_role_definition(name=\"Reader\")\nexample_assignment = azure.authorization.Assignment(\"example\",\n role_definition_name=\"Role Based Access Control Administrator\",\n scope=primary.id,\n principal_id=example.object_id,\n principal_type=\"ServicePrincipal\",\n description=\"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n condition_version=\"2.0\",\n condition=f\"\"\"(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/write'}})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{std.basename(input=builtin.role_definition_id).result}}}\n )\n)\nAND\n(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/delete'}})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{std.basename(input=builtin.role_definition_id).result}}}\n )\n)\n\"\"\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n RoleDefinitionName = \"Role Based Access Control Administrator\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n PrincipalType = \"ServicePrincipal\",\n Description = \"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n ConditionVersion = \"2.0\",\n Condition = Output.Tuple(Std.Basename.Invoke(new()\n {\n Input = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n }), Std.Basename.Invoke(new()\n {\n Input = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n })).Apply(values =\u003e\n {\n var invoke = values.Item1;\n var invoke1 = values.Item2;\n return @$\"(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/write'}})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{invoke.Result}}}\n )\n)\nAND\n(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/delete'}})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{invoke1.Result}}}\n )\n)\n\";\n }),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeBasename, err := std.Basename(ctx, \u0026std.BasenameArgs{\n\t\t\tInput: builtin.RoleDefinitionId,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeBasename1, err := std.Basename(ctx, \u0026std.BasenameArgs{\n\t\t\tInput: builtin.RoleDefinitionId,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tRoleDefinitionName: pulumi.String(\"Role Based Access Control Administrator\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tPrincipalType: pulumi.String(\"ServicePrincipal\"),\n\t\t\tDescription: pulumi.String(\"Role Based Access Control Administrator role assignment with ABAC Condition.\"),\n\t\t\tConditionVersion: pulumi.String(\"2.0\"),\n\t\t\tCondition: pulumi.Sprintf(`(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%v}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%v}\n )\n)\n`, invokeBasename.Result, invokeBasename1.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .roleDefinitionName(\"Role Based Access Control Administrator\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .principalType(\"ServicePrincipal\")\n .description(\"Role Based Access Control Administrator role assignment with ABAC Condition.\")\n .conditionVersion(\"2.0\")\n .condition(\"\"\"\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%s}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%s}\n )\n)\n\", StdFunctions.basename(BasenameArgs.builder()\n .input(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .build()).result(),StdFunctions.basename(BasenameArgs.builder()\n .input(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .build()).result()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n roleDefinitionName: Role Based Access Control Administrator\n scope: ${primary.id}\n principalId: ${example.objectId}\n principalType: ServicePrincipal\n description: Role Based Access Control Administrator role assignment with ABAC Condition.\n conditionVersion: '2.0'\n condition:\n fn::join:\n -\n - - |-\n (\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {\n - fn::invoke:\n Function: std:basename\n Arguments:\n input: ${builtin.roleDefinitionId}\n Return: result\n - |-\n }\n )\n )\n AND\n (\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {\n - fn::invoke:\n Function: std:basename\n Arguments:\n input: ${builtin.roleDefinitionId}\n Return: result\n - |\n }\n )\n )\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n builtin:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRole Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:authorization/assignment:Assignment example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000\n```\n\n* for scope `Subscription`, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\n* for scope `Resource Group`, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\n* for scope referencing a Key Vault, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.KeyVault/vaults/vaultname/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\ntext\n\n/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000|00000000-0000-0000-0000-000000000000\n\n", + "description": "Assigns a given Principal (User or Group) to a given Role.\n\n## Example Usage\n\n### Using A Built-In Role)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionName: \"Reader\",\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_assignment = azure.authorization.Assignment(\"example\",\n scope=primary.id,\n role_definition_name=\"Reader\",\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionName = \"Reader\",\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionName(\"Reader\")\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n scope: ${primary.id}\n roleDefinitionName: Reader\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 Service Principal)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary.id,\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primary.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 User)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary.id,\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primary.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 Management Group)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleGetGroup = azure.management.getGroup({\n name: \"00000000-0000-0000-0000-000000000000\",\n});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primaryAzurermManagementGroup.id,\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_get_group = azure.management.get_group(name=\"00000000-0000-0000-0000-000000000000\")\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary_azurerm_management_group[\"id\"],\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetGroup = Azure.Management.GetGroup.Invoke(new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n });\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primaryAzurermManagementGroup.Id,\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.LookupGroup(ctx, \u0026management.LookupGroupArgs{\n\t\t\tName: pulumi.StringRef(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.Any(primaryAzurermManagementGroup.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.ManagementFunctions;\nimport com.pulumi.azure.management.inputs.GetGroupArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetGroup = ManagementFunctions.getGroup(GetGroupArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .build());\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primaryAzurermManagementGroup.id())\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primaryAzurermManagementGroup.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetGroup:\n fn::invoke:\n Function: azure:management:getGroup\n Arguments:\n name: 00000000-0000-0000-0000-000000000000\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### ABAC Condition)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n roleDefinitionName: \"Role Based Access Control Administrator\",\n scope: primary.then(primary =\u003e primary.id),\n principalId: example.then(example =\u003e example.objectId),\n principalType: \"ServicePrincipal\",\n description: \"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n conditionVersion: \"2.0\",\n condition: Promise.all([builtin.then(builtin =\u003e std.basename({\n input: builtin.roleDefinitionId,\n })), builtin.then(builtin =\u003e std.basename({\n input: builtin.roleDefinitionId,\n }))]).then(([invoke, invoke1]) =\u003e `(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${invoke.result}}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${invoke1.result}}\n )\n)\n`),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nbuiltin = azure.authorization.get_role_definition(name=\"Reader\")\nexample_assignment = azure.authorization.Assignment(\"example\",\n role_definition_name=\"Role Based Access Control Administrator\",\n scope=primary.id,\n principal_id=example.object_id,\n principal_type=\"ServicePrincipal\",\n description=\"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n condition_version=\"2.0\",\n condition=f\"\"\"(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/write'}})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{std.basename(input=builtin.role_definition_id).result}}}\n )\n)\nAND\n(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/delete'}})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{std.basename(input=builtin.role_definition_id).result}}}\n )\n)\n\"\"\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n RoleDefinitionName = \"Role Based Access Control Administrator\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n PrincipalType = \"ServicePrincipal\",\n Description = \"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n ConditionVersion = \"2.0\",\n Condition = Output.Tuple(Std.Basename.Invoke(new()\n {\n Input = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n }), Std.Basename.Invoke(new()\n {\n Input = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n })).Apply(values =\u003e\n {\n var invoke = values.Item1;\n var invoke1 = values.Item2;\n return @$\"(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/write'}})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{invoke.Result}}}\n )\n)\nAND\n(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/delete'}})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{invoke1.Result}}}\n )\n)\n\";\n }),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeBasename, err := std.Basename(ctx, \u0026std.BasenameArgs{\n\t\t\tInput: builtin.RoleDefinitionId,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeBasename1, err := std.Basename(ctx, \u0026std.BasenameArgs{\n\t\t\tInput: builtin.RoleDefinitionId,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tRoleDefinitionName: pulumi.String(\"Role Based Access Control Administrator\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tPrincipalType: pulumi.String(\"ServicePrincipal\"),\n\t\t\tDescription: pulumi.String(\"Role Based Access Control Administrator role assignment with ABAC Condition.\"),\n\t\t\tConditionVersion: pulumi.String(\"2.0\"),\n\t\t\tCondition: pulumi.Sprintf(`(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%v}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%v}\n )\n)\n`, invokeBasename.Result, invokeBasename1.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .roleDefinitionName(\"Role Based Access Control Administrator\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .principalType(\"ServicePrincipal\")\n .description(\"Role Based Access Control Administrator role assignment with ABAC Condition.\")\n .conditionVersion(\"2.0\")\n .condition(\"\"\"\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%s}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%s}\n )\n)\n\", StdFunctions.basename(BasenameArgs.builder()\n .input(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .build()).result(),StdFunctions.basename(BasenameArgs.builder()\n .input(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .build()).result()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n roleDefinitionName: Role Based Access Control Administrator\n scope: ${primary.id}\n principalId: ${example.objectId}\n principalType: ServicePrincipal\n description: Role Based Access Control Administrator role assignment with ABAC Condition.\n conditionVersion: '2.0'\n condition:\n fn::join:\n -\n - - |-\n (\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {\n - fn::invoke:\n Function: std:basename\n Arguments:\n input: ${builtin.roleDefinitionId}\n Return: result\n - |-\n }\n )\n )\n AND\n (\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {\n - fn::invoke:\n Function: std:basename\n Arguments:\n input: ${builtin.roleDefinitionId}\n Return: result\n - |\n }\n )\n )\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n builtin:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRole Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:authorization/assignment:Assignment example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000\n```\n\n* for scope `Subscription`, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\n* for scope `Resource Group`, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\n* for scope referencing a Key Vault, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.KeyVault/vaults/vaultname/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\ntext\n\n/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000|00000000-0000-0000-0000-000000000000\n\n", "properties": { "condition": { "type": "string", @@ -125995,7 +125995,7 @@ ] }, "azure:authorization/roleDefinition:RoleDefinition": { - "description": "Manages a custom Role Definition, used to assign Roles to Users/Principals. See ['Understand role definitions'](https://docs.microsoft.com/azure/role-based-access-control/role-definitions) in the Azure documentation for more details.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = new azure.authorization.RoleDefinition(\"example\", {\n name: \"my-custom-role\",\n scope: primary.then(primary =\u003e primary.id),\n description: \"This is a custom role created\",\n permissions: [{\n actions: [\"*\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.authorization.RoleDefinition(\"example\",\n name=\"my-custom-role\",\n scope=primary.id,\n description=\"This is a custom role created\",\n permissions=[{\n \"actions\": [\"*\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n Name = \"my-custom-role\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Description = \"This is a custom role created\",\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"*\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tName: pulumi.String(\"my-custom-role\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tDescription: pulumi.String(\"This is a custom role created\"),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"*\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var example = new RoleDefinition(\"example\", RoleDefinitionArgs.builder()\n .name(\"my-custom-role\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .description(\"This is a custom role created\")\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"*\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:authorization:RoleDefinition\n properties:\n name: my-custom-role\n scope: ${primary.id}\n description: This is a custom role created\n permissions:\n - actions:\n - '*'\n notActions: []\n assignableScopes:\n - ${primary.id}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRole Definitions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:authorization/roleDefinition:RoleDefinition example \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/00000000-0000-0000-0000-000000000000|/subscriptions/00000000-0000-0000-0000-000000000000\"\n```\n\n", + "description": "Manages a custom Role Definition, used to assign Roles to Users/Principals. See ['Understand role definitions'](https://docs.microsoft.com/azure/role-based-access-control/role-definitions) in the Azure documentation for more details.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = new azure.authorization.RoleDefinition(\"example\", {\n name: \"my-custom-role\",\n scope: primary.then(primary =\u003e primary.id),\n description: \"This is a custom role created\",\n permissions: [{\n actions: [\"*\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.authorization.RoleDefinition(\"example\",\n name=\"my-custom-role\",\n scope=primary.id,\n description=\"This is a custom role created\",\n permissions=[{\n \"actions\": [\"*\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n Name = \"my-custom-role\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Description = \"This is a custom role created\",\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"*\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tName: pulumi.String(\"my-custom-role\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tDescription: pulumi.String(\"This is a custom role created\"),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"*\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var example = new RoleDefinition(\"example\", RoleDefinitionArgs.builder()\n .name(\"my-custom-role\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .description(\"This is a custom role created\")\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"*\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:authorization:RoleDefinition\n properties:\n name: my-custom-role\n scope: ${primary.id}\n description: This is a custom role created\n permissions:\n - actions:\n - '*'\n notActions: []\n assignableScopes:\n - ${primary.id}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRole Definitions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:authorization/roleDefinition:RoleDefinition example \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/00000000-0000-0000-0000-000000000000|/subscriptions/00000000-0000-0000-0000-000000000000\"\n```\n\n", "properties": { "assignableScopes": { "type": "array", @@ -126848,7 +126848,7 @@ } }, "azure:automation/connection:Connection": { - "description": "Manages an Automation Connection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleConnection = new azure.automation.Connection(\"example\", {\n name: \"connection-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n type: \"AzureServicePrincipal\",\n values: {\n ApplicationId: \"00000000-0000-0000-0000-000000000000\",\n TenantId: example.then(example =\u003e example.tenantId),\n SubscriptionId: example.then(example =\u003e example.subscriptionId),\n CertificateThumbprint: \"sample-certificate-thumbprint\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_connection = azure.automation.Connection(\"example\",\n name=\"connection-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n type=\"AzureServicePrincipal\",\n values={\n \"ApplicationId\": \"00000000-0000-0000-0000-000000000000\",\n \"TenantId\": example.tenant_id,\n \"SubscriptionId\": example.subscription_id,\n \"CertificateThumbprint\": \"sample-certificate-thumbprint\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleConnection = new Azure.Automation.Connection(\"example\", new()\n {\n Name = \"connection-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n Type = \"AzureServicePrincipal\",\n Values = \n {\n { \"ApplicationId\", \"00000000-0000-0000-0000-000000000000\" },\n { \"TenantId\", example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId) },\n { \"SubscriptionId\", example.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId) },\n { \"CertificateThumbprint\", \"sample-certificate-thumbprint\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnection(ctx, \"example\", \u0026automation.ConnectionArgs{\n\t\t\tName: pulumi.String(\"connection-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tType: pulumi.String(\"AzureServicePrincipal\"),\n\t\t\tValues: pulumi.StringMap{\n\t\t\t\t\"ApplicationId\": pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t\t\"TenantId\": pulumi.String(example.TenantId),\n\t\t\t\t\"SubscriptionId\": pulumi.String(example.SubscriptionId),\n\t\t\t\t\"CertificateThumbprint\": pulumi.String(\"sample-certificate-thumbprint\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.Connection;\nimport com.pulumi.azure.automation.ConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleConnection = new Connection(\"exampleConnection\", ConnectionArgs.builder()\n .name(\"connection-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .type(\"AzureServicePrincipal\")\n .values(Map.ofEntries(\n Map.entry(\"ApplicationId\", \"00000000-0000-0000-0000-000000000000\"),\n Map.entry(\"TenantId\", example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId())),\n Map.entry(\"SubscriptionId\", example.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())),\n Map.entry(\"CertificateThumbprint\", \"sample-certificate-thumbprint\")\n ))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleConnection:\n type: azure:automation:Connection\n name: example\n properties:\n name: connection-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n type: AzureServicePrincipal\n values:\n ApplicationId: 00000000-0000-0000-0000-000000000000\n TenantId: ${example.tenantId}\n SubscriptionId: ${example.subscriptionId}\n CertificateThumbprint: sample-certificate-thumbprint\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomation Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connection:Connection example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connections/conn1\n```\n\n", + "description": "Manages an Automation Connection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleConnection = new azure.automation.Connection(\"example\", {\n name: \"connection-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n type: \"AzureServicePrincipal\",\n values: {\n ApplicationId: \"00000000-0000-0000-0000-000000000000\",\n TenantId: example.then(example =\u003e example.tenantId),\n SubscriptionId: example.then(example =\u003e example.subscriptionId),\n CertificateThumbprint: \"sample-certificate-thumbprint\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_connection = azure.automation.Connection(\"example\",\n name=\"connection-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n type=\"AzureServicePrincipal\",\n values={\n \"ApplicationId\": \"00000000-0000-0000-0000-000000000000\",\n \"TenantId\": example.tenant_id,\n \"SubscriptionId\": example.subscription_id,\n \"CertificateThumbprint\": \"sample-certificate-thumbprint\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleConnection = new Azure.Automation.Connection(\"example\", new()\n {\n Name = \"connection-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n Type = \"AzureServicePrincipal\",\n Values = \n {\n { \"ApplicationId\", \"00000000-0000-0000-0000-000000000000\" },\n { \"TenantId\", example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId) },\n { \"SubscriptionId\", example.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId) },\n { \"CertificateThumbprint\", \"sample-certificate-thumbprint\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnection(ctx, \"example\", \u0026automation.ConnectionArgs{\n\t\t\tName: pulumi.String(\"connection-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tType: pulumi.String(\"AzureServicePrincipal\"),\n\t\t\tValues: pulumi.StringMap{\n\t\t\t\t\"ApplicationId\": pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t\t\"TenantId\": pulumi.String(example.TenantId),\n\t\t\t\t\"SubscriptionId\": pulumi.String(example.SubscriptionId),\n\t\t\t\t\"CertificateThumbprint\": pulumi.String(\"sample-certificate-thumbprint\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.Connection;\nimport com.pulumi.azure.automation.ConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleConnection = new Connection(\"exampleConnection\", ConnectionArgs.builder()\n .name(\"connection-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .type(\"AzureServicePrincipal\")\n .values(Map.ofEntries(\n Map.entry(\"ApplicationId\", \"00000000-0000-0000-0000-000000000000\"),\n Map.entry(\"TenantId\", example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId())),\n Map.entry(\"SubscriptionId\", example.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())),\n Map.entry(\"CertificateThumbprint\", \"sample-certificate-thumbprint\")\n ))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleConnection:\n type: azure:automation:Connection\n name: example\n properties:\n name: connection-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n type: AzureServicePrincipal\n values:\n ApplicationId: 00000000-0000-0000-0000-000000000000\n TenantId: ${example.tenantId}\n SubscriptionId: ${example.subscriptionId}\n CertificateThumbprint: sample-certificate-thumbprint\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomation Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connection:Connection example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connections/conn1\n```\n\n", "properties": { "automationAccountName": { "type": "string", @@ -126963,7 +126963,7 @@ } }, "azure:automation/connectionCertificate:ConnectionCertificate": { - "description": "Manages an Automation Connection with type `Azure`.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleCertificate = new azure.automation.Certificate(\"example\", {\n name: \"certificate-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n base64: std.filebase64({\n input: \"certificate.pfx\",\n }).then(invoke =\u003e invoke.result),\n});\nconst exampleConnectionCertificate = new azure.automation.ConnectionCertificate(\"example\", {\n name: \"connection-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n automationCertificateName: exampleCertificate.name,\n subscriptionId: example.then(example =\u003e example.subscriptionId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_certificate = azure.automation.Certificate(\"example\",\n name=\"certificate-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n base64=std.filebase64(input=\"certificate.pfx\").result)\nexample_connection_certificate = azure.automation.ConnectionCertificate(\"example\",\n name=\"connection-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n automation_certificate_name=example_certificate.name,\n subscription_id=example.subscription_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleCertificate = new Azure.Automation.Certificate(\"example\", new()\n {\n Name = \"certificate-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n Base64 = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n var exampleConnectionCertificate = new Azure.Automation.ConnectionCertificate(\"example\", new()\n {\n Name = \"connection-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n AutomationCertificateName = exampleCertificate.Name,\n SubscriptionId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := automation.NewCertificate(ctx, \"example\", \u0026automation.CertificateArgs{\n\t\t\tName: pulumi.String(\"certificate-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tBase64: pulumi.String(invokeFilebase64.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnectionCertificate(ctx, \"example\", \u0026automation.ConnectionCertificateArgs{\n\t\t\tName: pulumi.String(\"connection-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tAutomationCertificateName: exampleCertificate.Name,\n\t\t\tSubscriptionId: pulumi.String(example.SubscriptionId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.Certificate;\nimport com.pulumi.azure.automation.CertificateArgs;\nimport com.pulumi.azure.automation.ConnectionCertificate;\nimport com.pulumi.azure.automation.ConnectionCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"certificate-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .base64(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate.pfx\")\n .build()).result())\n .build());\n\n var exampleConnectionCertificate = new ConnectionCertificate(\"exampleConnectionCertificate\", ConnectionCertificateArgs.builder()\n .name(\"connection-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .automationCertificateName(exampleCertificate.name())\n .subscriptionId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleCertificate:\n type: azure:automation:Certificate\n name: example\n properties:\n name: certificate-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n base64:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate.pfx\n Return: result\n exampleConnectionCertificate:\n type: azure:automation:ConnectionCertificate\n name: example\n properties:\n name: connection-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n automationCertificateName: ${exampleCertificate.name}\n subscriptionId: ${example.subscriptionId}\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomation Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connectionCertificate:ConnectionCertificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connections/conn1\n```\n\n", + "description": "Manages an Automation Connection with type `Azure`.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleCertificate = new azure.automation.Certificate(\"example\", {\n name: \"certificate-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n base64: std.filebase64({\n input: \"certificate.pfx\",\n }).then(invoke =\u003e invoke.result),\n});\nconst exampleConnectionCertificate = new azure.automation.ConnectionCertificate(\"example\", {\n name: \"connection-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n automationCertificateName: exampleCertificate.name,\n subscriptionId: example.then(example =\u003e example.subscriptionId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_certificate = azure.automation.Certificate(\"example\",\n name=\"certificate-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n base64=std.filebase64(input=\"certificate.pfx\").result)\nexample_connection_certificate = azure.automation.ConnectionCertificate(\"example\",\n name=\"connection-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n automation_certificate_name=example_certificate.name,\n subscription_id=example.subscription_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleCertificate = new Azure.Automation.Certificate(\"example\", new()\n {\n Name = \"certificate-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n Base64 = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n var exampleConnectionCertificate = new Azure.Automation.ConnectionCertificate(\"example\", new()\n {\n Name = \"connection-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n AutomationCertificateName = exampleCertificate.Name,\n SubscriptionId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := automation.NewCertificate(ctx, \"example\", \u0026automation.CertificateArgs{\n\t\t\tName: pulumi.String(\"certificate-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tBase64: pulumi.String(invokeFilebase64.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnectionCertificate(ctx, \"example\", \u0026automation.ConnectionCertificateArgs{\n\t\t\tName: pulumi.String(\"connection-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tAutomationCertificateName: exampleCertificate.Name,\n\t\t\tSubscriptionId: pulumi.String(example.SubscriptionId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.Certificate;\nimport com.pulumi.azure.automation.CertificateArgs;\nimport com.pulumi.azure.automation.ConnectionCertificate;\nimport com.pulumi.azure.automation.ConnectionCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"certificate-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .base64(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate.pfx\")\n .build()).result())\n .build());\n\n var exampleConnectionCertificate = new ConnectionCertificate(\"exampleConnectionCertificate\", ConnectionCertificateArgs.builder()\n .name(\"connection-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .automationCertificateName(exampleCertificate.name())\n .subscriptionId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleCertificate:\n type: azure:automation:Certificate\n name: example\n properties:\n name: certificate-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n base64:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate.pfx\n Return: result\n exampleConnectionCertificate:\n type: azure:automation:ConnectionCertificate\n name: example\n properties:\n name: connection-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n automationCertificateName: ${exampleCertificate.name}\n subscriptionId: ${example.subscriptionId}\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomation Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connectionCertificate:ConnectionCertificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connections/conn1\n```\n\n", "properties": { "automationAccountName": { "type": "string", @@ -127067,7 +127067,7 @@ } }, "azure:automation/connectionClassicCertificate:ConnectionClassicCertificate": { - "description": "Manages an Automation Connection with type `AzureClassicCertificate`.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleConnectionClassicCertificate = new azure.automation.ConnectionClassicCertificate(\"example\", {\n name: \"connection-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n certificateAssetName: \"cert1\",\n subscriptionName: \"subs1\",\n subscriptionId: example.then(example =\u003e example.subscriptionId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_connection_classic_certificate = azure.automation.ConnectionClassicCertificate(\"example\",\n name=\"connection-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n certificate_asset_name=\"cert1\",\n subscription_name=\"subs1\",\n subscription_id=example.subscription_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleConnectionClassicCertificate = new Azure.Automation.ConnectionClassicCertificate(\"example\", new()\n {\n Name = \"connection-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n CertificateAssetName = \"cert1\",\n SubscriptionName = \"subs1\",\n SubscriptionId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnectionClassicCertificate(ctx, \"example\", \u0026automation.ConnectionClassicCertificateArgs{\n\t\t\tName: pulumi.String(\"connection-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tCertificateAssetName: pulumi.String(\"cert1\"),\n\t\t\tSubscriptionName: pulumi.String(\"subs1\"),\n\t\t\tSubscriptionId: pulumi.String(example.SubscriptionId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.ConnectionClassicCertificate;\nimport com.pulumi.azure.automation.ConnectionClassicCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleConnectionClassicCertificate = new ConnectionClassicCertificate(\"exampleConnectionClassicCertificate\", ConnectionClassicCertificateArgs.builder()\n .name(\"connection-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .certificateAssetName(\"cert1\")\n .subscriptionName(\"subs1\")\n .subscriptionId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleConnectionClassicCertificate:\n type: azure:automation:ConnectionClassicCertificate\n name: example\n properties:\n name: connection-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n certificateAssetName: cert1\n subscriptionName: subs1\n subscriptionId: ${example.subscriptionId}\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomation Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connectionClassicCertificate:ConnectionClassicCertificate conn1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connections/conn1\n```\n\n", + "description": "Manages an Automation Connection with type `AzureClassicCertificate`.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleConnectionClassicCertificate = new azure.automation.ConnectionClassicCertificate(\"example\", {\n name: \"connection-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n certificateAssetName: \"cert1\",\n subscriptionName: \"subs1\",\n subscriptionId: example.then(example =\u003e example.subscriptionId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_connection_classic_certificate = azure.automation.ConnectionClassicCertificate(\"example\",\n name=\"connection-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n certificate_asset_name=\"cert1\",\n subscription_name=\"subs1\",\n subscription_id=example.subscription_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleConnectionClassicCertificate = new Azure.Automation.ConnectionClassicCertificate(\"example\", new()\n {\n Name = \"connection-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n CertificateAssetName = \"cert1\",\n SubscriptionName = \"subs1\",\n SubscriptionId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnectionClassicCertificate(ctx, \"example\", \u0026automation.ConnectionClassicCertificateArgs{\n\t\t\tName: pulumi.String(\"connection-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tCertificateAssetName: pulumi.String(\"cert1\"),\n\t\t\tSubscriptionName: pulumi.String(\"subs1\"),\n\t\t\tSubscriptionId: pulumi.String(example.SubscriptionId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.ConnectionClassicCertificate;\nimport com.pulumi.azure.automation.ConnectionClassicCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleConnectionClassicCertificate = new ConnectionClassicCertificate(\"exampleConnectionClassicCertificate\", ConnectionClassicCertificateArgs.builder()\n .name(\"connection-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .certificateAssetName(\"cert1\")\n .subscriptionName(\"subs1\")\n .subscriptionId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleConnectionClassicCertificate:\n type: azure:automation:ConnectionClassicCertificate\n name: example\n properties:\n name: connection-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n certificateAssetName: cert1\n subscriptionName: subs1\n subscriptionId: ${example.subscriptionId}\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomation Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connectionClassicCertificate:ConnectionClassicCertificate conn1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connections/conn1\n```\n\n", "properties": { "automationAccountName": { "type": "string", @@ -127185,7 +127185,7 @@ } }, "azure:automation/connectionServicePrincipal:ConnectionServicePrincipal": { - "description": "Manages an Automation Connection with type `AzureServicePrincipal`.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleConnectionServicePrincipal = new azure.automation.ConnectionServicePrincipal(\"example\", {\n name: \"connection-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n applicationId: \"00000000-0000-0000-0000-000000000000\",\n tenantId: example.then(example =\u003e example.tenantId),\n subscriptionId: example.then(example =\u003e example.subscriptionId),\n certificateThumbprint: std.file({\n input: \"automation_certificate_test.thumb\",\n }).then(invoke =\u003e invoke.result),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_connection_service_principal = azure.automation.ConnectionServicePrincipal(\"example\",\n name=\"connection-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n application_id=\"00000000-0000-0000-0000-000000000000\",\n tenant_id=example.tenant_id,\n subscription_id=example.subscription_id,\n certificate_thumbprint=std.file(input=\"automation_certificate_test.thumb\").result)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleConnectionServicePrincipal = new Azure.Automation.ConnectionServicePrincipal(\"example\", new()\n {\n Name = \"connection-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n ApplicationId = \"00000000-0000-0000-0000-000000000000\",\n TenantId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SubscriptionId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId),\n CertificateThumbprint = Std.File.Invoke(new()\n {\n Input = \"automation_certificate_test.thumb\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"automation_certificate_test.thumb\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnectionServicePrincipal(ctx, \"example\", \u0026automation.ConnectionServicePrincipalArgs{\n\t\t\tName: pulumi.String(\"connection-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tApplicationId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tTenantId: pulumi.String(example.TenantId),\n\t\t\tSubscriptionId: pulumi.String(example.SubscriptionId),\n\t\t\tCertificateThumbprint: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.ConnectionServicePrincipal;\nimport com.pulumi.azure.automation.ConnectionServicePrincipalArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleConnectionServicePrincipal = new ConnectionServicePrincipal(\"exampleConnectionServicePrincipal\", ConnectionServicePrincipalArgs.builder()\n .name(\"connection-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .applicationId(\"00000000-0000-0000-0000-000000000000\")\n .tenantId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .subscriptionId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()))\n .certificateThumbprint(StdFunctions.file(FileArgs.builder()\n .input(\"automation_certificate_test.thumb\")\n .build()).result())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleConnectionServicePrincipal:\n type: azure:automation:ConnectionServicePrincipal\n name: example\n properties:\n name: connection-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n applicationId: 00000000-0000-0000-0000-000000000000\n tenantId: ${example.tenantId}\n subscriptionId: ${example.subscriptionId}\n certificateThumbprint:\n fn::invoke:\n Function: std:file\n Arguments:\n input: automation_certificate_test.thumb\n Return: result\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomation Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connectionServicePrincipal:ConnectionServicePrincipal conn1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connections/conn1\n```\n\n", + "description": "Manages an Automation Connection with type `AzureServicePrincipal`.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleConnectionServicePrincipal = new azure.automation.ConnectionServicePrincipal(\"example\", {\n name: \"connection-example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n applicationId: \"00000000-0000-0000-0000-000000000000\",\n tenantId: example.then(example =\u003e example.tenantId),\n subscriptionId: example.then(example =\u003e example.subscriptionId),\n certificateThumbprint: std.file({\n input: \"automation_certificate_test.thumb\",\n }).then(invoke =\u003e invoke.result),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_connection_service_principal = azure.automation.ConnectionServicePrincipal(\"example\",\n name=\"connection-example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n application_id=\"00000000-0000-0000-0000-000000000000\",\n tenant_id=example.tenant_id,\n subscription_id=example.subscription_id,\n certificate_thumbprint=std.file(input=\"automation_certificate_test.thumb\").result)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleConnectionServicePrincipal = new Azure.Automation.ConnectionServicePrincipal(\"example\", new()\n {\n Name = \"connection-example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n ApplicationId = \"00000000-0000-0000-0000-000000000000\",\n TenantId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SubscriptionId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId),\n CertificateThumbprint = Std.File.Invoke(new()\n {\n Input = \"automation_certificate_test.thumb\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"automation_certificate_test.thumb\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnectionServicePrincipal(ctx, \"example\", \u0026automation.ConnectionServicePrincipalArgs{\n\t\t\tName: pulumi.String(\"connection-example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tApplicationId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tTenantId: pulumi.String(example.TenantId),\n\t\t\tSubscriptionId: pulumi.String(example.SubscriptionId),\n\t\t\tCertificateThumbprint: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.ConnectionServicePrincipal;\nimport com.pulumi.azure.automation.ConnectionServicePrincipalArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleConnectionServicePrincipal = new ConnectionServicePrincipal(\"exampleConnectionServicePrincipal\", ConnectionServicePrincipalArgs.builder()\n .name(\"connection-example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .applicationId(\"00000000-0000-0000-0000-000000000000\")\n .tenantId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .subscriptionId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()))\n .certificateThumbprint(StdFunctions.file(FileArgs.builder()\n .input(\"automation_certificate_test.thumb\")\n .build()).result())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleConnectionServicePrincipal:\n type: azure:automation:ConnectionServicePrincipal\n name: example\n properties:\n name: connection-example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n applicationId: 00000000-0000-0000-0000-000000000000\n tenantId: ${example.tenantId}\n subscriptionId: ${example.subscriptionId}\n certificateThumbprint:\n fn::invoke:\n Function: std:file\n Arguments:\n input: automation_certificate_test.thumb\n Return: result\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomation Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connectionServicePrincipal:ConnectionServicePrincipal conn1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connections/conn1\n```\n\n", "properties": { "applicationId": { "type": "string", @@ -127317,7 +127317,7 @@ } }, "azure:automation/connectionType:ConnectionType": { - "description": "Manages anAutomation Connection Type.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleConnectionType = new azure.automation.ConnectionType(\"example\", {\n name: \"example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n fields: [{\n name: \"example\",\n type: \"string\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_connection_type = azure.automation.ConnectionType(\"example\",\n name=\"example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n fields=[{\n \"name\": \"example\",\n \"type\": \"string\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleConnectionType = new Azure.Automation.ConnectionType(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n Fields = new[]\n {\n new Azure.Automation.Inputs.ConnectionTypeFieldArgs\n {\n Name = \"example\",\n Type = \"string\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnectionType(ctx, \"example\", \u0026automation.ConnectionTypeArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tFields: automation.ConnectionTypeFieldArray{\n\t\t\t\t\u0026automation.ConnectionTypeFieldArgs{\n\t\t\t\t\tName: pulumi.String(\"example\"),\n\t\t\t\t\tType: pulumi.String(\"string\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.ConnectionType;\nimport com.pulumi.azure.automation.ConnectionTypeArgs;\nimport com.pulumi.azure.automation.inputs.ConnectionTypeFieldArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleConnectionType = new ConnectionType(\"exampleConnectionType\", ConnectionTypeArgs.builder()\n .name(\"example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .fields(ConnectionTypeFieldArgs.builder()\n .name(\"example\")\n .type(\"string\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleConnectionType:\n type: azure:automation:ConnectionType\n name: example\n properties:\n name: example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n fields:\n - name: example\n type: string\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomations can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connectionType:ConnectionType example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connectionTypes/type1\n```\n\n", + "description": "Manages anAutomation Connection Type.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"resourceGroup-example\",\n location: \"West Europe\",\n});\nconst example = azure.core.getClientConfig({});\nconst exampleAccount = new azure.automation.Account(\"example\", {\n name: \"account-example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n skuName: \"Basic\",\n});\nconst exampleConnectionType = new azure.automation.ConnectionType(\"example\", {\n name: \"example\",\n resourceGroupName: exampleResourceGroup.name,\n automationAccountName: exampleAccount.name,\n fields: [{\n name: \"example\",\n type: \"string\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"resourceGroup-example\",\n location=\"West Europe\")\nexample = azure.core.get_client_config()\nexample_account = azure.automation.Account(\"example\",\n name=\"account-example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n sku_name=\"Basic\")\nexample_connection_type = azure.automation.ConnectionType(\"example\",\n name=\"example\",\n resource_group_name=example_resource_group.name,\n automation_account_name=example_account.name,\n fields=[{\n \"name\": \"example\",\n \"type\": \"string\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"resourceGroup-example\",\n Location = \"West Europe\",\n });\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAccount = new Azure.Automation.Account(\"example\", new()\n {\n Name = \"account-example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n SkuName = \"Basic\",\n });\n\n var exampleConnectionType = new Azure.Automation.ConnectionType(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = exampleResourceGroup.Name,\n AutomationAccountName = exampleAccount.Name,\n Fields = new[]\n {\n new Azure.Automation.Inputs.ConnectionTypeFieldArgs\n {\n Name = \"example\",\n Type = \"string\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/automation\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"resourceGroup-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := automation.NewAccount(ctx, \"example\", \u0026automation.AccountArgs{\n\t\t\tName: pulumi.String(\"account-example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tSkuName: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = automation.NewConnectionType(ctx, \"example\", \u0026automation.ConnectionTypeArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAutomationAccountName: exampleAccount.Name,\n\t\t\tFields: automation.ConnectionTypeFieldArray{\n\t\t\t\t\u0026automation.ConnectionTypeFieldArgs{\n\t\t\t\t\tName: pulumi.String(\"example\"),\n\t\t\t\t\tType: pulumi.String(\"string\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.automation.Account;\nimport com.pulumi.azure.automation.AccountArgs;\nimport com.pulumi.azure.automation.ConnectionType;\nimport com.pulumi.azure.automation.ConnectionTypeArgs;\nimport com.pulumi.azure.automation.inputs.ConnectionTypeFieldArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"resourceGroup-example\")\n .location(\"West Europe\")\n .build());\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"account-example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .skuName(\"Basic\")\n .build());\n\n var exampleConnectionType = new ConnectionType(\"exampleConnectionType\", ConnectionTypeArgs.builder()\n .name(\"example\")\n .resourceGroupName(exampleResourceGroup.name())\n .automationAccountName(exampleAccount.name())\n .fields(ConnectionTypeFieldArgs.builder()\n .name(\"example\")\n .type(\"string\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: resourceGroup-example\n location: West Europe\n exampleAccount:\n type: azure:automation:Account\n name: example\n properties:\n name: account-example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n skuName: Basic\n exampleConnectionType:\n type: azure:automation:ConnectionType\n name: example\n properties:\n name: example\n resourceGroupName: ${exampleResourceGroup.name}\n automationAccountName: ${exampleAccount.name}\n fields:\n - name: example\n type: string\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAutomations can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:automation/connectionType:ConnectionType example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.Automation/automationAccounts/account1/connectionTypes/type1\n```\n\n", "properties": { "automationAccountName": { "type": "string", @@ -132393,7 +132393,7 @@ } }, "azure:blueprint/assignment:Assignment": { - "description": "Manages a Blueprint Assignment resource\n\n\u003e **NOTE:** Azure Blueprints are in Preview and potentially subject to breaking change without notice.\n\n\u003e **NOTE:** Azure Blueprint Assignments can only be applied to Subscriptions. Assignments to Management Groups is not currently supported by the service or by this provider.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = azure.core.getSubscription({});\nconst exampleGetDefinition = example.then(example =\u003e azure.blueprint.getDefinition({\n name: \"exampleBlueprint\",\n scopeId: example.id,\n}));\nconst exampleGetPublishedVersion = Promise.all([exampleGetDefinition, exampleGetDefinition]).then(([exampleGetDefinition, exampleGetDefinition1]) =\u003e azure.blueprint.getPublishedVersion({\n scopeId: exampleGetDefinition.scopeId,\n blueprintName: exampleGetDefinition1.name,\n version: \"v1.0.0\",\n}));\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"exampleRG-bp\",\n location: \"West Europe\",\n tags: {\n Environment: \"example\",\n },\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n name: \"bp-user-example\",\n});\nconst operator = new azure.authorization.Assignment(\"operator\", {\n scope: example.then(example =\u003e example.id),\n roleDefinitionName: \"Blueprint Operator\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst owner = new azure.authorization.Assignment(\"owner\", {\n scope: example.then(example =\u003e example.id),\n roleDefinitionName: \"Owner\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst exampleAssignment = new azure.blueprint.Assignment(\"example\", {\n name: \"testAccBPAssignment\",\n targetSubscriptionId: example.then(example =\u003e example.id),\n versionId: exampleGetPublishedVersion.then(exampleGetPublishedVersion =\u003e exampleGetPublishedVersion.id),\n location: exampleResourceGroup.location,\n lockMode: \"AllResourcesDoNotDelete\",\n lockExcludePrincipals: [current.then(current =\u003e current.objectId)],\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n resourceGroups: ` {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n`,\n parameterValues: ` {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n`,\n}, {\n dependsOn: [\n operator,\n owner,\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.get_subscription()\nexample_get_definition = azure.blueprint.get_definition(name=\"exampleBlueprint\",\n scope_id=example.id)\nexample_get_published_version = azure.blueprint.get_published_version(scope_id=example_get_definition.scope_id,\n blueprint_name=example_get_definition.name,\n version=\"v1.0.0\")\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"exampleRG-bp\",\n location=\"West Europe\",\n tags={\n \"Environment\": \"example\",\n })\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n name=\"bp-user-example\")\noperator = azure.authorization.Assignment(\"operator\",\n scope=example.id,\n role_definition_name=\"Blueprint Operator\",\n principal_id=example_user_assigned_identity.principal_id)\nowner = azure.authorization.Assignment(\"owner\",\n scope=example.id,\n role_definition_name=\"Owner\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_assignment = azure.blueprint.Assignment(\"example\",\n name=\"testAccBPAssignment\",\n target_subscription_id=example.id,\n version_id=example_get_published_version.id,\n location=example_resource_group.location,\n lock_mode=\"AllResourcesDoNotDelete\",\n lock_exclude_principals=[current.object_id],\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n resource_groups=\"\"\" {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n\"\"\",\n parameter_values=\"\"\" {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[\n operator,\n owner,\n ]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = Azure.Core.GetSubscription.Invoke();\n\n var exampleGetDefinition = Azure.Blueprint.GetDefinition.Invoke(new()\n {\n Name = \"exampleBlueprint\",\n ScopeId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var exampleGetPublishedVersion = Azure.Blueprint.GetPublishedVersion.Invoke(new()\n {\n ScopeId = exampleGetDefinition.Apply(getDefinitionResult =\u003e getDefinitionResult.ScopeId),\n BlueprintName = exampleGetDefinition.Apply(getDefinitionResult =\u003e getDefinitionResult.Name),\n Version = \"v1.0.0\",\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"exampleRG-bp\",\n Location = \"West Europe\",\n Tags = \n {\n { \"Environment\", \"example\" },\n },\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n Name = \"bp-user-example\",\n });\n\n var @operator = new Azure.Authorization.Assignment(\"operator\", new()\n {\n Scope = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionName = \"Blueprint Operator\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var owner = new Azure.Authorization.Assignment(\"owner\", new()\n {\n Scope = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionName = \"Owner\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var exampleAssignment = new Azure.Blueprint.Assignment(\"example\", new()\n {\n Name = \"testAccBPAssignment\",\n TargetSubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n VersionId = exampleGetPublishedVersion.Apply(getPublishedVersionResult =\u003e getPublishedVersionResult.Id),\n Location = exampleResourceGroup.Location,\n LockMode = \"AllResourcesDoNotDelete\",\n LockExcludePrincipals = new[]\n {\n current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n },\n Identity = new Azure.Blueprint.Inputs.AssignmentIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n ResourceGroups = @\" {\n \"\"ResourceGroup\"\": {\n \"\"name\"\": \"\"exampleRG-bp\"\"\n }\n }\n\",\n ParameterValues = @\" {\n \"\"allowedlocationsforresourcegroups_listOfAllowedLocations\"\": {\n \"\"value\"\": [\"\"westus\"\", \"\"westus2\"\", \"\"eastus\"\", \"\"centralus\"\", \"\"centraluseuap\"\", \"\"southcentralus\"\", \"\"northcentralus\"\", \"\"westcentralus\"\", \"\"eastus2\"\", \"\"eastus2euap\"\", \"\"brazilsouth\"\", \"\"brazilus\"\", \"\"northeurope\"\", \"\"westeurope\"\", \"\"eastasia\"\", \"\"southeastasia\"\", \"\"japanwest\"\", \"\"japaneast\"\", \"\"koreacentral\"\", \"\"koreasouth\"\", \"\"indiasouth\"\", \"\"indiawest\"\", \"\"indiacentral\"\", \"\"australiaeast\"\", \"\"australiasoutheast\"\", \"\"canadacentral\"\", \"\"canadaeast\"\", \"\"uknorth\"\", \"\"uksouth2\"\", \"\"uksouth\"\", \"\"ukwest\"\", \"\"francecentral\"\", \"\"francesouth\"\", \"\"australiacentral\"\", \"\"australiacentral2\"\", \"\"uaecentral\"\", \"\"uaenorth\"\", \"\"southafricanorth\"\", \"\"southafricawest\"\", \"\"switzerlandnorth\"\", \"\"switzerlandwest\"\", \"\"germanynorth\"\", \"\"germanywestcentral\"\", \"\"norwayeast\"\", \"\"norwaywest\"\"]\n }\n }\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n @operator,\n owner,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/blueprint\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetDefinition, err := blueprint.GetDefinition(ctx, \u0026blueprint.GetDefinitionArgs{\n\t\t\tName: \"exampleBlueprint\",\n\t\t\tScopeId: example.Id,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetPublishedVersion, err := blueprint.GetPublishedVersion(ctx, \u0026blueprint.GetPublishedVersionArgs{\n\t\t\tScopeId: exampleGetDefinition.ScopeId,\n\t\t\tBlueprintName: exampleGetDefinition.Name,\n\t\t\tVersion: \"v1.0.0\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"exampleRG-bp\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Environment\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tName: pulumi.String(\"bp-user-example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\toperator, err := authorization.NewAssignment(ctx, \"operator\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(example.Id),\n\t\t\tRoleDefinitionName: pulumi.String(\"Blueprint Operator\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\towner, err := authorization.NewAssignment(ctx, \"owner\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(example.Id),\n\t\t\tRoleDefinitionName: pulumi.String(\"Owner\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = blueprint.NewAssignment(ctx, \"example\", \u0026blueprint.AssignmentArgs{\n\t\t\tName: pulumi.String(\"testAccBPAssignment\"),\n\t\t\tTargetSubscriptionId: pulumi.String(example.Id),\n\t\t\tVersionId: pulumi.String(exampleGetPublishedVersion.Id),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tLockMode: pulumi.String(\"AllResourcesDoNotDelete\"),\n\t\t\tLockExcludePrincipals: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.ObjectId),\n\t\t\t},\n\t\t\tIdentity: \u0026blueprint.AssignmentIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tResourceGroups: pulumi.String(` {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n`),\n\t\t\tParameterValues: pulumi.String(` {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n`),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\toperator,\n\t\t\towner,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.blueprint.BlueprintFunctions;\nimport com.pulumi.azure.blueprint.inputs.GetDefinitionArgs;\nimport com.pulumi.azure.blueprint.inputs.GetPublishedVersionArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.blueprint.Assignment;\nimport com.pulumi.azure.blueprint.AssignmentArgs;\nimport com.pulumi.azure.blueprint.inputs.AssignmentIdentityArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var example = CoreFunctions.getSubscription();\n\n final var exampleGetDefinition = BlueprintFunctions.getDefinition(GetDefinitionArgs.builder()\n .name(\"exampleBlueprint\")\n .scopeId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var exampleGetPublishedVersion = BlueprintFunctions.getPublishedVersion(GetPublishedVersionArgs.builder()\n .scopeId(exampleGetDefinition.applyValue(getDefinitionResult -\u003e getDefinitionResult.scopeId()))\n .blueprintName(exampleGetDefinition.applyValue(getDefinitionResult -\u003e getDefinitionResult.name()))\n .version(\"v1.0.0\")\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"exampleRG-bp\")\n .location(\"West Europe\")\n .tags(Map.of(\"Environment\", \"example\"))\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .name(\"bp-user-example\")\n .build());\n\n var operator = new Assignment(\"operator\", AssignmentArgs.builder()\n .scope(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionName(\"Blueprint Operator\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var owner = new Assignment(\"owner\", AssignmentArgs.builder()\n .scope(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionName(\"Owner\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"testAccBPAssignment\")\n .targetSubscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .versionId(exampleGetPublishedVersion.applyValue(getPublishedVersionResult -\u003e getPublishedVersionResult.id()))\n .location(exampleResourceGroup.location())\n .lockMode(\"AllResourcesDoNotDelete\")\n .lockExcludePrincipals(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .identity(AssignmentIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .resourceGroups(\"\"\"\n {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n \"\"\")\n .parameterValues(\"\"\"\n {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n operator,\n owner)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: exampleRG-bp\n location: West Europe\n tags:\n Environment: example\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n name: bp-user-example\n operator:\n type: azure:authorization:Assignment\n properties:\n scope: ${example.id}\n roleDefinitionName: Blueprint Operator\n principalId: ${exampleUserAssignedIdentity.principalId}\n owner:\n type: azure:authorization:Assignment\n properties:\n scope: ${example.id}\n roleDefinitionName: Owner\n principalId: ${exampleUserAssignedIdentity.principalId}\n exampleAssignment:\n type: azure:blueprint:Assignment\n name: example\n properties:\n name: testAccBPAssignment\n targetSubscriptionId: ${example.id}\n versionId: ${exampleGetPublishedVersion.id}\n location: ${exampleResourceGroup.location}\n lockMode: AllResourcesDoNotDelete\n lockExcludePrincipals:\n - ${current.objectId}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n resourceGroups: |2\n {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n parameterValues: |2\n {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n options:\n dependson:\n - ${operator}\n - ${owner}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n exampleGetDefinition:\n fn::invoke:\n Function: azure:blueprint:getDefinition\n Arguments:\n name: exampleBlueprint\n scopeId: ${example.id}\n exampleGetPublishedVersion:\n fn::invoke:\n Function: azure:blueprint:getPublishedVersion\n Arguments:\n scopeId: ${exampleGetDefinition.scopeId}\n blueprintName: ${exampleGetDefinition.name}\n version: v1.0.0\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAzure Blueprint Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:blueprint/assignment:Assignment example \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Blueprint/blueprintAssignments/assignSimpleBlueprint\"\n```\n\n", + "description": "Manages a Blueprint Assignment resource\n\n\u003e **NOTE:** Azure Blueprints are in Preview and potentially subject to breaking change without notice.\n\n\u003e **NOTE:** Azure Blueprint Assignments can only be applied to Subscriptions. Assignments to Management Groups is not currently supported by the service or by this provider.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = azure.core.getSubscription({});\nconst exampleGetDefinition = example.then(example =\u003e azure.blueprint.getDefinition({\n name: \"exampleBlueprint\",\n scopeId: example.id,\n}));\nconst exampleGetPublishedVersion = Promise.all([exampleGetDefinition, exampleGetDefinition]).then(([exampleGetDefinition, exampleGetDefinition1]) =\u003e azure.blueprint.getPublishedVersion({\n scopeId: exampleGetDefinition.scopeId,\n blueprintName: exampleGetDefinition1.name,\n version: \"v1.0.0\",\n}));\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"exampleRG-bp\",\n location: \"West Europe\",\n tags: {\n Environment: \"example\",\n },\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n name: \"bp-user-example\",\n});\nconst operator = new azure.authorization.Assignment(\"operator\", {\n scope: example.then(example =\u003e example.id),\n roleDefinitionName: \"Blueprint Operator\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst owner = new azure.authorization.Assignment(\"owner\", {\n scope: example.then(example =\u003e example.id),\n roleDefinitionName: \"Owner\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst exampleAssignment = new azure.blueprint.Assignment(\"example\", {\n name: \"testAccBPAssignment\",\n targetSubscriptionId: example.then(example =\u003e example.id),\n versionId: exampleGetPublishedVersion.then(exampleGetPublishedVersion =\u003e exampleGetPublishedVersion.id),\n location: exampleResourceGroup.location,\n lockMode: \"AllResourcesDoNotDelete\",\n lockExcludePrincipals: [current.then(current =\u003e current.objectId)],\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n resourceGroups: ` {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n`,\n parameterValues: ` {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n`,\n}, {\n dependsOn: [\n operator,\n owner,\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.get_subscription()\nexample_get_definition = azure.blueprint.get_definition(name=\"exampleBlueprint\",\n scope_id=example.id)\nexample_get_published_version = azure.blueprint.get_published_version(scope_id=example_get_definition.scope_id,\n blueprint_name=example_get_definition.name,\n version=\"v1.0.0\")\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"exampleRG-bp\",\n location=\"West Europe\",\n tags={\n \"Environment\": \"example\",\n })\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n name=\"bp-user-example\")\noperator = azure.authorization.Assignment(\"operator\",\n scope=example.id,\n role_definition_name=\"Blueprint Operator\",\n principal_id=example_user_assigned_identity.principal_id)\nowner = azure.authorization.Assignment(\"owner\",\n scope=example.id,\n role_definition_name=\"Owner\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_assignment = azure.blueprint.Assignment(\"example\",\n name=\"testAccBPAssignment\",\n target_subscription_id=example.id,\n version_id=example_get_published_version.id,\n location=example_resource_group.location,\n lock_mode=\"AllResourcesDoNotDelete\",\n lock_exclude_principals=[current.object_id],\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n resource_groups=\"\"\" {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n\"\"\",\n parameter_values=\"\"\" {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[\n operator,\n owner,\n ]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = Azure.Core.GetSubscription.Invoke();\n\n var exampleGetDefinition = Azure.Blueprint.GetDefinition.Invoke(new()\n {\n Name = \"exampleBlueprint\",\n ScopeId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var exampleGetPublishedVersion = Azure.Blueprint.GetPublishedVersion.Invoke(new()\n {\n ScopeId = exampleGetDefinition.Apply(getDefinitionResult =\u003e getDefinitionResult.ScopeId),\n BlueprintName = exampleGetDefinition.Apply(getDefinitionResult =\u003e getDefinitionResult.Name),\n Version = \"v1.0.0\",\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"exampleRG-bp\",\n Location = \"West Europe\",\n Tags = \n {\n { \"Environment\", \"example\" },\n },\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n Name = \"bp-user-example\",\n });\n\n var @operator = new Azure.Authorization.Assignment(\"operator\", new()\n {\n Scope = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionName = \"Blueprint Operator\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var owner = new Azure.Authorization.Assignment(\"owner\", new()\n {\n Scope = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionName = \"Owner\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var exampleAssignment = new Azure.Blueprint.Assignment(\"example\", new()\n {\n Name = \"testAccBPAssignment\",\n TargetSubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n VersionId = exampleGetPublishedVersion.Apply(getPublishedVersionResult =\u003e getPublishedVersionResult.Id),\n Location = exampleResourceGroup.Location,\n LockMode = \"AllResourcesDoNotDelete\",\n LockExcludePrincipals = new[]\n {\n current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n },\n Identity = new Azure.Blueprint.Inputs.AssignmentIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n ResourceGroups = @\" {\n \"\"ResourceGroup\"\": {\n \"\"name\"\": \"\"exampleRG-bp\"\"\n }\n }\n\",\n ParameterValues = @\" {\n \"\"allowedlocationsforresourcegroups_listOfAllowedLocations\"\": {\n \"\"value\"\": [\"\"westus\"\", \"\"westus2\"\", \"\"eastus\"\", \"\"centralus\"\", \"\"centraluseuap\"\", \"\"southcentralus\"\", \"\"northcentralus\"\", \"\"westcentralus\"\", \"\"eastus2\"\", \"\"eastus2euap\"\", \"\"brazilsouth\"\", \"\"brazilus\"\", \"\"northeurope\"\", \"\"westeurope\"\", \"\"eastasia\"\", \"\"southeastasia\"\", \"\"japanwest\"\", \"\"japaneast\"\", \"\"koreacentral\"\", \"\"koreasouth\"\", \"\"indiasouth\"\", \"\"indiawest\"\", \"\"indiacentral\"\", \"\"australiaeast\"\", \"\"australiasoutheast\"\", \"\"canadacentral\"\", \"\"canadaeast\"\", \"\"uknorth\"\", \"\"uksouth2\"\", \"\"uksouth\"\", \"\"ukwest\"\", \"\"francecentral\"\", \"\"francesouth\"\", \"\"australiacentral\"\", \"\"australiacentral2\"\", \"\"uaecentral\"\", \"\"uaenorth\"\", \"\"southafricanorth\"\", \"\"southafricawest\"\", \"\"switzerlandnorth\"\", \"\"switzerlandwest\"\", \"\"germanynorth\"\", \"\"germanywestcentral\"\", \"\"norwayeast\"\", \"\"norwaywest\"\"]\n }\n }\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n @operator,\n owner,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/blueprint\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetDefinition, err := blueprint.GetDefinition(ctx, \u0026blueprint.GetDefinitionArgs{\n\t\t\tName: \"exampleBlueprint\",\n\t\t\tScopeId: example.Id,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetPublishedVersion, err := blueprint.GetPublishedVersion(ctx, \u0026blueprint.GetPublishedVersionArgs{\n\t\t\tScopeId: exampleGetDefinition.ScopeId,\n\t\t\tBlueprintName: exampleGetDefinition.Name,\n\t\t\tVersion: \"v1.0.0\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"exampleRG-bp\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Environment\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tName: pulumi.String(\"bp-user-example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\toperator, err := authorization.NewAssignment(ctx, \"operator\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(example.Id),\n\t\t\tRoleDefinitionName: pulumi.String(\"Blueprint Operator\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\towner, err := authorization.NewAssignment(ctx, \"owner\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(example.Id),\n\t\t\tRoleDefinitionName: pulumi.String(\"Owner\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = blueprint.NewAssignment(ctx, \"example\", \u0026blueprint.AssignmentArgs{\n\t\t\tName: pulumi.String(\"testAccBPAssignment\"),\n\t\t\tTargetSubscriptionId: pulumi.String(example.Id),\n\t\t\tVersionId: pulumi.String(exampleGetPublishedVersion.Id),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tLockMode: pulumi.String(\"AllResourcesDoNotDelete\"),\n\t\t\tLockExcludePrincipals: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.ObjectId),\n\t\t\t},\n\t\t\tIdentity: \u0026blueprint.AssignmentIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tResourceGroups: pulumi.String(` {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n`),\n\t\t\tParameterValues: pulumi.String(` {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n`),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\toperator,\n\t\t\towner,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.blueprint.BlueprintFunctions;\nimport com.pulumi.azure.blueprint.inputs.GetDefinitionArgs;\nimport com.pulumi.azure.blueprint.inputs.GetPublishedVersionArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.blueprint.Assignment;\nimport com.pulumi.azure.blueprint.AssignmentArgs;\nimport com.pulumi.azure.blueprint.inputs.AssignmentIdentityArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var example = CoreFunctions.getSubscription();\n\n final var exampleGetDefinition = BlueprintFunctions.getDefinition(GetDefinitionArgs.builder()\n .name(\"exampleBlueprint\")\n .scopeId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var exampleGetPublishedVersion = BlueprintFunctions.getPublishedVersion(GetPublishedVersionArgs.builder()\n .scopeId(exampleGetDefinition.applyValue(getDefinitionResult -\u003e getDefinitionResult.scopeId()))\n .blueprintName(exampleGetDefinition.applyValue(getDefinitionResult -\u003e getDefinitionResult.name()))\n .version(\"v1.0.0\")\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"exampleRG-bp\")\n .location(\"West Europe\")\n .tags(Map.of(\"Environment\", \"example\"))\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .name(\"bp-user-example\")\n .build());\n\n var operator = new Assignment(\"operator\", AssignmentArgs.builder()\n .scope(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionName(\"Blueprint Operator\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var owner = new Assignment(\"owner\", AssignmentArgs.builder()\n .scope(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionName(\"Owner\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"testAccBPAssignment\")\n .targetSubscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .versionId(exampleGetPublishedVersion.applyValue(getPublishedVersionResult -\u003e getPublishedVersionResult.id()))\n .location(exampleResourceGroup.location())\n .lockMode(\"AllResourcesDoNotDelete\")\n .lockExcludePrincipals(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .identity(AssignmentIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .resourceGroups(\"\"\"\n {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n \"\"\")\n .parameterValues(\"\"\"\n {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n operator,\n owner)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: exampleRG-bp\n location: West Europe\n tags:\n Environment: example\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n name: bp-user-example\n operator:\n type: azure:authorization:Assignment\n properties:\n scope: ${example.id}\n roleDefinitionName: Blueprint Operator\n principalId: ${exampleUserAssignedIdentity.principalId}\n owner:\n type: azure:authorization:Assignment\n properties:\n scope: ${example.id}\n roleDefinitionName: Owner\n principalId: ${exampleUserAssignedIdentity.principalId}\n exampleAssignment:\n type: azure:blueprint:Assignment\n name: example\n properties:\n name: testAccBPAssignment\n targetSubscriptionId: ${example.id}\n versionId: ${exampleGetPublishedVersion.id}\n location: ${exampleResourceGroup.location}\n lockMode: AllResourcesDoNotDelete\n lockExcludePrincipals:\n - ${current.objectId}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n resourceGroups: |2\n {\n \"ResourceGroup\": {\n \"name\": \"exampleRG-bp\"\n }\n }\n parameterValues: |2\n {\n \"allowedlocationsforresourcegroups_listOfAllowedLocations\": {\n \"value\": [\"westus\", \"westus2\", \"eastus\", \"centralus\", \"centraluseuap\", \"southcentralus\", \"northcentralus\", \"westcentralus\", \"eastus2\", \"eastus2euap\", \"brazilsouth\", \"brazilus\", \"northeurope\", \"westeurope\", \"eastasia\", \"southeastasia\", \"japanwest\", \"japaneast\", \"koreacentral\", \"koreasouth\", \"indiasouth\", \"indiawest\", \"indiacentral\", \"australiaeast\", \"australiasoutheast\", \"canadacentral\", \"canadaeast\", \"uknorth\", \"uksouth2\", \"uksouth\", \"ukwest\", \"francecentral\", \"francesouth\", \"australiacentral\", \"australiacentral2\", \"uaecentral\", \"uaenorth\", \"southafricanorth\", \"southafricawest\", \"switzerlandnorth\", \"switzerlandwest\", \"germanynorth\", \"germanywestcentral\", \"norwayeast\", \"norwaywest\"]\n }\n }\n options:\n dependson:\n - ${operator}\n - ${owner}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n exampleGetDefinition:\n fn::invoke:\n Function: azure:blueprint:getDefinition\n Arguments:\n name: exampleBlueprint\n scopeId: ${example.id}\n exampleGetPublishedVersion:\n fn::invoke:\n Function: azure:blueprint:getPublishedVersion\n Arguments:\n scopeId: ${exampleGetDefinition.scopeId}\n blueprintName: ${exampleGetDefinition.name}\n version: v1.0.0\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAzure Blueprint Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:blueprint/assignment:Assignment example \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Blueprint/blueprintAssignments/assignSimpleBlueprint\"\n```\n\n", "properties": { "blueprintName": { "type": "string", @@ -132596,7 +132596,7 @@ } }, "azure:bot/channelAlexa:ChannelAlexa": { - "description": "Manages an Alexa integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Alexa Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelAlexa = new azure.bot.ChannelAlexa(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n skillId: \"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_alexa = azure.bot.ChannelAlexa(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n skill_id=\"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelAlexa = new Azure.Bot.ChannelAlexa(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n SkillId = \"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelAlexa(ctx, \"example\", \u0026bot.ChannelAlexaArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkillId: pulumi.String(\"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelAlexa;\nimport com.pulumi.azure.bot.ChannelAlexaArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelAlexa = new ChannelAlexa(\"exampleChannelAlexa\", ChannelAlexaArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .skillId(\"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelAlexa:\n type: azure:bot:ChannelAlexa\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n skillId: amzn1.ask.skill.00000000-0000-0000-0000-000000000000\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Alexa Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelAlexa:ChannelAlexa example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/AlexaChannel\n```\n\n", + "description": "Manages an Alexa integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Alexa Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelAlexa = new azure.bot.ChannelAlexa(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n skillId: \"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_alexa = azure.bot.ChannelAlexa(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n skill_id=\"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelAlexa = new Azure.Bot.ChannelAlexa(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n SkillId = \"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelAlexa(ctx, \"example\", \u0026bot.ChannelAlexaArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkillId: pulumi.String(\"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelAlexa;\nimport com.pulumi.azure.bot.ChannelAlexaArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelAlexa = new ChannelAlexa(\"exampleChannelAlexa\", ChannelAlexaArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .skillId(\"amzn1.ask.skill.00000000-0000-0000-0000-000000000000\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelAlexa:\n type: azure:bot:ChannelAlexa\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n skillId: amzn1.ask.skill.00000000-0000-0000-0000-000000000000\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Alexa Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelAlexa:ChannelAlexa example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/AlexaChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -132674,7 +132674,7 @@ } }, "azure:bot/channelDirectLine:ChannelDirectLine": { - "description": "Manages a Directline integration for a Bot Channel\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelDirectLine = new azure.bot.ChannelDirectLine(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n sites: [{\n name: \"default\",\n enabled: true,\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_direct_line = azure.bot.ChannelDirectLine(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n sites=[{\n \"name\": \"default\",\n \"enabled\": True,\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelDirectLine = new Azure.Bot.ChannelDirectLine(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n Sites = new[]\n {\n new Azure.Bot.Inputs.ChannelDirectLineSiteArgs\n {\n Name = \"default\",\n Enabled = true,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelDirectLine(ctx, \"example\", \u0026bot.ChannelDirectLineArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSites: bot.ChannelDirectLineSiteArray{\n\t\t\t\t\u0026bot.ChannelDirectLineSiteArgs{\n\t\t\t\t\tName: pulumi.String(\"default\"),\n\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelDirectLine;\nimport com.pulumi.azure.bot.ChannelDirectLineArgs;\nimport com.pulumi.azure.bot.inputs.ChannelDirectLineSiteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelDirectLine = new ChannelDirectLine(\"exampleChannelDirectLine\", ChannelDirectLineArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .sites(ChannelDirectLineSiteArgs.builder()\n .name(\"default\")\n .enabled(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelDirectLine:\n type: azure:bot:ChannelDirectLine\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n sites:\n - name: default\n enabled: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Directline Channel for a Bot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelDirectLine:ChannelDirectLine example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/channels/DirectlineChannel\n```\n\n", + "description": "Manages a Directline integration for a Bot Channel\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelDirectLine = new azure.bot.ChannelDirectLine(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n sites: [{\n name: \"default\",\n enabled: true,\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_direct_line = azure.bot.ChannelDirectLine(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n sites=[{\n \"name\": \"default\",\n \"enabled\": True,\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelDirectLine = new Azure.Bot.ChannelDirectLine(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n Sites = new[]\n {\n new Azure.Bot.Inputs.ChannelDirectLineSiteArgs\n {\n Name = \"default\",\n Enabled = true,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelDirectLine(ctx, \"example\", \u0026bot.ChannelDirectLineArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSites: bot.ChannelDirectLineSiteArray{\n\t\t\t\t\u0026bot.ChannelDirectLineSiteArgs{\n\t\t\t\t\tName: pulumi.String(\"default\"),\n\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelDirectLine;\nimport com.pulumi.azure.bot.ChannelDirectLineArgs;\nimport com.pulumi.azure.bot.inputs.ChannelDirectLineSiteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelDirectLine = new ChannelDirectLine(\"exampleChannelDirectLine\", ChannelDirectLineArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .sites(ChannelDirectLineSiteArgs.builder()\n .name(\"default\")\n .enabled(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelDirectLine:\n type: azure:bot:ChannelDirectLine\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n sites:\n - name: default\n enabled: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Directline Channel for a Bot can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelDirectLine:ChannelDirectLine example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/channels/DirectlineChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -132761,7 +132761,7 @@ } }, "azure:bot/channelDirectLineSpeech:ChannelDirectLineSpeech": { - "description": "Manages a Direct Line Speech integration for a Bot Channel\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.cognitive.Account(\"example\", {\n name: \"example-cogacct\",\n location: example.location,\n resourceGroupName: example.name,\n kind: \"SpeechServices\",\n skuName: \"S0\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelDirectLineSpeech = new azure.bot.ChannelDirectLineSpeech(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n cognitiveServiceLocation: exampleAccount.location,\n cognitiveServiceAccessKey: exampleAccount.primaryAccessKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.cognitive.Account(\"example\",\n name=\"example-cogacct\",\n location=example.location,\n resource_group_name=example.name,\n kind=\"SpeechServices\",\n sku_name=\"S0\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_direct_line_speech = azure.bot.ChannelDirectLineSpeech(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n cognitive_service_location=example_account.location,\n cognitive_service_access_key=example_account.primary_access_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Cognitive.Account(\"example\", new()\n {\n Name = \"example-cogacct\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Kind = \"SpeechServices\",\n SkuName = \"S0\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelDirectLineSpeech = new Azure.Bot.ChannelDirectLineSpeech(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n CognitiveServiceLocation = exampleAccount.Location,\n CognitiveServiceAccessKey = exampleAccount.PrimaryAccessKey,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cognitive\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := cognitive.NewAccount(ctx, \"example\", \u0026cognitive.AccountArgs{\n\t\t\tName: pulumi.String(\"example-cogacct\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tKind: pulumi.String(\"SpeechServices\"),\n\t\t\tSkuName: pulumi.String(\"S0\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelDirectLineSpeech(ctx, \"example\", \u0026bot.ChannelDirectLineSpeechArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tCognitiveServiceLocation: exampleAccount.Location,\n\t\t\tCognitiveServiceAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.cognitive.Account;\nimport com.pulumi.azure.cognitive.AccountArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelDirectLineSpeech;\nimport com.pulumi.azure.bot.ChannelDirectLineSpeechArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example-cogacct\")\n .location(example.location())\n .resourceGroupName(example.name())\n .kind(\"SpeechServices\")\n .skuName(\"S0\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelDirectLineSpeech = new ChannelDirectLineSpeech(\"exampleChannelDirectLineSpeech\", ChannelDirectLineSpeechArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .cognitiveServiceLocation(exampleAccount.location())\n .cognitiveServiceAccessKey(exampleAccount.primaryAccessKey())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:cognitive:Account\n name: example\n properties:\n name: example-cogacct\n location: ${example.location}\n resourceGroupName: ${example.name}\n kind: SpeechServices\n skuName: S0\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelDirectLineSpeech:\n type: azure:bot:ChannelDirectLineSpeech\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n cognitiveServiceLocation: ${exampleAccount.location}\n cognitiveServiceAccessKey: ${exampleAccount.primaryAccessKey}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDirect Line Speech Channels can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelDirectLineSpeech:ChannelDirectLineSpeech example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/DirectLineSpeechChannel\n```\n\n", + "description": "Manages a Direct Line Speech integration for a Bot Channel\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.cognitive.Account(\"example\", {\n name: \"example-cogacct\",\n location: example.location,\n resourceGroupName: example.name,\n kind: \"SpeechServices\",\n skuName: \"S0\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelDirectLineSpeech = new azure.bot.ChannelDirectLineSpeech(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n cognitiveServiceLocation: exampleAccount.location,\n cognitiveServiceAccessKey: exampleAccount.primaryAccessKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.cognitive.Account(\"example\",\n name=\"example-cogacct\",\n location=example.location,\n resource_group_name=example.name,\n kind=\"SpeechServices\",\n sku_name=\"S0\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_direct_line_speech = azure.bot.ChannelDirectLineSpeech(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n cognitive_service_location=example_account.location,\n cognitive_service_access_key=example_account.primary_access_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Cognitive.Account(\"example\", new()\n {\n Name = \"example-cogacct\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Kind = \"SpeechServices\",\n SkuName = \"S0\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelDirectLineSpeech = new Azure.Bot.ChannelDirectLineSpeech(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n CognitiveServiceLocation = exampleAccount.Location,\n CognitiveServiceAccessKey = exampleAccount.PrimaryAccessKey,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cognitive\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := cognitive.NewAccount(ctx, \"example\", \u0026cognitive.AccountArgs{\n\t\t\tName: pulumi.String(\"example-cogacct\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tKind: pulumi.String(\"SpeechServices\"),\n\t\t\tSkuName: pulumi.String(\"S0\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelDirectLineSpeech(ctx, \"example\", \u0026bot.ChannelDirectLineSpeechArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tCognitiveServiceLocation: exampleAccount.Location,\n\t\t\tCognitiveServiceAccessKey: exampleAccount.PrimaryAccessKey,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.cognitive.Account;\nimport com.pulumi.azure.cognitive.AccountArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelDirectLineSpeech;\nimport com.pulumi.azure.bot.ChannelDirectLineSpeechArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example-cogacct\")\n .location(example.location())\n .resourceGroupName(example.name())\n .kind(\"SpeechServices\")\n .skuName(\"S0\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelDirectLineSpeech = new ChannelDirectLineSpeech(\"exampleChannelDirectLineSpeech\", ChannelDirectLineSpeechArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .cognitiveServiceLocation(exampleAccount.location())\n .cognitiveServiceAccessKey(exampleAccount.primaryAccessKey())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:cognitive:Account\n name: example\n properties:\n name: example-cogacct\n location: ${example.location}\n resourceGroupName: ${example.name}\n kind: SpeechServices\n skuName: S0\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelDirectLineSpeech:\n type: azure:bot:ChannelDirectLineSpeech\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n cognitiveServiceLocation: ${exampleAccount.location}\n cognitiveServiceAccessKey: ${exampleAccount.primaryAccessKey}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDirect Line Speech Channels can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelDirectLineSpeech:ChannelDirectLineSpeech example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/DirectLineSpeechChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -132892,7 +132892,7 @@ } }, "azure:bot/channelEmail:ChannelEmail": { - "description": "Manages a Email integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Email Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelEmail = new azure.bot.ChannelEmail(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n emailAddress: \"example.com\",\n emailPassword: \"123456\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_email = azure.bot.ChannelEmail(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n email_address=\"example.com\",\n email_password=\"123456\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelEmail = new Azure.Bot.ChannelEmail(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n EmailAddress = \"example.com\",\n EmailPassword = \"123456\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelEmail(ctx, \"example\", \u0026bot.ChannelEmailArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEmailAddress: pulumi.String(\"example.com\"),\n\t\t\tEmailPassword: pulumi.String(\"123456\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelEmail;\nimport com.pulumi.azure.bot.ChannelEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelEmail = new ChannelEmail(\"exampleChannelEmail\", ChannelEmailArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .emailAddress(\"example.com\")\n .emailPassword(\"123456\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelEmail:\n type: azure:bot:ChannelEmail\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n emailAddress: example.com\n emailPassword: '123456'\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Email Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelEmail:ChannelEmail example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/channels/EmailChannel\n```\n\n", + "description": "Manages a Email integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Email Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelEmail = new azure.bot.ChannelEmail(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n emailAddress: \"example.com\",\n emailPassword: \"123456\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_email = azure.bot.ChannelEmail(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n email_address=\"example.com\",\n email_password=\"123456\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelEmail = new Azure.Bot.ChannelEmail(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n EmailAddress = \"example.com\",\n EmailPassword = \"123456\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelEmail(ctx, \"example\", \u0026bot.ChannelEmailArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEmailAddress: pulumi.String(\"example.com\"),\n\t\t\tEmailPassword: pulumi.String(\"123456\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelEmail;\nimport com.pulumi.azure.bot.ChannelEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelEmail = new ChannelEmail(\"exampleChannelEmail\", ChannelEmailArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .emailAddress(\"example.com\")\n .emailPassword(\"123456\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelEmail:\n type: azure:bot:ChannelEmail\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n emailAddress: example.com\n emailPassword: '123456'\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Email Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelEmail:ChannelEmail example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/channels/EmailChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -133000,7 +133000,7 @@ } }, "azure:bot/channelFacebook:ChannelFacebook": { - "description": "Manages a Facebook integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Facebook Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelFacebook = new azure.bot.ChannelFacebook(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n facebookApplicationId: \"563490254873576\",\n facebookApplicationSecret: \"8976d2536445ad5b976dee8437b9beb0\",\n pages: [{\n id: \"876248795081953\",\n accessToken: \"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_facebook = azure.bot.ChannelFacebook(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n facebook_application_id=\"563490254873576\",\n facebook_application_secret=\"8976d2536445ad5b976dee8437b9beb0\",\n pages=[{\n \"id\": \"876248795081953\",\n \"access_token\": \"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelFacebook = new Azure.Bot.ChannelFacebook(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n FacebookApplicationId = \"563490254873576\",\n FacebookApplicationSecret = \"8976d2536445ad5b976dee8437b9beb0\",\n Pages = new[]\n {\n new Azure.Bot.Inputs.ChannelFacebookPageArgs\n {\n Id = \"876248795081953\",\n AccessToken = \"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelFacebook(ctx, \"example\", \u0026bot.ChannelFacebookArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tFacebookApplicationId: pulumi.String(\"563490254873576\"),\n\t\t\tFacebookApplicationSecret: pulumi.String(\"8976d2536445ad5b976dee8437b9beb0\"),\n\t\t\tPages: bot.ChannelFacebookPageArray{\n\t\t\t\t\u0026bot.ChannelFacebookPageArgs{\n\t\t\t\t\tId: pulumi.String(\"876248795081953\"),\n\t\t\t\t\tAccessToken: pulumi.String(\"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelFacebook;\nimport com.pulumi.azure.bot.ChannelFacebookArgs;\nimport com.pulumi.azure.bot.inputs.ChannelFacebookPageArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelFacebook = new ChannelFacebook(\"exampleChannelFacebook\", ChannelFacebookArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .facebookApplicationId(\"563490254873576\")\n .facebookApplicationSecret(\"8976d2536445ad5b976dee8437b9beb0\")\n .pages(ChannelFacebookPageArgs.builder()\n .id(\"876248795081953\")\n .accessToken(\"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelFacebook:\n type: azure:bot:ChannelFacebook\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n facebookApplicationId: '563490254873576'\n facebookApplicationSecret: 8976d2536445ad5b976dee8437b9beb0\n pages:\n - id: '876248795081953'\n accessToken: CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Facebook Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelFacebook:ChannelFacebook example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/FacebookChannel\n```\n\n", + "description": "Manages a Facebook integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Facebook Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelFacebook = new azure.bot.ChannelFacebook(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n facebookApplicationId: \"563490254873576\",\n facebookApplicationSecret: \"8976d2536445ad5b976dee8437b9beb0\",\n pages: [{\n id: \"876248795081953\",\n accessToken: \"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_facebook = azure.bot.ChannelFacebook(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n facebook_application_id=\"563490254873576\",\n facebook_application_secret=\"8976d2536445ad5b976dee8437b9beb0\",\n pages=[{\n \"id\": \"876248795081953\",\n \"access_token\": \"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelFacebook = new Azure.Bot.ChannelFacebook(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n FacebookApplicationId = \"563490254873576\",\n FacebookApplicationSecret = \"8976d2536445ad5b976dee8437b9beb0\",\n Pages = new[]\n {\n new Azure.Bot.Inputs.ChannelFacebookPageArgs\n {\n Id = \"876248795081953\",\n AccessToken = \"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelFacebook(ctx, \"example\", \u0026bot.ChannelFacebookArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tFacebookApplicationId: pulumi.String(\"563490254873576\"),\n\t\t\tFacebookApplicationSecret: pulumi.String(\"8976d2536445ad5b976dee8437b9beb0\"),\n\t\t\tPages: bot.ChannelFacebookPageArray{\n\t\t\t\t\u0026bot.ChannelFacebookPageArgs{\n\t\t\t\t\tId: pulumi.String(\"876248795081953\"),\n\t\t\t\t\tAccessToken: pulumi.String(\"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelFacebook;\nimport com.pulumi.azure.bot.ChannelFacebookArgs;\nimport com.pulumi.azure.bot.inputs.ChannelFacebookPageArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelFacebook = new ChannelFacebook(\"exampleChannelFacebook\", ChannelFacebookArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .facebookApplicationId(\"563490254873576\")\n .facebookApplicationSecret(\"8976d2536445ad5b976dee8437b9beb0\")\n .pages(ChannelFacebookPageArgs.builder()\n .id(\"876248795081953\")\n .accessToken(\"CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelFacebook:\n type: azure:bot:ChannelFacebook\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n facebookApplicationId: '563490254873576'\n facebookApplicationSecret: 8976d2536445ad5b976dee8437b9beb0\n pages:\n - id: '876248795081953'\n accessToken: CGGCec3UAFPMBAKwK3Ft8SEpO8ZCuvpNBI5DClaJCDfqJj2BgEHCKxcY0FDarmUQap6XxpZC9GWCW4nZCzjcKosAZAP7SO44X8Q8gAntbDIXgYUBGp9xtS8wUkwgKPobUePcOOVFkvClxvYZByuiQxoTiK9fQ9jZCPEorbmZCsKDZAx4VLnrNwCTZAPUwXxO61gfq4ZD\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Facebook Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelFacebook:ChannelFacebook example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/FacebookChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -133118,7 +133118,7 @@ } }, "azure:bot/channelLine:ChannelLine": { - "description": "Manages a Line integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Line Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelLine = new azure.bot.ChannelLine(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n lineChannels: [{\n accessToken: \"asdfdsdfTYUIOIoj1231hkjhk\",\n secret: \"aagfdgfd123567\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_line = azure.bot.ChannelLine(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n line_channels=[{\n \"access_token\": \"asdfdsdfTYUIOIoj1231hkjhk\",\n \"secret\": \"aagfdgfd123567\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelLine = new Azure.Bot.ChannelLine(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n LineChannels = new[]\n {\n new Azure.Bot.Inputs.ChannelLineLineChannelArgs\n {\n AccessToken = \"asdfdsdfTYUIOIoj1231hkjhk\",\n Secret = \"aagfdgfd123567\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelLine(ctx, \"example\", \u0026bot.ChannelLineArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLineChannels: bot.ChannelLineLineChannelArray{\n\t\t\t\t\u0026bot.ChannelLineLineChannelArgs{\n\t\t\t\t\tAccessToken: pulumi.String(\"asdfdsdfTYUIOIoj1231hkjhk\"),\n\t\t\t\t\tSecret: pulumi.String(\"aagfdgfd123567\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelLine;\nimport com.pulumi.azure.bot.ChannelLineArgs;\nimport com.pulumi.azure.bot.inputs.ChannelLineLineChannelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelLine = new ChannelLine(\"exampleChannelLine\", ChannelLineArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .lineChannels(ChannelLineLineChannelArgs.builder()\n .accessToken(\"asdfdsdfTYUIOIoj1231hkjhk\")\n .secret(\"aagfdgfd123567\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelLine:\n type: azure:bot:ChannelLine\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n lineChannels:\n - accessToken: asdfdsdfTYUIOIoj1231hkjhk\n secret: aagfdgfd123567\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Line Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelLine:ChannelLine example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/LineChannel\n```\n\n", + "description": "Manages a Line integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Line Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelLine = new azure.bot.ChannelLine(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n lineChannels: [{\n accessToken: \"asdfdsdfTYUIOIoj1231hkjhk\",\n secret: \"aagfdgfd123567\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_line = azure.bot.ChannelLine(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n line_channels=[{\n \"access_token\": \"asdfdsdfTYUIOIoj1231hkjhk\",\n \"secret\": \"aagfdgfd123567\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelLine = new Azure.Bot.ChannelLine(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n LineChannels = new[]\n {\n new Azure.Bot.Inputs.ChannelLineLineChannelArgs\n {\n AccessToken = \"asdfdsdfTYUIOIoj1231hkjhk\",\n Secret = \"aagfdgfd123567\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelLine(ctx, \"example\", \u0026bot.ChannelLineArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLineChannels: bot.ChannelLineLineChannelArray{\n\t\t\t\t\u0026bot.ChannelLineLineChannelArgs{\n\t\t\t\t\tAccessToken: pulumi.String(\"asdfdsdfTYUIOIoj1231hkjhk\"),\n\t\t\t\t\tSecret: pulumi.String(\"aagfdgfd123567\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelLine;\nimport com.pulumi.azure.bot.ChannelLineArgs;\nimport com.pulumi.azure.bot.inputs.ChannelLineLineChannelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelLine = new ChannelLine(\"exampleChannelLine\", ChannelLineArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .lineChannels(ChannelLineLineChannelArgs.builder()\n .accessToken(\"asdfdsdfTYUIOIoj1231hkjhk\")\n .secret(\"aagfdgfd123567\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelLine:\n type: azure:bot:ChannelLine\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n lineChannels:\n - accessToken: asdfdsdfTYUIOIoj1231hkjhk\n secret: aagfdgfd123567\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Line Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelLine:ChannelLine example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/LineChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -133205,7 +133205,7 @@ } }, "azure:bot/channelSlack:ChannelSlack": { - "description": "Manages a Slack integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Slack Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelSlack = new azure.bot.ChannelSlack(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n clientId: \"exampleId\",\n clientSecret: \"exampleSecret\",\n verificationToken: \"exampleVerificationToken\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_slack = azure.bot.ChannelSlack(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n client_id=\"exampleId\",\n client_secret=\"exampleSecret\",\n verification_token=\"exampleVerificationToken\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelSlack = new Azure.Bot.ChannelSlack(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n ClientId = \"exampleId\",\n ClientSecret = \"exampleSecret\",\n VerificationToken = \"exampleVerificationToken\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelSlack(ctx, \"example\", \u0026bot.ChannelSlackArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tClientId: pulumi.String(\"exampleId\"),\n\t\t\tClientSecret: pulumi.String(\"exampleSecret\"),\n\t\t\tVerificationToken: pulumi.String(\"exampleVerificationToken\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelSlack;\nimport com.pulumi.azure.bot.ChannelSlackArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelSlack = new ChannelSlack(\"exampleChannelSlack\", ChannelSlackArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .clientId(\"exampleId\")\n .clientSecret(\"exampleSecret\")\n .verificationToken(\"exampleVerificationToken\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelSlack:\n type: azure:bot:ChannelSlack\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n clientId: exampleId\n clientSecret: exampleSecret\n verificationToken: exampleVerificationToken\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Slack Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelSlack:ChannelSlack example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/channels/SlackChannel\n```\n\n", + "description": "Manages a Slack integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single Slack Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelSlack = new azure.bot.ChannelSlack(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n clientId: \"exampleId\",\n clientSecret: \"exampleSecret\",\n verificationToken: \"exampleVerificationToken\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_slack = azure.bot.ChannelSlack(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n client_id=\"exampleId\",\n client_secret=\"exampleSecret\",\n verification_token=\"exampleVerificationToken\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelSlack = new Azure.Bot.ChannelSlack(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n ClientId = \"exampleId\",\n ClientSecret = \"exampleSecret\",\n VerificationToken = \"exampleVerificationToken\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelSlack(ctx, \"example\", \u0026bot.ChannelSlackArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tClientId: pulumi.String(\"exampleId\"),\n\t\t\tClientSecret: pulumi.String(\"exampleSecret\"),\n\t\t\tVerificationToken: pulumi.String(\"exampleVerificationToken\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelSlack;\nimport com.pulumi.azure.bot.ChannelSlackArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelSlack = new ChannelSlack(\"exampleChannelSlack\", ChannelSlackArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .clientId(\"exampleId\")\n .clientSecret(\"exampleSecret\")\n .verificationToken(\"exampleVerificationToken\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelSlack:\n type: azure:bot:ChannelSlack\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n clientId: exampleId\n clientSecret: exampleSecret\n verificationToken: exampleVerificationToken\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Slack Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelSlack:ChannelSlack example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/channels/SlackChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -133344,7 +133344,7 @@ } }, "azure:bot/channelSms:ChannelSms": { - "description": "Manages a SMS integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single SMS Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelSms = new azure.bot.ChannelSms(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n smsChannelAccountSecurityId: \"BG61f7cf5157f439b084e98256409c2815\",\n smsChannelAuthToken: \"jh8980432610052ed4e29565c5e232f\",\n phoneNumber: \"+12313803556\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_sms = azure.bot.ChannelSms(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n sms_channel_account_security_id=\"BG61f7cf5157f439b084e98256409c2815\",\n sms_channel_auth_token=\"jh8980432610052ed4e29565c5e232f\",\n phone_number=\"+12313803556\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelSms = new Azure.Bot.ChannelSms(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n SmsChannelAccountSecurityId = \"BG61f7cf5157f439b084e98256409c2815\",\n SmsChannelAuthToken = \"jh8980432610052ed4e29565c5e232f\",\n PhoneNumber = \"+12313803556\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelSms(ctx, \"example\", \u0026bot.ChannelSmsArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSmsChannelAccountSecurityId: pulumi.String(\"BG61f7cf5157f439b084e98256409c2815\"),\n\t\t\tSmsChannelAuthToken: pulumi.String(\"jh8980432610052ed4e29565c5e232f\"),\n\t\t\tPhoneNumber: pulumi.String(\"+12313803556\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelSms;\nimport com.pulumi.azure.bot.ChannelSmsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelSms = new ChannelSms(\"exampleChannelSms\", ChannelSmsArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .smsChannelAccountSecurityId(\"BG61f7cf5157f439b084e98256409c2815\")\n .smsChannelAuthToken(\"jh8980432610052ed4e29565c5e232f\")\n .phoneNumber(\"+12313803556\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelSms:\n type: azure:bot:ChannelSms\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n smsChannelAccountSecurityId: BG61f7cf5157f439b084e98256409c2815\n smsChannelAuthToken: jh8980432610052ed4e29565c5e232f\n phoneNumber: '+12313803556'\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe SMS Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelSms:ChannelSms example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/SmsChannel\n```\n\n", + "description": "Manages a SMS integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single SMS Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelSms = new azure.bot.ChannelSms(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n smsChannelAccountSecurityId: \"BG61f7cf5157f439b084e98256409c2815\",\n smsChannelAuthToken: \"jh8980432610052ed4e29565c5e232f\",\n phoneNumber: \"+12313803556\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_sms = azure.bot.ChannelSms(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n sms_channel_account_security_id=\"BG61f7cf5157f439b084e98256409c2815\",\n sms_channel_auth_token=\"jh8980432610052ed4e29565c5e232f\",\n phone_number=\"+12313803556\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelSms = new Azure.Bot.ChannelSms(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n SmsChannelAccountSecurityId = \"BG61f7cf5157f439b084e98256409c2815\",\n SmsChannelAuthToken = \"jh8980432610052ed4e29565c5e232f\",\n PhoneNumber = \"+12313803556\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelSms(ctx, \"example\", \u0026bot.ChannelSmsArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSmsChannelAccountSecurityId: pulumi.String(\"BG61f7cf5157f439b084e98256409c2815\"),\n\t\t\tSmsChannelAuthToken: pulumi.String(\"jh8980432610052ed4e29565c5e232f\"),\n\t\t\tPhoneNumber: pulumi.String(\"+12313803556\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelSms;\nimport com.pulumi.azure.bot.ChannelSmsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelSms = new ChannelSms(\"exampleChannelSms\", ChannelSmsArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .smsChannelAccountSecurityId(\"BG61f7cf5157f439b084e98256409c2815\")\n .smsChannelAuthToken(\"jh8980432610052ed4e29565c5e232f\")\n .phoneNumber(\"+12313803556\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelSms:\n type: azure:bot:ChannelSms\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n smsChannelAccountSecurityId: BG61f7cf5157f439b084e98256409c2815\n smsChannelAuthToken: jh8980432610052ed4e29565c5e232f\n phoneNumber: '+12313803556'\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe SMS Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelSms:ChannelSms example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/SmsChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -133453,7 +133453,7 @@ } }, "azure:bot/channelTeams:ChannelTeams": { - "description": "Manages a MS Teams integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single MS Teams Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelTeams = new azure.bot.ChannelTeams(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_teams = azure.bot.ChannelTeams(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelTeams = new Azure.Bot.ChannelTeams(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelTeams(ctx, \"example\", \u0026bot.ChannelTeamsArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelTeams;\nimport com.pulumi.azure.bot.ChannelTeamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelTeams = new ChannelTeams(\"exampleChannelTeams\", ChannelTeamsArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelTeams:\n type: azure:bot:ChannelTeams\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Microsoft Teams Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelTeams:ChannelTeams example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/channels/MsTeamsChannel\n```\n\n", + "description": "Manages a MS Teams integration for a Bot Channel\n\n\u003e **Note** A bot can only have a single MS Teams Channel associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelTeams = new azure.bot.ChannelTeams(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_teams = azure.bot.ChannelTeams(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelTeams = new Azure.Bot.ChannelTeams(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelTeams(ctx, \"example\", \u0026bot.ChannelTeamsArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelTeams;\nimport com.pulumi.azure.bot.ChannelTeamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelTeams = new ChannelTeams(\"exampleChannelTeams\", ChannelTeamsArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelTeams:\n type: azure:bot:ChannelTeams\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Microsoft Teams Integration for a Bot Channel can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelTeams:ChannelTeams example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/channels/MsTeamsChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -133554,7 +133554,7 @@ } }, "azure:bot/channelWebChat:ChannelWebChat": { - "description": "Manages a Web Chat integration for a Bot Channel\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelWebChat = new azure.bot.ChannelWebChat(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n sites: [{\n name: \"TestSite\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_web_chat = azure.bot.ChannelWebChat(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n sites=[{\n \"name\": \"TestSite\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelWebChat = new Azure.Bot.ChannelWebChat(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n Sites = new[]\n {\n new Azure.Bot.Inputs.ChannelWebChatSiteArgs\n {\n Name = \"TestSite\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelWebChat(ctx, \"example\", \u0026bot.ChannelWebChatArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSites: bot.ChannelWebChatSiteArray{\n\t\t\t\t\u0026bot.ChannelWebChatSiteArgs{\n\t\t\t\t\tName: pulumi.String(\"TestSite\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelWebChat;\nimport com.pulumi.azure.bot.ChannelWebChatArgs;\nimport com.pulumi.azure.bot.inputs.ChannelWebChatSiteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelWebChat = new ChannelWebChat(\"exampleChannelWebChat\", ChannelWebChatArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .sites(ChannelWebChatSiteArgs.builder()\n .name(\"TestSite\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelWebChat:\n type: azure:bot:ChannelWebChat\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n sites:\n - name: TestSite\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWeb Chat Channels can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelWebChat:ChannelWebChat example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/WebChatChannel\n```\n\n", + "description": "Manages a Web Chat integration for a Bot Channel\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example-bcr\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleChannelWebChat = new azure.bot.ChannelWebChat(\"example\", {\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n sites: [{\n name: \"TestSite\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example-bcr\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_channel_web_chat = azure.bot.ChannelWebChat(\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n sites=[{\n \"name\": \"TestSite\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example-bcr\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleChannelWebChat = new Azure.Bot.ChannelWebChat(\"example\", new()\n {\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n Sites = new[]\n {\n new Azure.Bot.Inputs.ChannelWebChatSiteArgs\n {\n Name = \"TestSite\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example-bcr\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelWebChat(ctx, \"example\", \u0026bot.ChannelWebChatArgs{\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSites: bot.ChannelWebChatSiteArray{\n\t\t\t\t\u0026bot.ChannelWebChatSiteArgs{\n\t\t\t\t\tName: pulumi.String(\"TestSite\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.ChannelWebChat;\nimport com.pulumi.azure.bot.ChannelWebChatArgs;\nimport com.pulumi.azure.bot.inputs.ChannelWebChatSiteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example-bcr\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleChannelWebChat = new ChannelWebChat(\"exampleChannelWebChat\", ChannelWebChatArgs.builder()\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .sites(ChannelWebChatSiteArgs.builder()\n .name(\"TestSite\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example-bcr\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleChannelWebChat:\n type: azure:bot:ChannelWebChat\n name: example\n properties:\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n sites:\n - name: TestSite\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWeb Chat Channels can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelWebChat:ChannelWebChat example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.BotService/botServices/botService1/channels/WebChatChannel\n```\n\n", "properties": { "botName": { "type": "string", @@ -133639,7 +133639,7 @@ } }, "azure:bot/channelsRegistration:ChannelsRegistration": { - "description": "Manages a Bot Channels Registration.\n\n\u003e **Note:** Bot Channels Registration has been [deprecated by Azure](https://learn.microsoft.com/en-us/azure/bot-service/bot-service-resources-faq-azure?view=azure-bot-service-4.0#why-are-web-app-bot-and-bot-channel-registration-being-deprecated). New implementations should use the `azure.bot.ServiceAzureBot` resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBot Channels Registration can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelsRegistration:ChannelsRegistration example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example\n```\n\n", + "description": "Manages a Bot Channels Registration.\n\n\u003e **Note:** Bot Channels Registration has been [deprecated by Azure](https://learn.microsoft.com/en-us/azure/bot-service/bot-service-resources-faq-azure?view=azure-bot-service-4.0#why-are-web-app-bot-and-bot-channel-registration-being-deprecated). New implementations should use the `azure.bot.ServiceAzureBot` resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBot Channels Registration can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/channelsRegistration:ChannelsRegistration example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example\n```\n\n", "properties": { "cmkKeyVaultUrl": { "type": "string", @@ -133879,7 +133879,7 @@ } }, "azure:bot/connection:Connection": { - "description": "Manages a Bot Connection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleConnection = new azure.bot.Connection(\"example\", {\n name: \"example\",\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n serviceProviderName: \"box\",\n clientId: \"exampleId\",\n clientSecret: \"exampleSecret\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_connection = azure.bot.Connection(\"example\",\n name=\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n service_provider_name=\"box\",\n client_id=\"exampleId\",\n client_secret=\"exampleSecret\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleConnection = new Azure.Bot.Connection(\"example\", new()\n {\n Name = \"example\",\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n ServiceProviderName = \"box\",\n ClientId = \"exampleId\",\n ClientSecret = \"exampleSecret\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewConnection(ctx, \"example\", \u0026bot.ConnectionArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServiceProviderName: pulumi.String(\"box\"),\n\t\t\tClientId: pulumi.String(\"exampleId\"),\n\t\t\tClientSecret: pulumi.String(\"exampleSecret\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.Connection;\nimport com.pulumi.azure.bot.ConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleConnection = new Connection(\"exampleConnection\", ConnectionArgs.builder()\n .name(\"example\")\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .serviceProviderName(\"box\")\n .clientId(\"exampleId\")\n .clientSecret(\"exampleSecret\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleConnection:\n type: azure:bot:Connection\n name: example\n properties:\n name: example\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n serviceProviderName: box\n clientId: exampleId\n clientSecret: exampleSecret\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBot Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/connection:Connection example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/connections/example\n```\n\n", + "description": "Manages a Bot Connection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleChannelsRegistration = new azure.bot.ChannelsRegistration(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\nconst exampleConnection = new azure.bot.Connection(\"example\", {\n name: \"example\",\n botName: exampleChannelsRegistration.name,\n location: exampleChannelsRegistration.location,\n resourceGroupName: example.name,\n serviceProviderName: \"box\",\n clientId: \"exampleId\",\n clientSecret: \"exampleSecret\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_channels_registration = azure.bot.ChannelsRegistration(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\nexample_connection = azure.bot.Connection(\"example\",\n name=\"example\",\n bot_name=example_channels_registration.name,\n location=example_channels_registration.location,\n resource_group_name=example.name,\n service_provider_name=\"box\",\n client_id=\"exampleId\",\n client_secret=\"exampleSecret\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleChannelsRegistration = new Azure.Bot.ChannelsRegistration(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n var exampleConnection = new Azure.Bot.Connection(\"example\", new()\n {\n Name = \"example\",\n BotName = exampleChannelsRegistration.Name,\n Location = exampleChannelsRegistration.Location,\n ResourceGroupName = example.Name,\n ServiceProviderName = \"box\",\n ClientId = \"exampleId\",\n ClientSecret = \"exampleSecret\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleChannelsRegistration, err := bot.NewChannelsRegistration(ctx, \"example\", \u0026bot.ChannelsRegistrationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewConnection(ctx, \"example\", \u0026bot.ConnectionArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tBotName: exampleChannelsRegistration.Name,\n\t\t\tLocation: exampleChannelsRegistration.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServiceProviderName: pulumi.String(\"box\"),\n\t\t\tClientId: pulumi.String(\"exampleId\"),\n\t\t\tClientSecret: pulumi.String(\"exampleSecret\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.ChannelsRegistration;\nimport com.pulumi.azure.bot.ChannelsRegistrationArgs;\nimport com.pulumi.azure.bot.Connection;\nimport com.pulumi.azure.bot.ConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleChannelsRegistration = new ChannelsRegistration(\"exampleChannelsRegistration\", ChannelsRegistrationArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n var exampleConnection = new Connection(\"exampleConnection\", ConnectionArgs.builder()\n .name(\"example\")\n .botName(exampleChannelsRegistration.name())\n .location(exampleChannelsRegistration.location())\n .resourceGroupName(example.name())\n .serviceProviderName(\"box\")\n .clientId(\"exampleId\")\n .clientSecret(\"exampleSecret\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleChannelsRegistration:\n type: azure:bot:ChannelsRegistration\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\n exampleConnection:\n type: azure:bot:Connection\n name: example\n properties:\n name: example\n botName: ${exampleChannelsRegistration.name}\n location: ${exampleChannelsRegistration.location}\n resourceGroupName: ${example.name}\n serviceProviderName: box\n clientId: exampleId\n clientSecret: exampleSecret\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBot Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/connection:Connection example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example/connections/example\n```\n\n", "properties": { "botName": { "type": "string", @@ -134145,7 +134145,7 @@ } }, "azure:bot/serviceAzureBot:ServiceAzureBot": { - "description": "Manages an Azure Bot Service.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-appinsights\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleApiKey = new azure.appinsights.ApiKey(\"example\", {\n name: \"example-appinsightsapikey\",\n applicationInsightsId: exampleInsights.id,\n readPermissions: [\n \"aggregate\",\n \"api\",\n \"draft\",\n \"extendqueries\",\n \"search\",\n ],\n});\nconst current = azure.core.getClientConfig({});\nconst exampleServiceAzureBot = new azure.bot.ServiceAzureBot(\"example\", {\n name: \"exampleazurebot\",\n resourceGroupName: example.name,\n location: \"global\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n sku: \"F0\",\n endpoint: \"https://example.com\",\n developerAppInsightsApiKey: exampleApiKey.apiKey,\n developerAppInsightsApplicationId: exampleInsights.appId,\n tags: {\n environment: \"test\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-appinsights\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_api_key = azure.appinsights.ApiKey(\"example\",\n name=\"example-appinsightsapikey\",\n application_insights_id=example_insights.id,\n read_permissions=[\n \"aggregate\",\n \"api\",\n \"draft\",\n \"extendqueries\",\n \"search\",\n ])\ncurrent = azure.core.get_client_config()\nexample_service_azure_bot = azure.bot.ServiceAzureBot(\"example\",\n name=\"exampleazurebot\",\n resource_group_name=example.name,\n location=\"global\",\n microsoft_app_id=current.client_id,\n sku=\"F0\",\n endpoint=\"https://example.com\",\n developer_app_insights_api_key=example_api_key.api_key,\n developer_app_insights_application_id=example_insights.app_id,\n tags={\n \"environment\": \"test\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-appinsights\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleApiKey = new Azure.AppInsights.ApiKey(\"example\", new()\n {\n Name = \"example-appinsightsapikey\",\n ApplicationInsightsId = exampleInsights.Id,\n ReadPermissions = new[]\n {\n \"aggregate\",\n \"api\",\n \"draft\",\n \"extendqueries\",\n \"search\",\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleServiceAzureBot = new Azure.Bot.ServiceAzureBot(\"example\", new()\n {\n Name = \"exampleazurebot\",\n ResourceGroupName = example.Name,\n Location = \"global\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n Sku = \"F0\",\n Endpoint = \"https://example.com\",\n DeveloperAppInsightsApiKey = exampleApiKey.ApiKey,\n DeveloperAppInsightsApplicationId = exampleInsights.AppId,\n Tags = \n {\n { \"environment\", \"test\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-appinsights\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleApiKey, err := appinsights.NewApiKey(ctx, \"example\", \u0026appinsights.ApiKeyArgs{\n\t\t\tName: pulumi.String(\"example-appinsightsapikey\"),\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tReadPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"aggregate\"),\n\t\t\t\tpulumi.String(\"api\"),\n\t\t\t\tpulumi.String(\"draft\"),\n\t\t\t\tpulumi.String(\"extendqueries\"),\n\t\t\t\tpulumi.String(\"search\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewServiceAzureBot(ctx, \"example\", \u0026bot.ServiceAzureBotArgs{\n\t\t\tName: pulumi.String(\"exampleazurebot\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tEndpoint: pulumi.String(\"https://example.com\"),\n\t\t\tDeveloperAppInsightsApiKey: exampleApiKey.ApiKey,\n\t\t\tDeveloperAppInsightsApplicationId: exampleInsights.AppId,\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"test\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.appinsights.ApiKey;\nimport com.pulumi.azure.appinsights.ApiKeyArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.bot.ServiceAzureBot;\nimport com.pulumi.azure.bot.ServiceAzureBotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-appinsights\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleApiKey = new ApiKey(\"exampleApiKey\", ApiKeyArgs.builder()\n .name(\"example-appinsightsapikey\")\n .applicationInsightsId(exampleInsights.id())\n .readPermissions( \n \"aggregate\",\n \"api\",\n \"draft\",\n \"extendqueries\",\n \"search\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleServiceAzureBot = new ServiceAzureBot(\"exampleServiceAzureBot\", ServiceAzureBotArgs.builder()\n .name(\"exampleazurebot\")\n .resourceGroupName(example.name())\n .location(\"global\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .sku(\"F0\")\n .endpoint(\"https://example.com\")\n .developerAppInsightsApiKey(exampleApiKey.apiKey())\n .developerAppInsightsApplicationId(exampleInsights.appId())\n .tags(Map.of(\"environment\", \"test\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-appinsights\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleApiKey:\n type: azure:appinsights:ApiKey\n name: example\n properties:\n name: example-appinsightsapikey\n applicationInsightsId: ${exampleInsights.id}\n readPermissions:\n - aggregate\n - api\n - draft\n - extendqueries\n - search\n exampleServiceAzureBot:\n type: azure:bot:ServiceAzureBot\n name: example\n properties:\n name: exampleazurebot\n resourceGroupName: ${example.name}\n location: global\n microsoftAppId: ${current.clientId}\n sku: F0\n endpoint: https://example.com\n developerAppInsightsApiKey: ${exampleApiKey.apiKey}\n developerAppInsightsApplicationId: ${exampleInsights.appId}\n tags:\n environment: test\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAzure Bot Services can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/serviceAzureBot:ServiceAzureBot example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.BotService/botServices/botService1\n```\n\n", + "description": "Manages an Azure Bot Service.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-appinsights\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleApiKey = new azure.appinsights.ApiKey(\"example\", {\n name: \"example-appinsightsapikey\",\n applicationInsightsId: exampleInsights.id,\n readPermissions: [\n \"aggregate\",\n \"api\",\n \"draft\",\n \"extendqueries\",\n \"search\",\n ],\n});\nconst current = azure.core.getClientConfig({});\nconst exampleServiceAzureBot = new azure.bot.ServiceAzureBot(\"example\", {\n name: \"exampleazurebot\",\n resourceGroupName: example.name,\n location: \"global\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n sku: \"F0\",\n endpoint: \"https://example.com\",\n developerAppInsightsApiKey: exampleApiKey.apiKey,\n developerAppInsightsApplicationId: exampleInsights.appId,\n tags: {\n environment: \"test\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-appinsights\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_api_key = azure.appinsights.ApiKey(\"example\",\n name=\"example-appinsightsapikey\",\n application_insights_id=example_insights.id,\n read_permissions=[\n \"aggregate\",\n \"api\",\n \"draft\",\n \"extendqueries\",\n \"search\",\n ])\ncurrent = azure.core.get_client_config()\nexample_service_azure_bot = azure.bot.ServiceAzureBot(\"example\",\n name=\"exampleazurebot\",\n resource_group_name=example.name,\n location=\"global\",\n microsoft_app_id=current.client_id,\n sku=\"F0\",\n endpoint=\"https://example.com\",\n developer_app_insights_api_key=example_api_key.api_key,\n developer_app_insights_application_id=example_insights.app_id,\n tags={\n \"environment\": \"test\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-appinsights\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleApiKey = new Azure.AppInsights.ApiKey(\"example\", new()\n {\n Name = \"example-appinsightsapikey\",\n ApplicationInsightsId = exampleInsights.Id,\n ReadPermissions = new[]\n {\n \"aggregate\",\n \"api\",\n \"draft\",\n \"extendqueries\",\n \"search\",\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleServiceAzureBot = new Azure.Bot.ServiceAzureBot(\"example\", new()\n {\n Name = \"exampleazurebot\",\n ResourceGroupName = example.Name,\n Location = \"global\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n Sku = \"F0\",\n Endpoint = \"https://example.com\",\n DeveloperAppInsightsApiKey = exampleApiKey.ApiKey,\n DeveloperAppInsightsApplicationId = exampleInsights.AppId,\n Tags = \n {\n { \"environment\", \"test\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-appinsights\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleApiKey, err := appinsights.NewApiKey(ctx, \"example\", \u0026appinsights.ApiKeyArgs{\n\t\t\tName: pulumi.String(\"example-appinsightsapikey\"),\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tReadPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"aggregate\"),\n\t\t\t\tpulumi.String(\"api\"),\n\t\t\t\tpulumi.String(\"draft\"),\n\t\t\t\tpulumi.String(\"extendqueries\"),\n\t\t\t\tpulumi.String(\"search\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewServiceAzureBot(ctx, \"example\", \u0026bot.ServiceAzureBotArgs{\n\t\t\tName: pulumi.String(\"exampleazurebot\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tEndpoint: pulumi.String(\"https://example.com\"),\n\t\t\tDeveloperAppInsightsApiKey: exampleApiKey.ApiKey,\n\t\t\tDeveloperAppInsightsApplicationId: exampleInsights.AppId,\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"test\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.appinsights.ApiKey;\nimport com.pulumi.azure.appinsights.ApiKeyArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.bot.ServiceAzureBot;\nimport com.pulumi.azure.bot.ServiceAzureBotArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-appinsights\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleApiKey = new ApiKey(\"exampleApiKey\", ApiKeyArgs.builder()\n .name(\"example-appinsightsapikey\")\n .applicationInsightsId(exampleInsights.id())\n .readPermissions( \n \"aggregate\",\n \"api\",\n \"draft\",\n \"extendqueries\",\n \"search\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleServiceAzureBot = new ServiceAzureBot(\"exampleServiceAzureBot\", ServiceAzureBotArgs.builder()\n .name(\"exampleazurebot\")\n .resourceGroupName(example.name())\n .location(\"global\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .sku(\"F0\")\n .endpoint(\"https://example.com\")\n .developerAppInsightsApiKey(exampleApiKey.apiKey())\n .developerAppInsightsApplicationId(exampleInsights.appId())\n .tags(Map.of(\"environment\", \"test\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-appinsights\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleApiKey:\n type: azure:appinsights:ApiKey\n name: example\n properties:\n name: example-appinsightsapikey\n applicationInsightsId: ${exampleInsights.id}\n readPermissions:\n - aggregate\n - api\n - draft\n - extendqueries\n - search\n exampleServiceAzureBot:\n type: azure:bot:ServiceAzureBot\n name: example\n properties:\n name: exampleazurebot\n resourceGroupName: ${example.name}\n location: global\n microsoftAppId: ${current.clientId}\n sku: F0\n endpoint: https://example.com\n developerAppInsightsApiKey: ${exampleApiKey.apiKey}\n developerAppInsightsApplicationId: ${exampleInsights.appId}\n tags:\n environment: test\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAzure Bot Services can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/serviceAzureBot:ServiceAzureBot example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.BotService/botServices/botService1\n```\n\n", "properties": { "cmkKeyVaultKeyUrl": { "type": "string", @@ -134463,7 +134463,7 @@ } }, "azure:bot/webApp:WebApp": { - "description": "Manages a Bot Web App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleWebApp = new azure.bot.WebApp(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_web_app = azure.bot.WebApp(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleWebApp = new Azure.Bot.WebApp(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewWebApp(ctx, \"example\", \u0026bot.WebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.WebApp;\nimport com.pulumi.azure.bot.WebAppArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleWebApp = new WebApp(\"exampleWebApp\", WebAppArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleWebApp:\n type: azure:bot:WebApp\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBot Web App's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/webApp:WebApp example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example\n```\n\n", + "description": "Manages a Bot Web App.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleWebApp = new azure.bot.WebApp(\"example\", {\n name: \"example\",\n location: \"global\",\n resourceGroupName: example.name,\n sku: \"F0\",\n microsoftAppId: current.then(current =\u003e current.clientId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_web_app = azure.bot.WebApp(\"example\",\n name=\"example\",\n location=\"global\",\n resource_group_name=example.name,\n sku=\"F0\",\n microsoft_app_id=current.client_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleWebApp = new Azure.Bot.WebApp(\"example\", new()\n {\n Name = \"example\",\n Location = \"global\",\n ResourceGroupName = example.Name,\n Sku = \"F0\",\n MicrosoftAppId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/bot\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = bot.NewWebApp(ctx, \"example\", \u0026bot.WebAppArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"global\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"F0\"),\n\t\t\tMicrosoftAppId: pulumi.String(current.ClientId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.bot.WebApp;\nimport com.pulumi.azure.bot.WebAppArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleWebApp = new WebApp(\"exampleWebApp\", WebAppArgs.builder()\n .name(\"example\")\n .location(\"global\")\n .resourceGroupName(example.name())\n .sku(\"F0\")\n .microsoftAppId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleWebApp:\n type: azure:bot:WebApp\n name: example\n properties:\n name: example\n location: global\n resourceGroupName: ${example.name}\n sku: F0\n microsoftAppId: ${current.clientId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBot Web App's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:bot/webApp:WebApp example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.BotService/botServices/example\n```\n\n", "properties": { "developerAppInsightsApiKey": { "type": "string", @@ -135547,7 +135547,7 @@ } }, "azure:cdn/frontdoorOrigin:FrontdoorOrigin": { - "description": "Manages a Front Door (standard/premium) Origin.\n\n!\u003e**IMPORTANT:** If you are attempting to implement an Origin that uses its own Private Link Service with a Load Balancer the Profile resource in your configuration file **must** have a `depends_on` meta-argument which references the `azure.privatedns.LinkService`, see `Example Usage With Private Link Service` below.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile(\"example\", {\n name: \"example-profile\",\n resourceGroupName: example.name,\n skuName: \"Premium_AzureFrontDoor\",\n});\nconst exampleFrontdoorOriginGroup = new azure.cdn.FrontdoorOriginGroup(\"example\", {\n name: \"example-origingroup\",\n cdnFrontdoorProfileId: exampleFrontdoorProfile.id,\n loadBalancing: {},\n});\nconst exampleFrontdoorOrigin = new azure.cdn.FrontdoorOrigin(\"example\", {\n name: \"example-origin\",\n cdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.id,\n enabled: true,\n certificateNameCheckEnabled: false,\n hostName: \"contoso.com\",\n httpPort: 80,\n httpsPort: 443,\n originHostHeader: \"www.contoso.com\",\n priority: 1,\n weight: 1,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_frontdoor_profile = azure.cdn.FrontdoorProfile(\"example\",\n name=\"example-profile\",\n resource_group_name=example.name,\n sku_name=\"Premium_AzureFrontDoor\")\nexample_frontdoor_origin_group = azure.cdn.FrontdoorOriginGroup(\"example\",\n name=\"example-origingroup\",\n cdn_frontdoor_profile_id=example_frontdoor_profile.id,\n load_balancing={})\nexample_frontdoor_origin = azure.cdn.FrontdoorOrigin(\"example\",\n name=\"example-origin\",\n cdn_frontdoor_origin_group_id=example_frontdoor_origin_group.id,\n enabled=True,\n certificate_name_check_enabled=False,\n host_name=\"contoso.com\",\n http_port=80,\n https_port=443,\n origin_host_header=\"www.contoso.com\",\n priority=1,\n weight=1)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile(\"example\", new()\n {\n Name = \"example-profile\",\n ResourceGroupName = example.Name,\n SkuName = \"Premium_AzureFrontDoor\",\n });\n\n var exampleFrontdoorOriginGroup = new Azure.Cdn.FrontdoorOriginGroup(\"example\", new()\n {\n Name = \"example-origingroup\",\n CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,\n LoadBalancing = null,\n });\n\n var exampleFrontdoorOrigin = new Azure.Cdn.FrontdoorOrigin(\"example\", new()\n {\n Name = \"example-origin\",\n CdnFrontdoorOriginGroupId = exampleFrontdoorOriginGroup.Id,\n Enabled = true,\n CertificateNameCheckEnabled = false,\n HostName = \"contoso.com\",\n HttpPort = 80,\n HttpsPort = 443,\n OriginHostHeader = \"www.contoso.com\",\n Priority = 1,\n Weight = 1,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cdn\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, \"example\", \u0026cdn.FrontdoorProfileArgs{\n\t\t\tName: pulumi.String(\"example-profile\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Premium_AzureFrontDoor\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorOriginGroup, err := cdn.NewFrontdoorOriginGroup(ctx, \"example\", \u0026cdn.FrontdoorOriginGroupArgs{\n\t\t\tName: pulumi.String(\"example-origingroup\"),\n\t\t\tCdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),\n\t\t\tLoadBalancing: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cdn.NewFrontdoorOrigin(ctx, \"example\", \u0026cdn.FrontdoorOriginArgs{\n\t\t\tName: pulumi.String(\"example-origin\"),\n\t\t\tCdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.ID(),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tCertificateNameCheckEnabled: pulumi.Bool(false),\n\t\t\tHostName: pulumi.String(\"contoso.com\"),\n\t\t\tHttpPort: pulumi.Int(80),\n\t\t\tHttpsPort: pulumi.Int(443),\n\t\t\tOriginHostHeader: pulumi.String(\"www.contoso.com\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tWeight: pulumi.Int(1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.cdn.FrontdoorProfile;\nimport com.pulumi.azure.cdn.FrontdoorProfileArgs;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroup;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroupArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginGroupLoadBalancingArgs;\nimport com.pulumi.azure.cdn.FrontdoorOrigin;\nimport com.pulumi.azure.cdn.FrontdoorOriginArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFrontdoorProfile = new FrontdoorProfile(\"exampleFrontdoorProfile\", FrontdoorProfileArgs.builder()\n .name(\"example-profile\")\n .resourceGroupName(example.name())\n .skuName(\"Premium_AzureFrontDoor\")\n .build());\n\n var exampleFrontdoorOriginGroup = new FrontdoorOriginGroup(\"exampleFrontdoorOriginGroup\", FrontdoorOriginGroupArgs.builder()\n .name(\"example-origingroup\")\n .cdnFrontdoorProfileId(exampleFrontdoorProfile.id())\n .loadBalancing()\n .build());\n\n var exampleFrontdoorOrigin = new FrontdoorOrigin(\"exampleFrontdoorOrigin\", FrontdoorOriginArgs.builder()\n .name(\"example-origin\")\n .cdnFrontdoorOriginGroupId(exampleFrontdoorOriginGroup.id())\n .enabled(true)\n .certificateNameCheckEnabled(false)\n .hostName(\"contoso.com\")\n .httpPort(80)\n .httpsPort(443)\n .originHostHeader(\"www.contoso.com\")\n .priority(1)\n .weight(1)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFrontdoorProfile:\n type: azure:cdn:FrontdoorProfile\n name: example\n properties:\n name: example-profile\n resourceGroupName: ${example.name}\n skuName: Premium_AzureFrontDoor\n exampleFrontdoorOriginGroup:\n type: azure:cdn:FrontdoorOriginGroup\n name: example\n properties:\n name: example-origingroup\n cdnFrontdoorProfileId: ${exampleFrontdoorProfile.id}\n loadBalancing: {}\n exampleFrontdoorOrigin:\n type: azure:cdn:FrontdoorOrigin\n name: example\n properties:\n name: example-origin\n cdnFrontdoorOriginGroupId: ${exampleFrontdoorOriginGroup.id}\n enabled: true\n certificateNameCheckEnabled: false\n hostName: contoso.com\n httpPort: 80\n httpsPort: 443\n originHostHeader: www.contoso.com\n priority: 1\n weight: 1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Private Link\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestoracc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Premium\",\n accountReplicationType: \"LRS\",\n allowNestedItemsToBePublic: false,\n networkRules: {\n defaultAction: \"Deny\",\n },\n tags: {\n environment: \"Example\",\n },\n});\nconst exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile(\"example\", {\n name: \"example-profile\",\n resourceGroupName: example.name,\n skuName: \"Premium_AzureFrontDoor\",\n});\nconst exampleFrontdoorOriginGroup = new azure.cdn.FrontdoorOriginGroup(\"example\", {\n name: \"example-origin-group\",\n cdnFrontdoorProfileId: exampleFrontdoorProfile.id,\n loadBalancing: {},\n});\nconst exampleFrontdoorOrigin = new azure.cdn.FrontdoorOrigin(\"example\", {\n name: \"example-origin\",\n cdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.id,\n enabled: true,\n certificateNameCheckEnabled: true,\n hostName: exampleAccount.primaryBlobHost,\n originHostHeader: exampleAccount.primaryBlobHost,\n priority: 1,\n weight: 500,\n privateLink: {\n requestMessage: \"Request access for Private Link Origin CDN Frontdoor\",\n targetType: \"blob\",\n location: exampleAccount.location,\n privateLinkTargetId: exampleAccount.id,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestoracc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Premium\",\n account_replication_type=\"LRS\",\n allow_nested_items_to_be_public=False,\n network_rules={\n \"default_action\": \"Deny\",\n },\n tags={\n \"environment\": \"Example\",\n })\nexample_frontdoor_profile = azure.cdn.FrontdoorProfile(\"example\",\n name=\"example-profile\",\n resource_group_name=example.name,\n sku_name=\"Premium_AzureFrontDoor\")\nexample_frontdoor_origin_group = azure.cdn.FrontdoorOriginGroup(\"example\",\n name=\"example-origin-group\",\n cdn_frontdoor_profile_id=example_frontdoor_profile.id,\n load_balancing={})\nexample_frontdoor_origin = azure.cdn.FrontdoorOrigin(\"example\",\n name=\"example-origin\",\n cdn_frontdoor_origin_group_id=example_frontdoor_origin_group.id,\n enabled=True,\n certificate_name_check_enabled=True,\n host_name=example_account.primary_blob_host,\n origin_host_header=example_account.primary_blob_host,\n priority=1,\n weight=500,\n private_link={\n \"request_message\": \"Request access for Private Link Origin CDN Frontdoor\",\n \"target_type\": \"blob\",\n \"location\": example_account.location,\n \"private_link_target_id\": example_account.id,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestoracc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Premium\",\n AccountReplicationType = \"LRS\",\n AllowNestedItemsToBePublic = false,\n NetworkRules = new Azure.Storage.Inputs.AccountNetworkRulesArgs\n {\n DefaultAction = \"Deny\",\n },\n Tags = \n {\n { \"environment\", \"Example\" },\n },\n });\n\n var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile(\"example\", new()\n {\n Name = \"example-profile\",\n ResourceGroupName = example.Name,\n SkuName = \"Premium_AzureFrontDoor\",\n });\n\n var exampleFrontdoorOriginGroup = new Azure.Cdn.FrontdoorOriginGroup(\"example\", new()\n {\n Name = \"example-origin-group\",\n CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,\n LoadBalancing = null,\n });\n\n var exampleFrontdoorOrigin = new Azure.Cdn.FrontdoorOrigin(\"example\", new()\n {\n Name = \"example-origin\",\n CdnFrontdoorOriginGroupId = exampleFrontdoorOriginGroup.Id,\n Enabled = true,\n CertificateNameCheckEnabled = true,\n HostName = exampleAccount.PrimaryBlobHost,\n OriginHostHeader = exampleAccount.PrimaryBlobHost,\n Priority = 1,\n Weight = 500,\n PrivateLink = new Azure.Cdn.Inputs.FrontdoorOriginPrivateLinkArgs\n {\n RequestMessage = \"Request access for Private Link Origin CDN Frontdoor\",\n TargetType = \"blob\",\n Location = exampleAccount.Location,\n PrivateLinkTargetId = exampleAccount.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cdn\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestoracc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Premium\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAllowNestedItemsToBePublic: pulumi.Bool(false),\n\t\t\tNetworkRules: \u0026storage.AccountNetworkRulesTypeArgs{\n\t\t\t\tDefaultAction: pulumi.String(\"Deny\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"Example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, \"example\", \u0026cdn.FrontdoorProfileArgs{\n\t\t\tName: pulumi.String(\"example-profile\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Premium_AzureFrontDoor\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorOriginGroup, err := cdn.NewFrontdoorOriginGroup(ctx, \"example\", \u0026cdn.FrontdoorOriginGroupArgs{\n\t\t\tName: pulumi.String(\"example-origin-group\"),\n\t\t\tCdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),\n\t\t\tLoadBalancing: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cdn.NewFrontdoorOrigin(ctx, \"example\", \u0026cdn.FrontdoorOriginArgs{\n\t\t\tName: pulumi.String(\"example-origin\"),\n\t\t\tCdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.ID(),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tCertificateNameCheckEnabled: pulumi.Bool(true),\n\t\t\tHostName: exampleAccount.PrimaryBlobHost,\n\t\t\tOriginHostHeader: exampleAccount.PrimaryBlobHost,\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tWeight: pulumi.Int(500),\n\t\t\tPrivateLink: \u0026cdn.FrontdoorOriginPrivateLinkArgs{\n\t\t\t\tRequestMessage: pulumi.String(\"Request access for Private Link Origin CDN Frontdoor\"),\n\t\t\t\tTargetType: pulumi.String(\"blob\"),\n\t\t\t\tLocation: exampleAccount.Location,\n\t\t\t\tPrivateLinkTargetId: exampleAccount.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.inputs.AccountNetworkRulesArgs;\nimport com.pulumi.azure.cdn.FrontdoorProfile;\nimport com.pulumi.azure.cdn.FrontdoorProfileArgs;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroup;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroupArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginGroupLoadBalancingArgs;\nimport com.pulumi.azure.cdn.FrontdoorOrigin;\nimport com.pulumi.azure.cdn.FrontdoorOriginArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginPrivateLinkArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestoracc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Premium\")\n .accountReplicationType(\"LRS\")\n .allowNestedItemsToBePublic(false)\n .networkRules(AccountNetworkRulesArgs.builder()\n .defaultAction(\"Deny\")\n .build())\n .tags(Map.of(\"environment\", \"Example\"))\n .build());\n\n var exampleFrontdoorProfile = new FrontdoorProfile(\"exampleFrontdoorProfile\", FrontdoorProfileArgs.builder()\n .name(\"example-profile\")\n .resourceGroupName(example.name())\n .skuName(\"Premium_AzureFrontDoor\")\n .build());\n\n var exampleFrontdoorOriginGroup = new FrontdoorOriginGroup(\"exampleFrontdoorOriginGroup\", FrontdoorOriginGroupArgs.builder()\n .name(\"example-origin-group\")\n .cdnFrontdoorProfileId(exampleFrontdoorProfile.id())\n .loadBalancing()\n .build());\n\n var exampleFrontdoorOrigin = new FrontdoorOrigin(\"exampleFrontdoorOrigin\", FrontdoorOriginArgs.builder()\n .name(\"example-origin\")\n .cdnFrontdoorOriginGroupId(exampleFrontdoorOriginGroup.id())\n .enabled(true)\n .certificateNameCheckEnabled(true)\n .hostName(exampleAccount.primaryBlobHost())\n .originHostHeader(exampleAccount.primaryBlobHost())\n .priority(1)\n .weight(500)\n .privateLink(FrontdoorOriginPrivateLinkArgs.builder()\n .requestMessage(\"Request access for Private Link Origin CDN Frontdoor\")\n .targetType(\"blob\")\n .location(exampleAccount.location())\n .privateLinkTargetId(exampleAccount.id())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestoracc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Premium\n accountReplicationType: LRS\n allowNestedItemsToBePublic: false\n networkRules:\n defaultAction: Deny\n tags:\n environment: Example\n exampleFrontdoorProfile:\n type: azure:cdn:FrontdoorProfile\n name: example\n properties:\n name: example-profile\n resourceGroupName: ${example.name}\n skuName: Premium_AzureFrontDoor\n exampleFrontdoorOriginGroup:\n type: azure:cdn:FrontdoorOriginGroup\n name: example\n properties:\n name: example-origin-group\n cdnFrontdoorProfileId: ${exampleFrontdoorProfile.id}\n loadBalancing: {}\n exampleFrontdoorOrigin:\n type: azure:cdn:FrontdoorOrigin\n name: example\n properties:\n name: example-origin\n cdnFrontdoorOriginGroupId: ${exampleFrontdoorOriginGroup.id}\n enabled: true\n certificateNameCheckEnabled: true\n hostName: ${exampleAccount.primaryBlobHost}\n originHostHeader: ${exampleAccount.primaryBlobHost}\n priority: 1\n weight: 500\n privateLink:\n requestMessage: Request access for Private Link Origin CDN Frontdoor\n targetType: blob\n location: ${exampleAccount.location}\n privateLinkTargetId: ${exampleAccount.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Private Link Service\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"vn-example\",\n resourceGroupName: example.name,\n location: example.location,\n addressSpaces: [\"10.5.0.0/16\"],\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"sn-example\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.5.1.0/24\"],\n privateLinkServiceNetworkPoliciesEnabled: false,\n});\nconst examplePublicIp = new azure.network.PublicIp(\"example\", {\n name: \"ip-example\",\n sku: \"Standard\",\n location: example.location,\n resourceGroupName: example.name,\n allocationMethod: \"Static\",\n});\nconst exampleLoadBalancer = new azure.lb.LoadBalancer(\"example\", {\n name: \"lb-example\",\n sku: \"Standard\",\n location: example.location,\n resourceGroupName: example.name,\n frontendIpConfigurations: [{\n name: examplePublicIp.name,\n publicIpAddressId: examplePublicIp.id,\n }],\n});\nconst exampleLinkService = new azure.privatedns.LinkService(\"example\", {\n name: \"pls-example\",\n resourceGroupName: example.name,\n location: example.location,\n visibilitySubscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n loadBalancerFrontendIpConfigurationIds: [exampleLoadBalancer.frontendIpConfigurations.apply(frontendIpConfigurations =\u003e frontendIpConfigurations?.[0]?.id)],\n natIpConfigurations: [{\n name: \"primary\",\n privateIpAddress: \"10.5.1.17\",\n privateIpAddressVersion: \"IPv4\",\n subnetId: exampleSubnet.id,\n primary: true,\n }],\n});\nconst exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile(\"example\", {\n name: \"profile-example\",\n resourceGroupName: example.name,\n skuName: \"Premium_AzureFrontDoor\",\n}, {\n dependsOn: [exampleLinkService],\n});\nconst exampleFrontdoorOriginGroup = new azure.cdn.FrontdoorOriginGroup(\"example\", {\n name: \"group-example\",\n cdnFrontdoorProfileId: exampleFrontdoorProfile.id,\n loadBalancing: {\n additionalLatencyInMilliseconds: 0,\n sampleSize: 16,\n successfulSamplesRequired: 3,\n },\n});\nconst exampleFrontdoorOrigin = new azure.cdn.FrontdoorOrigin(\"example\", {\n name: \"origin-example\",\n cdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.id,\n enabled: true,\n hostName: \"example.com\",\n originHostHeader: \"example.com\",\n priority: 1,\n weight: 1000,\n certificateNameCheckEnabled: false,\n privateLink: {\n requestMessage: \"Request access for Private Link Origin CDN Frontdoor\",\n location: example.location,\n privateLinkTargetId: exampleLinkService.id,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"vn-example\",\n resource_group_name=example.name,\n location=example.location,\n address_spaces=[\"10.5.0.0/16\"])\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"sn-example\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.5.1.0/24\"],\n private_link_service_network_policies_enabled=False)\nexample_public_ip = azure.network.PublicIp(\"example\",\n name=\"ip-example\",\n sku=\"Standard\",\n location=example.location,\n resource_group_name=example.name,\n allocation_method=\"Static\")\nexample_load_balancer = azure.lb.LoadBalancer(\"example\",\n name=\"lb-example\",\n sku=\"Standard\",\n location=example.location,\n resource_group_name=example.name,\n frontend_ip_configurations=[{\n \"name\": example_public_ip.name,\n \"public_ip_address_id\": example_public_ip.id,\n }])\nexample_link_service = azure.privatedns.LinkService(\"example\",\n name=\"pls-example\",\n resource_group_name=example.name,\n location=example.location,\n visibility_subscription_ids=[current.subscription_id],\n load_balancer_frontend_ip_configuration_ids=[example_load_balancer.frontend_ip_configurations[0].id],\n nat_ip_configurations=[{\n \"name\": \"primary\",\n \"private_ip_address\": \"10.5.1.17\",\n \"private_ip_address_version\": \"IPv4\",\n \"subnet_id\": example_subnet.id,\n \"primary\": True,\n }])\nexample_frontdoor_profile = azure.cdn.FrontdoorProfile(\"example\",\n name=\"profile-example\",\n resource_group_name=example.name,\n sku_name=\"Premium_AzureFrontDoor\",\n opts = pulumi.ResourceOptions(depends_on=[example_link_service]))\nexample_frontdoor_origin_group = azure.cdn.FrontdoorOriginGroup(\"example\",\n name=\"group-example\",\n cdn_frontdoor_profile_id=example_frontdoor_profile.id,\n load_balancing={\n \"additional_latency_in_milliseconds\": 0,\n \"sample_size\": 16,\n \"successful_samples_required\": 3,\n })\nexample_frontdoor_origin = azure.cdn.FrontdoorOrigin(\"example\",\n name=\"origin-example\",\n cdn_frontdoor_origin_group_id=example_frontdoor_origin_group.id,\n enabled=True,\n host_name=\"example.com\",\n origin_host_header=\"example.com\",\n priority=1,\n weight=1000,\n certificate_name_check_enabled=False,\n private_link={\n \"request_message\": \"Request access for Private Link Origin CDN Frontdoor\",\n \"location\": example.location,\n \"private_link_target_id\": example_link_service.id,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"vn-example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AddressSpaces = new[]\n {\n \"10.5.0.0/16\",\n },\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"sn-example\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.5.1.0/24\",\n },\n PrivateLinkServiceNetworkPoliciesEnabled = false,\n });\n\n var examplePublicIp = new Azure.Network.PublicIp(\"example\", new()\n {\n Name = \"ip-example\",\n Sku = \"Standard\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AllocationMethod = \"Static\",\n });\n\n var exampleLoadBalancer = new Azure.Lb.LoadBalancer(\"example\", new()\n {\n Name = \"lb-example\",\n Sku = \"Standard\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n FrontendIpConfigurations = new[]\n {\n new Azure.Lb.Inputs.LoadBalancerFrontendIpConfigurationArgs\n {\n Name = examplePublicIp.Name,\n PublicIpAddressId = examplePublicIp.Id,\n },\n },\n });\n\n var exampleLinkService = new Azure.PrivateDns.LinkService(\"example\", new()\n {\n Name = \"pls-example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n VisibilitySubscriptionIds = new[]\n {\n current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId),\n },\n LoadBalancerFrontendIpConfigurationIds = new[]\n {\n exampleLoadBalancer.FrontendIpConfigurations.Apply(frontendIpConfigurations =\u003e frontendIpConfigurations[0]?.Id),\n },\n NatIpConfigurations = new[]\n {\n new Azure.PrivateDns.Inputs.LinkServiceNatIpConfigurationArgs\n {\n Name = \"primary\",\n PrivateIpAddress = \"10.5.1.17\",\n PrivateIpAddressVersion = \"IPv4\",\n SubnetId = exampleSubnet.Id,\n Primary = true,\n },\n },\n });\n\n var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile(\"example\", new()\n {\n Name = \"profile-example\",\n ResourceGroupName = example.Name,\n SkuName = \"Premium_AzureFrontDoor\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleLinkService,\n },\n });\n\n var exampleFrontdoorOriginGroup = new Azure.Cdn.FrontdoorOriginGroup(\"example\", new()\n {\n Name = \"group-example\",\n CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,\n LoadBalancing = new Azure.Cdn.Inputs.FrontdoorOriginGroupLoadBalancingArgs\n {\n AdditionalLatencyInMilliseconds = 0,\n SampleSize = 16,\n SuccessfulSamplesRequired = 3,\n },\n });\n\n var exampleFrontdoorOrigin = new Azure.Cdn.FrontdoorOrigin(\"example\", new()\n {\n Name = \"origin-example\",\n CdnFrontdoorOriginGroupId = exampleFrontdoorOriginGroup.Id,\n Enabled = true,\n HostName = \"example.com\",\n OriginHostHeader = \"example.com\",\n Priority = 1,\n Weight = 1000,\n CertificateNameCheckEnabled = false,\n PrivateLink = new Azure.Cdn.Inputs.FrontdoorOriginPrivateLinkArgs\n {\n RequestMessage = \"Request access for Private Link Origin CDN Frontdoor\",\n Location = example.Location,\n PrivateLinkTargetId = exampleLinkService.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cdn\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/lb\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/privatedns\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"vn-example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.5.0.0/16\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"sn-example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.5.1.0/24\"),\n\t\t\t},\n\t\t\tPrivateLinkServiceNetworkPoliciesEnabled: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePublicIp, err := network.NewPublicIp(ctx, \"example\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"ip-example\"),\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLoadBalancer, err := lb.NewLoadBalancer(ctx, \"example\", \u0026lb.LoadBalancerArgs{\n\t\t\tName: pulumi.String(\"lb-example\"),\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tFrontendIpConfigurations: lb.LoadBalancerFrontendIpConfigurationArray{\n\t\t\t\t\u0026lb.LoadBalancerFrontendIpConfigurationArgs{\n\t\t\t\t\tName: examplePublicIp.Name,\n\t\t\t\t\tPublicIpAddressId: examplePublicIp.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkService, err := privatedns.NewLinkService(ctx, \"example\", \u0026privatedns.LinkServiceArgs{\n\t\t\tName: pulumi.String(\"pls-example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVisibilitySubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t\tLoadBalancerFrontendIpConfigurationIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(exampleLoadBalancer.FrontendIpConfigurations.ApplyT(func(frontendIpConfigurations []lb.LoadBalancerFrontendIpConfiguration) (*string, error) {\n\t\t\t\t\treturn \u0026frontendIpConfigurations[0].Id, nil\n\t\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\t},\n\t\t\tNatIpConfigurations: privatedns.LinkServiceNatIpConfigurationArray{\n\t\t\t\t\u0026privatedns.LinkServiceNatIpConfigurationArgs{\n\t\t\t\t\tName: pulumi.String(\"primary\"),\n\t\t\t\t\tPrivateIpAddress: pulumi.String(\"10.5.1.17\"),\n\t\t\t\t\tPrivateIpAddressVersion: pulumi.String(\"IPv4\"),\n\t\t\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\t\t\tPrimary: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, \"example\", \u0026cdn.FrontdoorProfileArgs{\n\t\t\tName: pulumi.String(\"profile-example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Premium_AzureFrontDoor\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleLinkService,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorOriginGroup, err := cdn.NewFrontdoorOriginGroup(ctx, \"example\", \u0026cdn.FrontdoorOriginGroupArgs{\n\t\t\tName: pulumi.String(\"group-example\"),\n\t\t\tCdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),\n\t\t\tLoadBalancing: \u0026cdn.FrontdoorOriginGroupLoadBalancingArgs{\n\t\t\t\tAdditionalLatencyInMilliseconds: pulumi.Int(0),\n\t\t\t\tSampleSize: pulumi.Int(16),\n\t\t\t\tSuccessfulSamplesRequired: pulumi.Int(3),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cdn.NewFrontdoorOrigin(ctx, \"example\", \u0026cdn.FrontdoorOriginArgs{\n\t\t\tName: pulumi.String(\"origin-example\"),\n\t\t\tCdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.ID(),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tHostName: pulumi.String(\"example.com\"),\n\t\t\tOriginHostHeader: pulumi.String(\"example.com\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tWeight: pulumi.Int(1000),\n\t\t\tCertificateNameCheckEnabled: pulumi.Bool(false),\n\t\t\tPrivateLink: \u0026cdn.FrontdoorOriginPrivateLinkArgs{\n\t\t\t\tRequestMessage: pulumi.String(\"Request access for Private Link Origin CDN Frontdoor\"),\n\t\t\t\tLocation: example.Location,\n\t\t\t\tPrivateLinkTargetId: exampleLinkService.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.lb.LoadBalancer;\nimport com.pulumi.azure.lb.LoadBalancerArgs;\nimport com.pulumi.azure.lb.inputs.LoadBalancerFrontendIpConfigurationArgs;\nimport com.pulumi.azure.privatedns.LinkService;\nimport com.pulumi.azure.privatedns.LinkServiceArgs;\nimport com.pulumi.azure.privatedns.inputs.LinkServiceNatIpConfigurationArgs;\nimport com.pulumi.azure.cdn.FrontdoorProfile;\nimport com.pulumi.azure.cdn.FrontdoorProfileArgs;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroup;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroupArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginGroupLoadBalancingArgs;\nimport com.pulumi.azure.cdn.FrontdoorOrigin;\nimport com.pulumi.azure.cdn.FrontdoorOriginArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginPrivateLinkArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"vn-example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .addressSpaces(\"10.5.0.0/16\")\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"sn-example\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.5.1.0/24\")\n .privateLinkServiceNetworkPoliciesEnabled(false)\n .build());\n\n var examplePublicIp = new PublicIp(\"examplePublicIp\", PublicIpArgs.builder()\n .name(\"ip-example\")\n .sku(\"Standard\")\n .location(example.location())\n .resourceGroupName(example.name())\n .allocationMethod(\"Static\")\n .build());\n\n var exampleLoadBalancer = new LoadBalancer(\"exampleLoadBalancer\", LoadBalancerArgs.builder()\n .name(\"lb-example\")\n .sku(\"Standard\")\n .location(example.location())\n .resourceGroupName(example.name())\n .frontendIpConfigurations(LoadBalancerFrontendIpConfigurationArgs.builder()\n .name(examplePublicIp.name())\n .publicIpAddressId(examplePublicIp.id())\n .build())\n .build());\n\n var exampleLinkService = new LinkService(\"exampleLinkService\", LinkServiceArgs.builder()\n .name(\"pls-example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .visibilitySubscriptionIds(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()))\n .loadBalancerFrontendIpConfigurationIds(exampleLoadBalancer.frontendIpConfigurations().applyValue(frontendIpConfigurations -\u003e frontendIpConfigurations[0].id()))\n .natIpConfigurations(LinkServiceNatIpConfigurationArgs.builder()\n .name(\"primary\")\n .privateIpAddress(\"10.5.1.17\")\n .privateIpAddressVersion(\"IPv4\")\n .subnetId(exampleSubnet.id())\n .primary(true)\n .build())\n .build());\n\n var exampleFrontdoorProfile = new FrontdoorProfile(\"exampleFrontdoorProfile\", FrontdoorProfileArgs.builder()\n .name(\"profile-example\")\n .resourceGroupName(example.name())\n .skuName(\"Premium_AzureFrontDoor\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleLinkService)\n .build());\n\n var exampleFrontdoorOriginGroup = new FrontdoorOriginGroup(\"exampleFrontdoorOriginGroup\", FrontdoorOriginGroupArgs.builder()\n .name(\"group-example\")\n .cdnFrontdoorProfileId(exampleFrontdoorProfile.id())\n .loadBalancing(FrontdoorOriginGroupLoadBalancingArgs.builder()\n .additionalLatencyInMilliseconds(0)\n .sampleSize(16)\n .successfulSamplesRequired(3)\n .build())\n .build());\n\n var exampleFrontdoorOrigin = new FrontdoorOrigin(\"exampleFrontdoorOrigin\", FrontdoorOriginArgs.builder()\n .name(\"origin-example\")\n .cdnFrontdoorOriginGroupId(exampleFrontdoorOriginGroup.id())\n .enabled(true)\n .hostName(\"example.com\")\n .originHostHeader(\"example.com\")\n .priority(1)\n .weight(1000)\n .certificateNameCheckEnabled(false)\n .privateLink(FrontdoorOriginPrivateLinkArgs.builder()\n .requestMessage(\"Request access for Private Link Origin CDN Frontdoor\")\n .location(example.location())\n .privateLinkTargetId(exampleLinkService.id())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFrontdoorProfile:\n type: azure:cdn:FrontdoorProfile\n name: example\n properties:\n name: profile-example\n resourceGroupName: ${example.name}\n skuName: Premium_AzureFrontDoor\n options:\n dependson:\n - ${exampleLinkService}\n exampleFrontdoorOrigin:\n type: azure:cdn:FrontdoorOrigin\n name: example\n properties:\n name: origin-example\n cdnFrontdoorOriginGroupId: ${exampleFrontdoorOriginGroup.id}\n enabled: true\n hostName: example.com\n originHostHeader: example.com\n priority: 1\n weight: 1000\n certificateNameCheckEnabled: false\n privateLink:\n requestMessage: Request access for Private Link Origin CDN Frontdoor\n location: ${example.location}\n privateLinkTargetId: ${exampleLinkService.id}\n exampleFrontdoorOriginGroup:\n type: azure:cdn:FrontdoorOriginGroup\n name: example\n properties:\n name: group-example\n cdnFrontdoorProfileId: ${exampleFrontdoorProfile.id}\n loadBalancing:\n additionalLatencyInMilliseconds: 0\n sampleSize: 16\n successfulSamplesRequired: 3\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: vn-example\n resourceGroupName: ${example.name}\n location: ${example.location}\n addressSpaces:\n - 10.5.0.0/16\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: sn-example\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.5.1.0/24\n privateLinkServiceNetworkPoliciesEnabled: false\n examplePublicIp:\n type: azure:network:PublicIp\n name: example\n properties:\n name: ip-example\n sku: Standard\n location: ${example.location}\n resourceGroupName: ${example.name}\n allocationMethod: Static\n exampleLoadBalancer:\n type: azure:lb:LoadBalancer\n name: example\n properties:\n name: lb-example\n sku: Standard\n location: ${example.location}\n resourceGroupName: ${example.name}\n frontendIpConfigurations:\n - name: ${examplePublicIp.name}\n publicIpAddressId: ${examplePublicIp.id}\n exampleLinkService:\n type: azure:privatedns:LinkService\n name: example\n properties:\n name: pls-example\n resourceGroupName: ${example.name}\n location: ${example.location}\n visibilitySubscriptionIds:\n - ${current.subscriptionId}\n loadBalancerFrontendIpConfigurationIds:\n - ${exampleLoadBalancer.frontendIpConfigurations[0].id}\n natIpConfigurations:\n - name: primary\n privateIpAddress: 10.5.1.17\n privateIpAddressVersion: IPv4\n subnetId: ${exampleSubnet.id}\n primary: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Example HCL Configurations\n\n* Private Link Origin with Storage Account Blob\n* Private Link Origin with Storage Account Static Web Site\n* Private Link Origin with Linux Web Application\n* Private Link Origin with Internal Load Balancer\n\n## Import\n\nFront Door Origins can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cdn/frontdoorOrigin:FrontdoorOrigin example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Cdn/profiles/profile1/originGroups/originGroup1/origins/origin1\n```\n\n", + "description": "Manages a Front Door (standard/premium) Origin.\n\n!\u003e**IMPORTANT:** If you are attempting to implement an Origin that uses its own Private Link Service with a Load Balancer the Profile resource in your configuration file **must** have a `depends_on` meta-argument which references the `azure.privatedns.LinkService`, see `Example Usage With Private Link Service` below.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile(\"example\", {\n name: \"example-profile\",\n resourceGroupName: example.name,\n skuName: \"Premium_AzureFrontDoor\",\n});\nconst exampleFrontdoorOriginGroup = new azure.cdn.FrontdoorOriginGroup(\"example\", {\n name: \"example-origingroup\",\n cdnFrontdoorProfileId: exampleFrontdoorProfile.id,\n loadBalancing: {},\n});\nconst exampleFrontdoorOrigin = new azure.cdn.FrontdoorOrigin(\"example\", {\n name: \"example-origin\",\n cdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.id,\n enabled: true,\n certificateNameCheckEnabled: false,\n hostName: \"contoso.com\",\n httpPort: 80,\n httpsPort: 443,\n originHostHeader: \"www.contoso.com\",\n priority: 1,\n weight: 1,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_frontdoor_profile = azure.cdn.FrontdoorProfile(\"example\",\n name=\"example-profile\",\n resource_group_name=example.name,\n sku_name=\"Premium_AzureFrontDoor\")\nexample_frontdoor_origin_group = azure.cdn.FrontdoorOriginGroup(\"example\",\n name=\"example-origingroup\",\n cdn_frontdoor_profile_id=example_frontdoor_profile.id,\n load_balancing={})\nexample_frontdoor_origin = azure.cdn.FrontdoorOrigin(\"example\",\n name=\"example-origin\",\n cdn_frontdoor_origin_group_id=example_frontdoor_origin_group.id,\n enabled=True,\n certificate_name_check_enabled=False,\n host_name=\"contoso.com\",\n http_port=80,\n https_port=443,\n origin_host_header=\"www.contoso.com\",\n priority=1,\n weight=1)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile(\"example\", new()\n {\n Name = \"example-profile\",\n ResourceGroupName = example.Name,\n SkuName = \"Premium_AzureFrontDoor\",\n });\n\n var exampleFrontdoorOriginGroup = new Azure.Cdn.FrontdoorOriginGroup(\"example\", new()\n {\n Name = \"example-origingroup\",\n CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,\n LoadBalancing = null,\n });\n\n var exampleFrontdoorOrigin = new Azure.Cdn.FrontdoorOrigin(\"example\", new()\n {\n Name = \"example-origin\",\n CdnFrontdoorOriginGroupId = exampleFrontdoorOriginGroup.Id,\n Enabled = true,\n CertificateNameCheckEnabled = false,\n HostName = \"contoso.com\",\n HttpPort = 80,\n HttpsPort = 443,\n OriginHostHeader = \"www.contoso.com\",\n Priority = 1,\n Weight = 1,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cdn\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, \"example\", \u0026cdn.FrontdoorProfileArgs{\n\t\t\tName: pulumi.String(\"example-profile\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Premium_AzureFrontDoor\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorOriginGroup, err := cdn.NewFrontdoorOriginGroup(ctx, \"example\", \u0026cdn.FrontdoorOriginGroupArgs{\n\t\t\tName: pulumi.String(\"example-origingroup\"),\n\t\t\tCdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),\n\t\t\tLoadBalancing: \u0026cdn.FrontdoorOriginGroupLoadBalancingArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cdn.NewFrontdoorOrigin(ctx, \"example\", \u0026cdn.FrontdoorOriginArgs{\n\t\t\tName: pulumi.String(\"example-origin\"),\n\t\t\tCdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.ID(),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tCertificateNameCheckEnabled: pulumi.Bool(false),\n\t\t\tHostName: pulumi.String(\"contoso.com\"),\n\t\t\tHttpPort: pulumi.Int(80),\n\t\t\tHttpsPort: pulumi.Int(443),\n\t\t\tOriginHostHeader: pulumi.String(\"www.contoso.com\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tWeight: pulumi.Int(1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.cdn.FrontdoorProfile;\nimport com.pulumi.azure.cdn.FrontdoorProfileArgs;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroup;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroupArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginGroupLoadBalancingArgs;\nimport com.pulumi.azure.cdn.FrontdoorOrigin;\nimport com.pulumi.azure.cdn.FrontdoorOriginArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFrontdoorProfile = new FrontdoorProfile(\"exampleFrontdoorProfile\", FrontdoorProfileArgs.builder()\n .name(\"example-profile\")\n .resourceGroupName(example.name())\n .skuName(\"Premium_AzureFrontDoor\")\n .build());\n\n var exampleFrontdoorOriginGroup = new FrontdoorOriginGroup(\"exampleFrontdoorOriginGroup\", FrontdoorOriginGroupArgs.builder()\n .name(\"example-origingroup\")\n .cdnFrontdoorProfileId(exampleFrontdoorProfile.id())\n .loadBalancing()\n .build());\n\n var exampleFrontdoorOrigin = new FrontdoorOrigin(\"exampleFrontdoorOrigin\", FrontdoorOriginArgs.builder()\n .name(\"example-origin\")\n .cdnFrontdoorOriginGroupId(exampleFrontdoorOriginGroup.id())\n .enabled(true)\n .certificateNameCheckEnabled(false)\n .hostName(\"contoso.com\")\n .httpPort(80)\n .httpsPort(443)\n .originHostHeader(\"www.contoso.com\")\n .priority(1)\n .weight(1)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFrontdoorProfile:\n type: azure:cdn:FrontdoorProfile\n name: example\n properties:\n name: example-profile\n resourceGroupName: ${example.name}\n skuName: Premium_AzureFrontDoor\n exampleFrontdoorOriginGroup:\n type: azure:cdn:FrontdoorOriginGroup\n name: example\n properties:\n name: example-origingroup\n cdnFrontdoorProfileId: ${exampleFrontdoorProfile.id}\n loadBalancing: {}\n exampleFrontdoorOrigin:\n type: azure:cdn:FrontdoorOrigin\n name: example\n properties:\n name: example-origin\n cdnFrontdoorOriginGroupId: ${exampleFrontdoorOriginGroup.id}\n enabled: true\n certificateNameCheckEnabled: false\n hostName: contoso.com\n httpPort: 80\n httpsPort: 443\n originHostHeader: www.contoso.com\n priority: 1\n weight: 1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Private Link\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestoracc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Premium\",\n accountReplicationType: \"LRS\",\n allowNestedItemsToBePublic: false,\n networkRules: {\n defaultAction: \"Deny\",\n },\n tags: {\n environment: \"Example\",\n },\n});\nconst exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile(\"example\", {\n name: \"example-profile\",\n resourceGroupName: example.name,\n skuName: \"Premium_AzureFrontDoor\",\n});\nconst exampleFrontdoorOriginGroup = new azure.cdn.FrontdoorOriginGroup(\"example\", {\n name: \"example-origin-group\",\n cdnFrontdoorProfileId: exampleFrontdoorProfile.id,\n loadBalancing: {},\n});\nconst exampleFrontdoorOrigin = new azure.cdn.FrontdoorOrigin(\"example\", {\n name: \"example-origin\",\n cdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.id,\n enabled: true,\n certificateNameCheckEnabled: true,\n hostName: exampleAccount.primaryBlobHost,\n originHostHeader: exampleAccount.primaryBlobHost,\n priority: 1,\n weight: 500,\n privateLink: {\n requestMessage: \"Request access for Private Link Origin CDN Frontdoor\",\n targetType: \"blob\",\n location: exampleAccount.location,\n privateLinkTargetId: exampleAccount.id,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestoracc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Premium\",\n account_replication_type=\"LRS\",\n allow_nested_items_to_be_public=False,\n network_rules={\n \"default_action\": \"Deny\",\n },\n tags={\n \"environment\": \"Example\",\n })\nexample_frontdoor_profile = azure.cdn.FrontdoorProfile(\"example\",\n name=\"example-profile\",\n resource_group_name=example.name,\n sku_name=\"Premium_AzureFrontDoor\")\nexample_frontdoor_origin_group = azure.cdn.FrontdoorOriginGroup(\"example\",\n name=\"example-origin-group\",\n cdn_frontdoor_profile_id=example_frontdoor_profile.id,\n load_balancing={})\nexample_frontdoor_origin = azure.cdn.FrontdoorOrigin(\"example\",\n name=\"example-origin\",\n cdn_frontdoor_origin_group_id=example_frontdoor_origin_group.id,\n enabled=True,\n certificate_name_check_enabled=True,\n host_name=example_account.primary_blob_host,\n origin_host_header=example_account.primary_blob_host,\n priority=1,\n weight=500,\n private_link={\n \"request_message\": \"Request access for Private Link Origin CDN Frontdoor\",\n \"target_type\": \"blob\",\n \"location\": example_account.location,\n \"private_link_target_id\": example_account.id,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestoracc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Premium\",\n AccountReplicationType = \"LRS\",\n AllowNestedItemsToBePublic = false,\n NetworkRules = new Azure.Storage.Inputs.AccountNetworkRulesArgs\n {\n DefaultAction = \"Deny\",\n },\n Tags = \n {\n { \"environment\", \"Example\" },\n },\n });\n\n var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile(\"example\", new()\n {\n Name = \"example-profile\",\n ResourceGroupName = example.Name,\n SkuName = \"Premium_AzureFrontDoor\",\n });\n\n var exampleFrontdoorOriginGroup = new Azure.Cdn.FrontdoorOriginGroup(\"example\", new()\n {\n Name = \"example-origin-group\",\n CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,\n LoadBalancing = null,\n });\n\n var exampleFrontdoorOrigin = new Azure.Cdn.FrontdoorOrigin(\"example\", new()\n {\n Name = \"example-origin\",\n CdnFrontdoorOriginGroupId = exampleFrontdoorOriginGroup.Id,\n Enabled = true,\n CertificateNameCheckEnabled = true,\n HostName = exampleAccount.PrimaryBlobHost,\n OriginHostHeader = exampleAccount.PrimaryBlobHost,\n Priority = 1,\n Weight = 500,\n PrivateLink = new Azure.Cdn.Inputs.FrontdoorOriginPrivateLinkArgs\n {\n RequestMessage = \"Request access for Private Link Origin CDN Frontdoor\",\n TargetType = \"blob\",\n Location = exampleAccount.Location,\n PrivateLinkTargetId = exampleAccount.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cdn\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestoracc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Premium\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAllowNestedItemsToBePublic: pulumi.Bool(false),\n\t\t\tNetworkRules: \u0026storage.AccountNetworkRulesTypeArgs{\n\t\t\t\tDefaultAction: pulumi.String(\"Deny\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"Example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, \"example\", \u0026cdn.FrontdoorProfileArgs{\n\t\t\tName: pulumi.String(\"example-profile\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Premium_AzureFrontDoor\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorOriginGroup, err := cdn.NewFrontdoorOriginGroup(ctx, \"example\", \u0026cdn.FrontdoorOriginGroupArgs{\n\t\t\tName: pulumi.String(\"example-origin-group\"),\n\t\t\tCdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),\n\t\t\tLoadBalancing: \u0026cdn.FrontdoorOriginGroupLoadBalancingArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cdn.NewFrontdoorOrigin(ctx, \"example\", \u0026cdn.FrontdoorOriginArgs{\n\t\t\tName: pulumi.String(\"example-origin\"),\n\t\t\tCdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.ID(),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tCertificateNameCheckEnabled: pulumi.Bool(true),\n\t\t\tHostName: exampleAccount.PrimaryBlobHost,\n\t\t\tOriginHostHeader: exampleAccount.PrimaryBlobHost,\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tWeight: pulumi.Int(500),\n\t\t\tPrivateLink: \u0026cdn.FrontdoorOriginPrivateLinkArgs{\n\t\t\t\tRequestMessage: pulumi.String(\"Request access for Private Link Origin CDN Frontdoor\"),\n\t\t\t\tTargetType: pulumi.String(\"blob\"),\n\t\t\t\tLocation: exampleAccount.Location,\n\t\t\t\tPrivateLinkTargetId: exampleAccount.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.inputs.AccountNetworkRulesArgs;\nimport com.pulumi.azure.cdn.FrontdoorProfile;\nimport com.pulumi.azure.cdn.FrontdoorProfileArgs;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroup;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroupArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginGroupLoadBalancingArgs;\nimport com.pulumi.azure.cdn.FrontdoorOrigin;\nimport com.pulumi.azure.cdn.FrontdoorOriginArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginPrivateLinkArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestoracc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Premium\")\n .accountReplicationType(\"LRS\")\n .allowNestedItemsToBePublic(false)\n .networkRules(AccountNetworkRulesArgs.builder()\n .defaultAction(\"Deny\")\n .build())\n .tags(Map.of(\"environment\", \"Example\"))\n .build());\n\n var exampleFrontdoorProfile = new FrontdoorProfile(\"exampleFrontdoorProfile\", FrontdoorProfileArgs.builder()\n .name(\"example-profile\")\n .resourceGroupName(example.name())\n .skuName(\"Premium_AzureFrontDoor\")\n .build());\n\n var exampleFrontdoorOriginGroup = new FrontdoorOriginGroup(\"exampleFrontdoorOriginGroup\", FrontdoorOriginGroupArgs.builder()\n .name(\"example-origin-group\")\n .cdnFrontdoorProfileId(exampleFrontdoorProfile.id())\n .loadBalancing()\n .build());\n\n var exampleFrontdoorOrigin = new FrontdoorOrigin(\"exampleFrontdoorOrigin\", FrontdoorOriginArgs.builder()\n .name(\"example-origin\")\n .cdnFrontdoorOriginGroupId(exampleFrontdoorOriginGroup.id())\n .enabled(true)\n .certificateNameCheckEnabled(true)\n .hostName(exampleAccount.primaryBlobHost())\n .originHostHeader(exampleAccount.primaryBlobHost())\n .priority(1)\n .weight(500)\n .privateLink(FrontdoorOriginPrivateLinkArgs.builder()\n .requestMessage(\"Request access for Private Link Origin CDN Frontdoor\")\n .targetType(\"blob\")\n .location(exampleAccount.location())\n .privateLinkTargetId(exampleAccount.id())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestoracc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Premium\n accountReplicationType: LRS\n allowNestedItemsToBePublic: false\n networkRules:\n defaultAction: Deny\n tags:\n environment: Example\n exampleFrontdoorProfile:\n type: azure:cdn:FrontdoorProfile\n name: example\n properties:\n name: example-profile\n resourceGroupName: ${example.name}\n skuName: Premium_AzureFrontDoor\n exampleFrontdoorOriginGroup:\n type: azure:cdn:FrontdoorOriginGroup\n name: example\n properties:\n name: example-origin-group\n cdnFrontdoorProfileId: ${exampleFrontdoorProfile.id}\n loadBalancing: {}\n exampleFrontdoorOrigin:\n type: azure:cdn:FrontdoorOrigin\n name: example\n properties:\n name: example-origin\n cdnFrontdoorOriginGroupId: ${exampleFrontdoorOriginGroup.id}\n enabled: true\n certificateNameCheckEnabled: true\n hostName: ${exampleAccount.primaryBlobHost}\n originHostHeader: ${exampleAccount.primaryBlobHost}\n priority: 1\n weight: 500\n privateLink:\n requestMessage: Request access for Private Link Origin CDN Frontdoor\n targetType: blob\n location: ${exampleAccount.location}\n privateLinkTargetId: ${exampleAccount.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Private Link Service\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"vn-example\",\n resourceGroupName: example.name,\n location: example.location,\n addressSpaces: [\"10.5.0.0/16\"],\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"sn-example\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.5.1.0/24\"],\n privateLinkServiceNetworkPoliciesEnabled: false,\n});\nconst examplePublicIp = new azure.network.PublicIp(\"example\", {\n name: \"ip-example\",\n sku: \"Standard\",\n location: example.location,\n resourceGroupName: example.name,\n allocationMethod: \"Static\",\n});\nconst exampleLoadBalancer = new azure.lb.LoadBalancer(\"example\", {\n name: \"lb-example\",\n sku: \"Standard\",\n location: example.location,\n resourceGroupName: example.name,\n frontendIpConfigurations: [{\n name: examplePublicIp.name,\n publicIpAddressId: examplePublicIp.id,\n }],\n});\nconst exampleLinkService = new azure.privatedns.LinkService(\"example\", {\n name: \"pls-example\",\n resourceGroupName: example.name,\n location: example.location,\n visibilitySubscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n loadBalancerFrontendIpConfigurationIds: [exampleLoadBalancer.frontendIpConfigurations.apply(frontendIpConfigurations =\u003e frontendIpConfigurations?.[0]?.id)],\n natIpConfigurations: [{\n name: \"primary\",\n privateIpAddress: \"10.5.1.17\",\n privateIpAddressVersion: \"IPv4\",\n subnetId: exampleSubnet.id,\n primary: true,\n }],\n});\nconst exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile(\"example\", {\n name: \"profile-example\",\n resourceGroupName: example.name,\n skuName: \"Premium_AzureFrontDoor\",\n}, {\n dependsOn: [exampleLinkService],\n});\nconst exampleFrontdoorOriginGroup = new azure.cdn.FrontdoorOriginGroup(\"example\", {\n name: \"group-example\",\n cdnFrontdoorProfileId: exampleFrontdoorProfile.id,\n loadBalancing: {\n additionalLatencyInMilliseconds: 0,\n sampleSize: 16,\n successfulSamplesRequired: 3,\n },\n});\nconst exampleFrontdoorOrigin = new azure.cdn.FrontdoorOrigin(\"example\", {\n name: \"origin-example\",\n cdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.id,\n enabled: true,\n hostName: \"example.com\",\n originHostHeader: \"example.com\",\n priority: 1,\n weight: 1000,\n certificateNameCheckEnabled: false,\n privateLink: {\n requestMessage: \"Request access for Private Link Origin CDN Frontdoor\",\n location: example.location,\n privateLinkTargetId: exampleLinkService.id,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"vn-example\",\n resource_group_name=example.name,\n location=example.location,\n address_spaces=[\"10.5.0.0/16\"])\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"sn-example\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.5.1.0/24\"],\n private_link_service_network_policies_enabled=False)\nexample_public_ip = azure.network.PublicIp(\"example\",\n name=\"ip-example\",\n sku=\"Standard\",\n location=example.location,\n resource_group_name=example.name,\n allocation_method=\"Static\")\nexample_load_balancer = azure.lb.LoadBalancer(\"example\",\n name=\"lb-example\",\n sku=\"Standard\",\n location=example.location,\n resource_group_name=example.name,\n frontend_ip_configurations=[{\n \"name\": example_public_ip.name,\n \"public_ip_address_id\": example_public_ip.id,\n }])\nexample_link_service = azure.privatedns.LinkService(\"example\",\n name=\"pls-example\",\n resource_group_name=example.name,\n location=example.location,\n visibility_subscription_ids=[current.subscription_id],\n load_balancer_frontend_ip_configuration_ids=[example_load_balancer.frontend_ip_configurations[0].id],\n nat_ip_configurations=[{\n \"name\": \"primary\",\n \"private_ip_address\": \"10.5.1.17\",\n \"private_ip_address_version\": \"IPv4\",\n \"subnet_id\": example_subnet.id,\n \"primary\": True,\n }])\nexample_frontdoor_profile = azure.cdn.FrontdoorProfile(\"example\",\n name=\"profile-example\",\n resource_group_name=example.name,\n sku_name=\"Premium_AzureFrontDoor\",\n opts = pulumi.ResourceOptions(depends_on=[example_link_service]))\nexample_frontdoor_origin_group = azure.cdn.FrontdoorOriginGroup(\"example\",\n name=\"group-example\",\n cdn_frontdoor_profile_id=example_frontdoor_profile.id,\n load_balancing={\n \"additional_latency_in_milliseconds\": 0,\n \"sample_size\": 16,\n \"successful_samples_required\": 3,\n })\nexample_frontdoor_origin = azure.cdn.FrontdoorOrigin(\"example\",\n name=\"origin-example\",\n cdn_frontdoor_origin_group_id=example_frontdoor_origin_group.id,\n enabled=True,\n host_name=\"example.com\",\n origin_host_header=\"example.com\",\n priority=1,\n weight=1000,\n certificate_name_check_enabled=False,\n private_link={\n \"request_message\": \"Request access for Private Link Origin CDN Frontdoor\",\n \"location\": example.location,\n \"private_link_target_id\": example_link_service.id,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"vn-example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AddressSpaces = new[]\n {\n \"10.5.0.0/16\",\n },\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"sn-example\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.5.1.0/24\",\n },\n PrivateLinkServiceNetworkPoliciesEnabled = false,\n });\n\n var examplePublicIp = new Azure.Network.PublicIp(\"example\", new()\n {\n Name = \"ip-example\",\n Sku = \"Standard\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AllocationMethod = \"Static\",\n });\n\n var exampleLoadBalancer = new Azure.Lb.LoadBalancer(\"example\", new()\n {\n Name = \"lb-example\",\n Sku = \"Standard\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n FrontendIpConfigurations = new[]\n {\n new Azure.Lb.Inputs.LoadBalancerFrontendIpConfigurationArgs\n {\n Name = examplePublicIp.Name,\n PublicIpAddressId = examplePublicIp.Id,\n },\n },\n });\n\n var exampleLinkService = new Azure.PrivateDns.LinkService(\"example\", new()\n {\n Name = \"pls-example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n VisibilitySubscriptionIds = new[]\n {\n current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId),\n },\n LoadBalancerFrontendIpConfigurationIds = new[]\n {\n exampleLoadBalancer.FrontendIpConfigurations.Apply(frontendIpConfigurations =\u003e frontendIpConfigurations[0]?.Id),\n },\n NatIpConfigurations = new[]\n {\n new Azure.PrivateDns.Inputs.LinkServiceNatIpConfigurationArgs\n {\n Name = \"primary\",\n PrivateIpAddress = \"10.5.1.17\",\n PrivateIpAddressVersion = \"IPv4\",\n SubnetId = exampleSubnet.Id,\n Primary = true,\n },\n },\n });\n\n var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile(\"example\", new()\n {\n Name = \"profile-example\",\n ResourceGroupName = example.Name,\n SkuName = \"Premium_AzureFrontDoor\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleLinkService,\n },\n });\n\n var exampleFrontdoorOriginGroup = new Azure.Cdn.FrontdoorOriginGroup(\"example\", new()\n {\n Name = \"group-example\",\n CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,\n LoadBalancing = new Azure.Cdn.Inputs.FrontdoorOriginGroupLoadBalancingArgs\n {\n AdditionalLatencyInMilliseconds = 0,\n SampleSize = 16,\n SuccessfulSamplesRequired = 3,\n },\n });\n\n var exampleFrontdoorOrigin = new Azure.Cdn.FrontdoorOrigin(\"example\", new()\n {\n Name = \"origin-example\",\n CdnFrontdoorOriginGroupId = exampleFrontdoorOriginGroup.Id,\n Enabled = true,\n HostName = \"example.com\",\n OriginHostHeader = \"example.com\",\n Priority = 1,\n Weight = 1000,\n CertificateNameCheckEnabled = false,\n PrivateLink = new Azure.Cdn.Inputs.FrontdoorOriginPrivateLinkArgs\n {\n RequestMessage = \"Request access for Private Link Origin CDN Frontdoor\",\n Location = example.Location,\n PrivateLinkTargetId = exampleLinkService.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cdn\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/lb\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/privatedns\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"vn-example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.5.0.0/16\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"sn-example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.5.1.0/24\"),\n\t\t\t},\n\t\t\tPrivateLinkServiceNetworkPoliciesEnabled: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePublicIp, err := network.NewPublicIp(ctx, \"example\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"ip-example\"),\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLoadBalancer, err := lb.NewLoadBalancer(ctx, \"example\", \u0026lb.LoadBalancerArgs{\n\t\t\tName: pulumi.String(\"lb-example\"),\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tFrontendIpConfigurations: lb.LoadBalancerFrontendIpConfigurationArray{\n\t\t\t\t\u0026lb.LoadBalancerFrontendIpConfigurationArgs{\n\t\t\t\t\tName: examplePublicIp.Name,\n\t\t\t\t\tPublicIpAddressId: examplePublicIp.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkService, err := privatedns.NewLinkService(ctx, \"example\", \u0026privatedns.LinkServiceArgs{\n\t\t\tName: pulumi.String(\"pls-example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVisibilitySubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t\tLoadBalancerFrontendIpConfigurationIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(exampleLoadBalancer.FrontendIpConfigurations.ApplyT(func(frontendIpConfigurations []lb.LoadBalancerFrontendIpConfiguration) (*string, error) {\n\t\t\t\t\treturn \u0026frontendIpConfigurations[0].Id, nil\n\t\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\t},\n\t\t\tNatIpConfigurations: privatedns.LinkServiceNatIpConfigurationArray{\n\t\t\t\t\u0026privatedns.LinkServiceNatIpConfigurationArgs{\n\t\t\t\t\tName: pulumi.String(\"primary\"),\n\t\t\t\t\tPrivateIpAddress: pulumi.String(\"10.5.1.17\"),\n\t\t\t\t\tPrivateIpAddressVersion: pulumi.String(\"IPv4\"),\n\t\t\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\t\t\tPrimary: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, \"example\", \u0026cdn.FrontdoorProfileArgs{\n\t\t\tName: pulumi.String(\"profile-example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Premium_AzureFrontDoor\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleLinkService,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorOriginGroup, err := cdn.NewFrontdoorOriginGroup(ctx, \"example\", \u0026cdn.FrontdoorOriginGroupArgs{\n\t\t\tName: pulumi.String(\"group-example\"),\n\t\t\tCdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),\n\t\t\tLoadBalancing: \u0026cdn.FrontdoorOriginGroupLoadBalancingArgs{\n\t\t\t\tAdditionalLatencyInMilliseconds: pulumi.Int(0),\n\t\t\t\tSampleSize: pulumi.Int(16),\n\t\t\t\tSuccessfulSamplesRequired: pulumi.Int(3),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cdn.NewFrontdoorOrigin(ctx, \"example\", \u0026cdn.FrontdoorOriginArgs{\n\t\t\tName: pulumi.String(\"origin-example\"),\n\t\t\tCdnFrontdoorOriginGroupId: exampleFrontdoorOriginGroup.ID(),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tHostName: pulumi.String(\"example.com\"),\n\t\t\tOriginHostHeader: pulumi.String(\"example.com\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tWeight: pulumi.Int(1000),\n\t\t\tCertificateNameCheckEnabled: pulumi.Bool(false),\n\t\t\tPrivateLink: \u0026cdn.FrontdoorOriginPrivateLinkArgs{\n\t\t\t\tRequestMessage: pulumi.String(\"Request access for Private Link Origin CDN Frontdoor\"),\n\t\t\t\tLocation: example.Location,\n\t\t\t\tPrivateLinkTargetId: exampleLinkService.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.lb.LoadBalancer;\nimport com.pulumi.azure.lb.LoadBalancerArgs;\nimport com.pulumi.azure.lb.inputs.LoadBalancerFrontendIpConfigurationArgs;\nimport com.pulumi.azure.privatedns.LinkService;\nimport com.pulumi.azure.privatedns.LinkServiceArgs;\nimport com.pulumi.azure.privatedns.inputs.LinkServiceNatIpConfigurationArgs;\nimport com.pulumi.azure.cdn.FrontdoorProfile;\nimport com.pulumi.azure.cdn.FrontdoorProfileArgs;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroup;\nimport com.pulumi.azure.cdn.FrontdoorOriginGroupArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginGroupLoadBalancingArgs;\nimport com.pulumi.azure.cdn.FrontdoorOrigin;\nimport com.pulumi.azure.cdn.FrontdoorOriginArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorOriginPrivateLinkArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"vn-example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .addressSpaces(\"10.5.0.0/16\")\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"sn-example\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.5.1.0/24\")\n .privateLinkServiceNetworkPoliciesEnabled(false)\n .build());\n\n var examplePublicIp = new PublicIp(\"examplePublicIp\", PublicIpArgs.builder()\n .name(\"ip-example\")\n .sku(\"Standard\")\n .location(example.location())\n .resourceGroupName(example.name())\n .allocationMethod(\"Static\")\n .build());\n\n var exampleLoadBalancer = new LoadBalancer(\"exampleLoadBalancer\", LoadBalancerArgs.builder()\n .name(\"lb-example\")\n .sku(\"Standard\")\n .location(example.location())\n .resourceGroupName(example.name())\n .frontendIpConfigurations(LoadBalancerFrontendIpConfigurationArgs.builder()\n .name(examplePublicIp.name())\n .publicIpAddressId(examplePublicIp.id())\n .build())\n .build());\n\n var exampleLinkService = new LinkService(\"exampleLinkService\", LinkServiceArgs.builder()\n .name(\"pls-example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .visibilitySubscriptionIds(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()))\n .loadBalancerFrontendIpConfigurationIds(exampleLoadBalancer.frontendIpConfigurations().applyValue(frontendIpConfigurations -\u003e frontendIpConfigurations[0].id()))\n .natIpConfigurations(LinkServiceNatIpConfigurationArgs.builder()\n .name(\"primary\")\n .privateIpAddress(\"10.5.1.17\")\n .privateIpAddressVersion(\"IPv4\")\n .subnetId(exampleSubnet.id())\n .primary(true)\n .build())\n .build());\n\n var exampleFrontdoorProfile = new FrontdoorProfile(\"exampleFrontdoorProfile\", FrontdoorProfileArgs.builder()\n .name(\"profile-example\")\n .resourceGroupName(example.name())\n .skuName(\"Premium_AzureFrontDoor\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleLinkService)\n .build());\n\n var exampleFrontdoorOriginGroup = new FrontdoorOriginGroup(\"exampleFrontdoorOriginGroup\", FrontdoorOriginGroupArgs.builder()\n .name(\"group-example\")\n .cdnFrontdoorProfileId(exampleFrontdoorProfile.id())\n .loadBalancing(FrontdoorOriginGroupLoadBalancingArgs.builder()\n .additionalLatencyInMilliseconds(0)\n .sampleSize(16)\n .successfulSamplesRequired(3)\n .build())\n .build());\n\n var exampleFrontdoorOrigin = new FrontdoorOrigin(\"exampleFrontdoorOrigin\", FrontdoorOriginArgs.builder()\n .name(\"origin-example\")\n .cdnFrontdoorOriginGroupId(exampleFrontdoorOriginGroup.id())\n .enabled(true)\n .hostName(\"example.com\")\n .originHostHeader(\"example.com\")\n .priority(1)\n .weight(1000)\n .certificateNameCheckEnabled(false)\n .privateLink(FrontdoorOriginPrivateLinkArgs.builder()\n .requestMessage(\"Request access for Private Link Origin CDN Frontdoor\")\n .location(example.location())\n .privateLinkTargetId(exampleLinkService.id())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFrontdoorProfile:\n type: azure:cdn:FrontdoorProfile\n name: example\n properties:\n name: profile-example\n resourceGroupName: ${example.name}\n skuName: Premium_AzureFrontDoor\n options:\n dependson:\n - ${exampleLinkService}\n exampleFrontdoorOrigin:\n type: azure:cdn:FrontdoorOrigin\n name: example\n properties:\n name: origin-example\n cdnFrontdoorOriginGroupId: ${exampleFrontdoorOriginGroup.id}\n enabled: true\n hostName: example.com\n originHostHeader: example.com\n priority: 1\n weight: 1000\n certificateNameCheckEnabled: false\n privateLink:\n requestMessage: Request access for Private Link Origin CDN Frontdoor\n location: ${example.location}\n privateLinkTargetId: ${exampleLinkService.id}\n exampleFrontdoorOriginGroup:\n type: azure:cdn:FrontdoorOriginGroup\n name: example\n properties:\n name: group-example\n cdnFrontdoorProfileId: ${exampleFrontdoorProfile.id}\n loadBalancing:\n additionalLatencyInMilliseconds: 0\n sampleSize: 16\n successfulSamplesRequired: 3\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: vn-example\n resourceGroupName: ${example.name}\n location: ${example.location}\n addressSpaces:\n - 10.5.0.0/16\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: sn-example\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.5.1.0/24\n privateLinkServiceNetworkPoliciesEnabled: false\n examplePublicIp:\n type: azure:network:PublicIp\n name: example\n properties:\n name: ip-example\n sku: Standard\n location: ${example.location}\n resourceGroupName: ${example.name}\n allocationMethod: Static\n exampleLoadBalancer:\n type: azure:lb:LoadBalancer\n name: example\n properties:\n name: lb-example\n sku: Standard\n location: ${example.location}\n resourceGroupName: ${example.name}\n frontendIpConfigurations:\n - name: ${examplePublicIp.name}\n publicIpAddressId: ${examplePublicIp.id}\n exampleLinkService:\n type: azure:privatedns:LinkService\n name: example\n properties:\n name: pls-example\n resourceGroupName: ${example.name}\n location: ${example.location}\n visibilitySubscriptionIds:\n - ${current.subscriptionId}\n loadBalancerFrontendIpConfigurationIds:\n - ${exampleLoadBalancer.frontendIpConfigurations[0].id}\n natIpConfigurations:\n - name: primary\n privateIpAddress: 10.5.1.17\n privateIpAddressVersion: IPv4\n subnetId: ${exampleSubnet.id}\n primary: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Example HCL Configurations\n\n* Private Link Origin with Storage Account Blob\n* Private Link Origin with Storage Account Static Web Site\n* Private Link Origin with Linux Web Application\n* Private Link Origin with Internal Load Balancer\n\n## Import\n\nFront Door Origins can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cdn/frontdoorOrigin:FrontdoorOrigin example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Cdn/profiles/profile1/originGroups/originGroup1/origins/origin1\n```\n\n", "properties": { "cdnFrontdoorOriginGroupId": { "type": "string", @@ -136313,7 +136313,7 @@ } }, "azure:cdn/frontdoorSecret:FrontdoorSecret": { - "description": "Manages a Front Door (standard/premium) Secret.\n\n```New-AzADServicePrincipal -ApplicationId \"00000000-0000-0000-0000-000000000000\"```\n\n| Object ID | Key Permissions | Secret Permissions | Certificate Permissions |\n|:-----------------------------------------|:---------------:|:--------------------:|:---------------------------------------------:|\n| `Microsoft.Azure.Cdn` Object ID | - | **Get** | - |\n| Your Personal AAD Object ID | - | **Get** and **List** | **Get**, **List**, **Purge** and **Recover** |\n| Terraform Service Principal | - | **Get** | **Get**, **Import**, **Delete** and **Purge** |\n\n-\u003e**NOTE:** You only need to add the `Access Policy` for your personal AAD Object ID if you are planning to view the `secrets` via the Azure Portal.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst frontdoor = azuread.getServicePrincipal({\n displayName: \"Microsoft.Azure.Cdn\",\n});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-cdn-frontdoor\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n networkAcls: {\n defaultAction: \"Deny\",\n bypass: \"AzureServices\",\n ipRules: [\"10.0.0.0/24\"],\n },\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: frontdoor.then(frontdoor =\u003e frontdoor.objectId),\n secretPermissions: [\"Get\"],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Get\",\n \"Import\",\n \"Delete\",\n \"Purge\",\n ],\n secretPermissions: [\"Get\"],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"example-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"my-certificate.pfx\",\n }).then(invoke =\u003e invoke.result),\n },\n});\nconst exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile(\"example\", {\n name: \"example-cdn-profile\",\n resourceGroupName: example.name,\n skuName: \"Standard_AzureFrontDoor\",\n});\nconst exampleFrontdoorSecret = new azure.cdn.FrontdoorSecret(\"example\", {\n name: \"example-customer-managed-secret\",\n cdnFrontdoorProfileId: exampleFrontdoorProfile.id,\n secret: {\n customerCertificates: [{\n keyVaultCertificateId: exampleCertificate.id,\n }],\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nfrontdoor = azuread.get_service_principal(display_name=\"Microsoft.Azure.Cdn\")\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-cdn-frontdoor\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n network_acls={\n \"default_action\": \"Deny\",\n \"bypass\": \"AzureServices\",\n \"ip_rules\": [\"10.0.0.0/24\"],\n },\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": frontdoor.object_id,\n \"secret_permissions\": [\"Get\"],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Get\",\n \"Import\",\n \"Delete\",\n \"Purge\",\n ],\n \"secret_permissions\": [\"Get\"],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"example-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"my-certificate.pfx\").result,\n })\nexample_frontdoor_profile = azure.cdn.FrontdoorProfile(\"example\",\n name=\"example-cdn-profile\",\n resource_group_name=example.name,\n sku_name=\"Standard_AzureFrontDoor\")\nexample_frontdoor_secret = azure.cdn.FrontdoorSecret(\"example\",\n name=\"example-customer-managed-secret\",\n cdn_frontdoor_profile_id=example_frontdoor_profile.id,\n secret={\n \"customer_certificates\": [{\n \"key_vault_certificate_id\": example_certificate.id,\n }],\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var frontdoor = AzureAD.GetServicePrincipal.Invoke(new()\n {\n DisplayName = \"Microsoft.Azure.Cdn\",\n });\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-cdn-frontdoor\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n NetworkAcls = new Azure.KeyVault.Inputs.KeyVaultNetworkAclsArgs\n {\n DefaultAction = \"Deny\",\n Bypass = \"AzureServices\",\n IpRules = new[]\n {\n \"10.0.0.0/24\",\n },\n },\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = frontdoor.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Get\",\n \"Import\",\n \"Delete\",\n \"Purge\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"example-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"my-certificate.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n },\n });\n\n var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile(\"example\", new()\n {\n Name = \"example-cdn-profile\",\n ResourceGroupName = example.Name,\n SkuName = \"Standard_AzureFrontDoor\",\n });\n\n var exampleFrontdoorSecret = new Azure.Cdn.FrontdoorSecret(\"example\", new()\n {\n Name = \"example-customer-managed-secret\",\n CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,\n Secret = new Azure.Cdn.Inputs.FrontdoorSecretSecretArgs\n {\n CustomerCertificates = new[]\n {\n new Azure.Cdn.Inputs.FrontdoorSecretSecretCustomerCertificateArgs\n {\n KeyVaultCertificateId = exampleCertificate.Id,\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cdn\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfrontdoor, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Microsoft.Azure.Cdn\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-cdn-frontdoor\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tNetworkAcls: \u0026keyvault.KeyVaultNetworkAclsArgs{\n\t\t\t\tDefaultAction: pulumi.String(\"Deny\"),\n\t\t\t\tBypass: pulumi.String(\"AzureServices\"),\n\t\t\t\tIpRules: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"10.0.0.0/24\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(frontdoor.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"my-certificate.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, \"example\", \u0026cdn.FrontdoorProfileArgs{\n\t\t\tName: pulumi.String(\"example-cdn-profile\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Standard_AzureFrontDoor\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cdn.NewFrontdoorSecret(ctx, \"example\", \u0026cdn.FrontdoorSecretArgs{\n\t\t\tName: pulumi.String(\"example-customer-managed-secret\"),\n\t\t\tCdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),\n\t\t\tSecret: \u0026cdn.FrontdoorSecretSecretArgs{\n\t\t\t\tCustomerCertificates: cdn.FrontdoorSecretSecretCustomerCertificateArray{\n\t\t\t\t\t\u0026cdn.FrontdoorSecretSecretCustomerCertificateArgs{\n\t\t\t\t\t\tKeyVaultCertificateId: exampleCertificate.ID(),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultNetworkAclsArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.cdn.FrontdoorProfile;\nimport com.pulumi.azure.cdn.FrontdoorProfileArgs;\nimport com.pulumi.azure.cdn.FrontdoorSecret;\nimport com.pulumi.azure.cdn.FrontdoorSecretArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorSecretSecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var frontdoor = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .displayName(\"Microsoft.Azure.Cdn\")\n .build());\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-cdn-frontdoor\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .networkAcls(KeyVaultNetworkAclsArgs.builder()\n .defaultAction(\"Deny\")\n .bypass(\"AzureServices\")\n .ipRules(\"10.0.0.0/24\")\n .build())\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(frontdoor.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .secretPermissions(\"Get\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Get\",\n \"Import\",\n \"Delete\",\n \"Purge\")\n .secretPermissions(\"Get\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"example-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"my-certificate.pfx\")\n .build()).result())\n .build())\n .build());\n\n var exampleFrontdoorProfile = new FrontdoorProfile(\"exampleFrontdoorProfile\", FrontdoorProfileArgs.builder()\n .name(\"example-cdn-profile\")\n .resourceGroupName(example.name())\n .skuName(\"Standard_AzureFrontDoor\")\n .build());\n\n var exampleFrontdoorSecret = new FrontdoorSecret(\"exampleFrontdoorSecret\", FrontdoorSecretArgs.builder()\n .name(\"example-customer-managed-secret\")\n .cdnFrontdoorProfileId(exampleFrontdoorProfile.id())\n .secret(FrontdoorSecretSecretArgs.builder()\n .customerCertificates(FrontdoorSecretSecretCustomerCertificateArgs.builder()\n .keyVaultCertificateId(exampleCertificate.id())\n .build())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-cdn-frontdoor\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n networkAcls:\n defaultAction: Deny\n bypass: AzureServices\n ipRules:\n - 10.0.0.0/24\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${frontdoor.objectId}\n secretPermissions:\n - Get\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Get\n - Import\n - Delete\n - Purge\n secretPermissions:\n - Get\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: example-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: my-certificate.pfx\n Return: result\n exampleFrontdoorProfile:\n type: azure:cdn:FrontdoorProfile\n name: example\n properties:\n name: example-cdn-profile\n resourceGroupName: ${example.name}\n skuName: Standard_AzureFrontDoor\n exampleFrontdoorSecret:\n type: azure:cdn:FrontdoorSecret\n name: example\n properties:\n name: example-customer-managed-secret\n cdnFrontdoorProfileId: ${exampleFrontdoorProfile.id}\n secret:\n customerCertificates:\n - keyVaultCertificateId: ${exampleCertificate.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n frontdoor:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n displayName: Microsoft.Azure.Cdn\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nFront Door Secrets can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cdn/frontdoorSecret:FrontdoorSecret example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Cdn/profiles/profile1/secrets/secrets1\n```\n\n", + "description": "Manages a Front Door (standard/premium) Secret.\n\n```New-AzADServicePrincipal -ApplicationId \"00000000-0000-0000-0000-000000000000\"```\n\n| Object ID | Key Permissions | Secret Permissions | Certificate Permissions |\n|:-----------------------------------------|:---------------:|:--------------------:|:---------------------------------------------:|\n| `Microsoft.Azure.Cdn` Object ID | - | **Get** | - |\n| Your Personal AAD Object ID | - | **Get** and **List** | **Get**, **List**, **Purge** and **Recover** |\n| Terraform Service Principal | - | **Get** | **Get**, **Import**, **Delete** and **Purge** |\n\n-\u003e**NOTE:** You only need to add the `Access Policy` for your personal AAD Object ID if you are planning to view the `secrets` via the Azure Portal.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst frontdoor = azuread.getServicePrincipal({\n displayName: \"Microsoft.Azure.Cdn\",\n});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-cdn-frontdoor\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n networkAcls: {\n defaultAction: \"Deny\",\n bypass: \"AzureServices\",\n ipRules: [\"10.0.0.0/24\"],\n },\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: frontdoor.then(frontdoor =\u003e frontdoor.objectId),\n secretPermissions: [\"Get\"],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Get\",\n \"Import\",\n \"Delete\",\n \"Purge\",\n ],\n secretPermissions: [\"Get\"],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"example-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"my-certificate.pfx\",\n }).then(invoke =\u003e invoke.result),\n },\n});\nconst exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile(\"example\", {\n name: \"example-cdn-profile\",\n resourceGroupName: example.name,\n skuName: \"Standard_AzureFrontDoor\",\n});\nconst exampleFrontdoorSecret = new azure.cdn.FrontdoorSecret(\"example\", {\n name: \"example-customer-managed-secret\",\n cdnFrontdoorProfileId: exampleFrontdoorProfile.id,\n secret: {\n customerCertificates: [{\n keyVaultCertificateId: exampleCertificate.id,\n }],\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nfrontdoor = azuread.get_service_principal(display_name=\"Microsoft.Azure.Cdn\")\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-cdn-frontdoor\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n network_acls={\n \"default_action\": \"Deny\",\n \"bypass\": \"AzureServices\",\n \"ip_rules\": [\"10.0.0.0/24\"],\n },\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": frontdoor.object_id,\n \"secret_permissions\": [\"Get\"],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Get\",\n \"Import\",\n \"Delete\",\n \"Purge\",\n ],\n \"secret_permissions\": [\"Get\"],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"example-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"my-certificate.pfx\").result,\n })\nexample_frontdoor_profile = azure.cdn.FrontdoorProfile(\"example\",\n name=\"example-cdn-profile\",\n resource_group_name=example.name,\n sku_name=\"Standard_AzureFrontDoor\")\nexample_frontdoor_secret = azure.cdn.FrontdoorSecret(\"example\",\n name=\"example-customer-managed-secret\",\n cdn_frontdoor_profile_id=example_frontdoor_profile.id,\n secret={\n \"customer_certificates\": [{\n \"key_vault_certificate_id\": example_certificate.id,\n }],\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var frontdoor = AzureAD.GetServicePrincipal.Invoke(new()\n {\n DisplayName = \"Microsoft.Azure.Cdn\",\n });\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-cdn-frontdoor\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n NetworkAcls = new Azure.KeyVault.Inputs.KeyVaultNetworkAclsArgs\n {\n DefaultAction = \"Deny\",\n Bypass = \"AzureServices\",\n IpRules = new[]\n {\n \"10.0.0.0/24\",\n },\n },\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = frontdoor.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Get\",\n \"Import\",\n \"Delete\",\n \"Purge\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"example-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"my-certificate.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n },\n });\n\n var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile(\"example\", new()\n {\n Name = \"example-cdn-profile\",\n ResourceGroupName = example.Name,\n SkuName = \"Standard_AzureFrontDoor\",\n });\n\n var exampleFrontdoorSecret = new Azure.Cdn.FrontdoorSecret(\"example\", new()\n {\n Name = \"example-customer-managed-secret\",\n CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,\n Secret = new Azure.Cdn.Inputs.FrontdoorSecretSecretArgs\n {\n CustomerCertificates = new[]\n {\n new Azure.Cdn.Inputs.FrontdoorSecretSecretCustomerCertificateArgs\n {\n KeyVaultCertificateId = exampleCertificate.Id,\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cdn\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfrontdoor, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Microsoft.Azure.Cdn\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-cdn-frontdoor\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tNetworkAcls: \u0026keyvault.KeyVaultNetworkAclsArgs{\n\t\t\t\tDefaultAction: pulumi.String(\"Deny\"),\n\t\t\t\tBypass: pulumi.String(\"AzureServices\"),\n\t\t\t\tIpRules: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"10.0.0.0/24\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(frontdoor.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"my-certificate.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, \"example\", \u0026cdn.FrontdoorProfileArgs{\n\t\t\tName: pulumi.String(\"example-cdn-profile\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"Standard_AzureFrontDoor\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cdn.NewFrontdoorSecret(ctx, \"example\", \u0026cdn.FrontdoorSecretArgs{\n\t\t\tName: pulumi.String(\"example-customer-managed-secret\"),\n\t\t\tCdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),\n\t\t\tSecret: \u0026cdn.FrontdoorSecretSecretArgs{\n\t\t\t\tCustomerCertificates: cdn.FrontdoorSecretSecretCustomerCertificateArray{\n\t\t\t\t\t\u0026cdn.FrontdoorSecretSecretCustomerCertificateArgs{\n\t\t\t\t\t\tKeyVaultCertificateId: exampleCertificate.ID(),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultNetworkAclsArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.cdn.FrontdoorProfile;\nimport com.pulumi.azure.cdn.FrontdoorProfileArgs;\nimport com.pulumi.azure.cdn.FrontdoorSecret;\nimport com.pulumi.azure.cdn.FrontdoorSecretArgs;\nimport com.pulumi.azure.cdn.inputs.FrontdoorSecretSecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var frontdoor = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .displayName(\"Microsoft.Azure.Cdn\")\n .build());\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-cdn-frontdoor\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .networkAcls(KeyVaultNetworkAclsArgs.builder()\n .defaultAction(\"Deny\")\n .bypass(\"AzureServices\")\n .ipRules(\"10.0.0.0/24\")\n .build())\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(frontdoor.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .secretPermissions(\"Get\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Get\",\n \"Import\",\n \"Delete\",\n \"Purge\")\n .secretPermissions(\"Get\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"example-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"my-certificate.pfx\")\n .build()).result())\n .build())\n .build());\n\n var exampleFrontdoorProfile = new FrontdoorProfile(\"exampleFrontdoorProfile\", FrontdoorProfileArgs.builder()\n .name(\"example-cdn-profile\")\n .resourceGroupName(example.name())\n .skuName(\"Standard_AzureFrontDoor\")\n .build());\n\n var exampleFrontdoorSecret = new FrontdoorSecret(\"exampleFrontdoorSecret\", FrontdoorSecretArgs.builder()\n .name(\"example-customer-managed-secret\")\n .cdnFrontdoorProfileId(exampleFrontdoorProfile.id())\n .secret(FrontdoorSecretSecretArgs.builder()\n .customerCertificates(FrontdoorSecretSecretCustomerCertificateArgs.builder()\n .keyVaultCertificateId(exampleCertificate.id())\n .build())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-cdn-frontdoor\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n networkAcls:\n defaultAction: Deny\n bypass: AzureServices\n ipRules:\n - 10.0.0.0/24\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${frontdoor.objectId}\n secretPermissions:\n - Get\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Get\n - Import\n - Delete\n - Purge\n secretPermissions:\n - Get\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: example-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: my-certificate.pfx\n Return: result\n exampleFrontdoorProfile:\n type: azure:cdn:FrontdoorProfile\n name: example\n properties:\n name: example-cdn-profile\n resourceGroupName: ${example.name}\n skuName: Standard_AzureFrontDoor\n exampleFrontdoorSecret:\n type: azure:cdn:FrontdoorSecret\n name: example\n properties:\n name: example-customer-managed-secret\n cdnFrontdoorProfileId: ${exampleFrontdoorProfile.id}\n secret:\n customerCertificates:\n - keyVaultCertificateId: ${exampleCertificate.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n frontdoor:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n displayName: Microsoft.Azure.Cdn\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nFront Door Secrets can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cdn/frontdoorSecret:FrontdoorSecret example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Cdn/profiles/profile1/secrets/secrets1\n```\n\n", "properties": { "cdnFrontdoorProfileId": { "type": "string", @@ -137430,7 +137430,7 @@ } }, "azure:cognitive/accountCustomerManagedKey:AccountCustomerManagedKey": { - "description": "Manages a Customer Managed Key for a Cognitive Services Account.\n\n\u003e **NOTE:** It's possible to define a Customer Managed Key both within the `azure.cognitive.Account` resource via the `customer_managed_key` block and by using the `azure.cognitive.AccountCustomerManagedKey` resource. However it's not possible to use both methods to manage a Customer Managed Key for a Cognitive Account, since there'll be conflicts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West US\",\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n resourceGroupName: example.name,\n location: example.location,\n name: \"example-identity\",\n});\nconst exampleAccount = new azure.cognitive.Account(\"example\", {\n name: \"example-account\",\n location: example.location,\n resourceGroupName: example.name,\n kind: \"Face\",\n skuName: \"E0\",\n customSubdomainName: \"example-account\",\n identity: {\n type: \"SystemAssigned, UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-vault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n accessPolicies: [\n {\n tenantId: exampleAccount.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleAccount.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n ],\n secretPermissions: [\"Get\"],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Get\"],\n },\n {\n tenantId: exampleUserAssignedIdentity.tenantId,\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n ],\n secretPermissions: [\"Get\"],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n});\nconst exampleAccountCustomerManagedKey = new azure.cognitive.AccountCustomerManagedKey(\"example\", {\n cognitiveAccountId: exampleAccount.id,\n keyVaultKeyId: exampleKey.id,\n identityClientId: exampleUserAssignedIdentity.clientId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West US\")\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n resource_group_name=example.name,\n location=example.location,\n name=\"example-identity\")\nexample_account = azure.cognitive.Account(\"example\",\n name=\"example-account\",\n location=example.location,\n resource_group_name=example.name,\n kind=\"Face\",\n sku_name=\"E0\",\n custom_subdomain_name=\"example-account\",\n identity={\n \"type\": \"SystemAssigned, UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-vault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True,\n access_policies=[\n {\n \"tenant_id\": example_account.identity.tenant_id,\n \"object_id\": example_account.identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"Create\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n ],\n \"secret_permissions\": [\"Get\"],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n \"secret_permissions\": [\"Get\"],\n },\n {\n \"tenant_id\": example_user_assigned_identity.tenant_id,\n \"object_id\": example_user_assigned_identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n ],\n \"secret_permissions\": [\"Get\"],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ])\nexample_account_customer_managed_key = azure.cognitive.AccountCustomerManagedKey(\"example\",\n cognitive_account_id=example_account.id,\n key_vault_key_id=example_key.id,\n identity_client_id=example_user_assigned_identity.client_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West US\",\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n ResourceGroupName = example.Name,\n Location = example.Location,\n Name = \"example-identity\",\n });\n\n var exampleAccount = new Azure.Cognitive.Account(\"example\", new()\n {\n Name = \"example-account\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Kind = \"Face\",\n SkuName = \"E0\",\n CustomSubdomainName = \"example-account\",\n Identity = new Azure.Cognitive.Inputs.AccountIdentityArgs\n {\n Type = \"SystemAssigned, UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-vault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleAccount.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleAccount.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleUserAssignedIdentity.TenantId,\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n });\n\n var exampleAccountCustomerManagedKey = new Azure.Cognitive.AccountCustomerManagedKey(\"example\", new()\n {\n CognitiveAccountId = exampleAccount.Id,\n KeyVaultKeyId = exampleKey.Id,\n IdentityClientId = exampleUserAssignedIdentity.ClientId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cognitive\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tName: pulumi.String(\"example-identity\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := cognitive.NewAccount(ctx, \"example\", \u0026cognitive.AccountArgs{\n\t\t\tName: pulumi.String(\"example-account\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tKind: pulumi.String(\"Face\"),\n\t\t\tSkuName: pulumi.String(\"E0\"),\n\t\t\tCustomSubdomainName: pulumi.String(\"example-account\"),\n\t\t\tIdentity: \u0026cognitive.AccountIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned, UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-vault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleAccount.Identity.ApplyT(func(identity cognitive.AccountIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleAccount.Identity.ApplyT(func(identity cognitive.AccountIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleUserAssignedIdentity.TenantId,\n\t\t\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cognitive.NewAccountCustomerManagedKey(ctx, \"example\", \u0026cognitive.AccountCustomerManagedKeyArgs{\n\t\t\tCognitiveAccountId: exampleAccount.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t\tIdentityClientId: exampleUserAssignedIdentity.ClientId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.cognitive.Account;\nimport com.pulumi.azure.cognitive.AccountArgs;\nimport com.pulumi.azure.cognitive.inputs.AccountIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.cognitive.AccountCustomerManagedKey;\nimport com.pulumi.azure.cognitive.AccountCustomerManagedKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West US\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .resourceGroupName(example.name())\n .location(example.location())\n .name(\"example-identity\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example-account\")\n .location(example.location())\n .resourceGroupName(example.name())\n .kind(\"Face\")\n .skuName(\"E0\")\n .customSubdomainName(\"example-account\")\n .identity(AccountIdentityArgs.builder()\n .type(\"SystemAssigned, UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-vault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleAccount.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleAccount.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\")\n .secretPermissions(\"Get\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Get\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleUserAssignedIdentity.tenantId())\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\")\n .secretPermissions(\"Get\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build());\n\n var exampleAccountCustomerManagedKey = new AccountCustomerManagedKey(\"exampleAccountCustomerManagedKey\", AccountCustomerManagedKeyArgs.builder()\n .cognitiveAccountId(exampleAccount.id())\n .keyVaultKeyId(exampleKey.id())\n .identityClientId(exampleUserAssignedIdentity.clientId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West US\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n resourceGroupName: ${example.name}\n location: ${example.location}\n name: example-identity\n exampleAccount:\n type: azure:cognitive:Account\n name: example\n properties:\n name: example-account\n location: ${example.location}\n resourceGroupName: ${example.name}\n kind: Face\n skuName: E0\n customSubdomainName: example-account\n identity:\n type: SystemAssigned, UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-vault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n accessPolicies:\n - tenantId: ${exampleAccount.identity.tenantId}\n objectId: ${exampleAccount.identity.principalId}\n keyPermissions:\n - Get\n - Create\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n secretPermissions:\n - Get\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n secretPermissions:\n - Get\n - tenantId: ${exampleUserAssignedIdentity.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n secretPermissions:\n - Get\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n exampleAccountCustomerManagedKey:\n type: azure:cognitive:AccountCustomerManagedKey\n name: example\n properties:\n cognitiveAccountId: ${exampleAccount.id}\n keyVaultKeyId: ${exampleKey.id}\n identityClientId: ${exampleUserAssignedIdentity.clientId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustomer Managed Keys for a Cognitive Account can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cognitive/accountCustomerManagedKey:AccountCustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.CognitiveServices/accounts/account1\n```\n\n", + "description": "Manages a Customer Managed Key for a Cognitive Services Account.\n\n\u003e **NOTE:** It's possible to define a Customer Managed Key both within the `azure.cognitive.Account` resource via the `customer_managed_key` block and by using the `azure.cognitive.AccountCustomerManagedKey` resource. However it's not possible to use both methods to manage a Customer Managed Key for a Cognitive Account, since there'll be conflicts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West US\",\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n resourceGroupName: example.name,\n location: example.location,\n name: \"example-identity\",\n});\nconst exampleAccount = new azure.cognitive.Account(\"example\", {\n name: \"example-account\",\n location: example.location,\n resourceGroupName: example.name,\n kind: \"Face\",\n skuName: \"E0\",\n customSubdomainName: \"example-account\",\n identity: {\n type: \"SystemAssigned, UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-vault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n accessPolicies: [\n {\n tenantId: exampleAccount.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleAccount.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n ],\n secretPermissions: [\"Get\"],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Get\"],\n },\n {\n tenantId: exampleUserAssignedIdentity.tenantId,\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n ],\n secretPermissions: [\"Get\"],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n});\nconst exampleAccountCustomerManagedKey = new azure.cognitive.AccountCustomerManagedKey(\"example\", {\n cognitiveAccountId: exampleAccount.id,\n keyVaultKeyId: exampleKey.id,\n identityClientId: exampleUserAssignedIdentity.clientId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West US\")\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n resource_group_name=example.name,\n location=example.location,\n name=\"example-identity\")\nexample_account = azure.cognitive.Account(\"example\",\n name=\"example-account\",\n location=example.location,\n resource_group_name=example.name,\n kind=\"Face\",\n sku_name=\"E0\",\n custom_subdomain_name=\"example-account\",\n identity={\n \"type\": \"SystemAssigned, UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-vault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True,\n access_policies=[\n {\n \"tenant_id\": example_account.identity.tenant_id,\n \"object_id\": example_account.identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"Create\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n ],\n \"secret_permissions\": [\"Get\"],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n \"secret_permissions\": [\"Get\"],\n },\n {\n \"tenant_id\": example_user_assigned_identity.tenant_id,\n \"object_id\": example_user_assigned_identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n ],\n \"secret_permissions\": [\"Get\"],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ])\nexample_account_customer_managed_key = azure.cognitive.AccountCustomerManagedKey(\"example\",\n cognitive_account_id=example_account.id,\n key_vault_key_id=example_key.id,\n identity_client_id=example_user_assigned_identity.client_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West US\",\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n ResourceGroupName = example.Name,\n Location = example.Location,\n Name = \"example-identity\",\n });\n\n var exampleAccount = new Azure.Cognitive.Account(\"example\", new()\n {\n Name = \"example-account\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Kind = \"Face\",\n SkuName = \"E0\",\n CustomSubdomainName = \"example-account\",\n Identity = new Azure.Cognitive.Inputs.AccountIdentityArgs\n {\n Type = \"SystemAssigned, UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-vault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleAccount.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleAccount.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleUserAssignedIdentity.TenantId,\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n });\n\n var exampleAccountCustomerManagedKey = new Azure.Cognitive.AccountCustomerManagedKey(\"example\", new()\n {\n CognitiveAccountId = exampleAccount.Id,\n KeyVaultKeyId = exampleKey.Id,\n IdentityClientId = exampleUserAssignedIdentity.ClientId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cognitive\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tName: pulumi.String(\"example-identity\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := cognitive.NewAccount(ctx, \"example\", \u0026cognitive.AccountArgs{\n\t\t\tName: pulumi.String(\"example-account\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tKind: pulumi.String(\"Face\"),\n\t\t\tSkuName: pulumi.String(\"E0\"),\n\t\t\tCustomSubdomainName: pulumi.String(\"example-account\"),\n\t\t\tIdentity: \u0026cognitive.AccountIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned, UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-vault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleAccount.Identity.ApplyT(func(identity cognitive.AccountIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleAccount.Identity.ApplyT(func(identity cognitive.AccountIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleUserAssignedIdentity.TenantId,\n\t\t\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cognitive.NewAccountCustomerManagedKey(ctx, \"example\", \u0026cognitive.AccountCustomerManagedKeyArgs{\n\t\t\tCognitiveAccountId: exampleAccount.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t\tIdentityClientId: exampleUserAssignedIdentity.ClientId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.cognitive.Account;\nimport com.pulumi.azure.cognitive.AccountArgs;\nimport com.pulumi.azure.cognitive.inputs.AccountIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.cognitive.AccountCustomerManagedKey;\nimport com.pulumi.azure.cognitive.AccountCustomerManagedKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West US\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .resourceGroupName(example.name())\n .location(example.location())\n .name(\"example-identity\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example-account\")\n .location(example.location())\n .resourceGroupName(example.name())\n .kind(\"Face\")\n .skuName(\"E0\")\n .customSubdomainName(\"example-account\")\n .identity(AccountIdentityArgs.builder()\n .type(\"SystemAssigned, UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-vault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleAccount.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleAccount.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\")\n .secretPermissions(\"Get\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Get\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleUserAssignedIdentity.tenantId())\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\")\n .secretPermissions(\"Get\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build());\n\n var exampleAccountCustomerManagedKey = new AccountCustomerManagedKey(\"exampleAccountCustomerManagedKey\", AccountCustomerManagedKeyArgs.builder()\n .cognitiveAccountId(exampleAccount.id())\n .keyVaultKeyId(exampleKey.id())\n .identityClientId(exampleUserAssignedIdentity.clientId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West US\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n resourceGroupName: ${example.name}\n location: ${example.location}\n name: example-identity\n exampleAccount:\n type: azure:cognitive:Account\n name: example\n properties:\n name: example-account\n location: ${example.location}\n resourceGroupName: ${example.name}\n kind: Face\n skuName: E0\n customSubdomainName: example-account\n identity:\n type: SystemAssigned, UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-vault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n accessPolicies:\n - tenantId: ${exampleAccount.identity.tenantId}\n objectId: ${exampleAccount.identity.principalId}\n keyPermissions:\n - Get\n - Create\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n secretPermissions:\n - Get\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n secretPermissions:\n - Get\n - tenantId: ${exampleUserAssignedIdentity.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n secretPermissions:\n - Get\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n exampleAccountCustomerManagedKey:\n type: azure:cognitive:AccountCustomerManagedKey\n name: example\n properties:\n cognitiveAccountId: ${exampleAccount.id}\n keyVaultKeyId: ${exampleKey.id}\n identityClientId: ${exampleUserAssignedIdentity.clientId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustomer Managed Keys for a Cognitive Account can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cognitive/accountCustomerManagedKey:AccountCustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.CognitiveServices/accounts/account1\n```\n\n", "properties": { "cognitiveAccountId": { "type": "string", @@ -139049,7 +139049,7 @@ } }, "azure:compute/diskEncryptionSet:DiskEncryptionSet": { - "description": "Manages a Disk Encryption Set.\n\n\u003e **NOTE:** At this time the Key Vault used to store the Active Key for this Disk Encryption Set must have both Soft Delete \u0026 Purge Protection enabled - which are not yet supported by this provider.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"des-example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n enabledForDiskEncryption: true,\n purgeProtectionEnabled: true,\n});\nconst example_user = new azure.keyvault.AccessPolicy(\"example-user\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"des-example-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [example_user],\n});\nconst exampleDiskEncryptionSet = new azure.compute.DiskEncryptionSet(\"example\", {\n name: \"des\",\n resourceGroupName: example.name,\n location: example.location,\n keyVaultKeyId: exampleKey.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst example_disk = new azure.keyvault.AccessPolicy(\"example-disk\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.tenantId),\n objectId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.principalId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ],\n});\nconst example_diskAssignment = new azure.authorization.Assignment(\"example-disk\", {\n scope: exampleKeyVault.id,\n roleDefinitionName: \"Key Vault Crypto Service Encryption User\",\n principalId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.principalId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"des-example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n enabled_for_disk_encryption=True,\n purge_protection_enabled=True)\nexample_user = azure.keyvault.AccessPolicy(\"example-user\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"des-example-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_user]))\nexample_disk_encryption_set = azure.compute.DiskEncryptionSet(\"example\",\n name=\"des\",\n resource_group_name=example.name,\n location=example.location,\n key_vault_key_id=example_key.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_disk = azure.keyvault.AccessPolicy(\"example-disk\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_disk_encryption_set.identity.tenant_id,\n object_id=example_disk_encryption_set.identity.principal_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ])\nexample_disk_assignment = azure.authorization.Assignment(\"example-disk\",\n scope=example_key_vault.id,\n role_definition_name=\"Key Vault Crypto Service Encryption User\",\n principal_id=example_disk_encryption_set.identity.principal_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"des-example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n EnabledForDiskEncryption = true,\n PurgeProtectionEnabled = true,\n });\n\n var example_user = new Azure.KeyVault.AccessPolicy(\"example-user\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"des-example-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n example_user,\n },\n });\n\n var exampleDiskEncryptionSet = new Azure.Compute.DiskEncryptionSet(\"example\", new()\n {\n Name = \"des\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n KeyVaultKeyId = exampleKey.Id,\n Identity = new Azure.Compute.Inputs.DiskEncryptionSetIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var example_disk = new Azure.KeyVault.AccessPolicy(\"example-disk\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.TenantId),\n ObjectId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.PrincipalId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n },\n });\n\n var example_diskAssignment = new Azure.Authorization.Assignment(\"example-disk\", new()\n {\n Scope = exampleKeyVault.Id,\n RoleDefinitionName = \"Key Vault Crypto Service Encryption User\",\n PrincipalId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.PrincipalId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/compute\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"des-example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-user\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"des-example-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texample_user,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDiskEncryptionSet, err := compute.NewDiskEncryptionSet(ctx, \"example\", \u0026compute.DiskEncryptionSetArgs{\n\t\t\tName: pulumi.String(\"des\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t\tIdentity: \u0026compute.DiskEncryptionSetIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-disk\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-disk\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleKeyVault.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Key Vault Crypto Service Encryption User\"),\n\t\t\tPrincipalId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.compute.DiskEncryptionSet;\nimport com.pulumi.azure.compute.DiskEncryptionSetArgs;\nimport com.pulumi.azure.compute.inputs.DiskEncryptionSetIdentityArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"des-example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .enabledForDiskEncryption(true)\n .purgeProtectionEnabled(true)\n .build());\n\n var example_user = new AccessPolicy(\"example-user\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"des-example-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(example_user)\n .build());\n\n var exampleDiskEncryptionSet = new DiskEncryptionSet(\"exampleDiskEncryptionSet\", DiskEncryptionSetArgs.builder()\n .name(\"des\")\n .resourceGroupName(example.name())\n .location(example.location())\n .keyVaultKeyId(exampleKey.id())\n .identity(DiskEncryptionSetIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var example_disk = new AccessPolicy(\"example-disk\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\")\n .build());\n\n var example_diskAssignment = new Assignment(\"example-diskAssignment\", AssignmentArgs.builder()\n .scope(exampleKeyVault.id())\n .roleDefinitionName(\"Key Vault Crypto Service Encryption User\")\n .principalId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: des-example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n enabledForDiskEncryption: true\n purgeProtectionEnabled: true\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: des-example-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${[\"example-user\"]}\n exampleDiskEncryptionSet:\n type: azure:compute:DiskEncryptionSet\n name: example\n properties:\n name: des\n resourceGroupName: ${example.name}\n location: ${example.location}\n keyVaultKeyId: ${exampleKey.id}\n identity:\n type: SystemAssigned\n example-disk:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleDiskEncryptionSet.identity.tenantId}\n objectId: ${exampleDiskEncryptionSet.identity.principalId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n example-user:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n - GetRotationPolicy\n example-diskAssignment:\n type: azure:authorization:Assignment\n name: example-disk\n properties:\n scope: ${exampleKeyVault.id}\n roleDefinitionName: Key Vault Crypto Service Encryption User\n principalId: ${exampleDiskEncryptionSet.identity.principalId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Automatic Key Rotation Enabled\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"des-example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n enabledForDiskEncryption: true,\n purgeProtectionEnabled: true,\n});\nconst example_user = new azure.keyvault.AccessPolicy(\"example-user\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"des-example-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [example_user],\n});\nconst exampleDiskEncryptionSet = new azure.compute.DiskEncryptionSet(\"example\", {\n name: \"des\",\n resourceGroupName: example.name,\n location: example.location,\n keyVaultKeyId: exampleKey.versionlessId,\n autoKeyRotationEnabled: true,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst example_disk = new azure.keyvault.AccessPolicy(\"example-disk\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.tenantId),\n objectId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.principalId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ],\n});\nconst example_diskAssignment = new azure.authorization.Assignment(\"example-disk\", {\n scope: exampleKeyVault.id,\n roleDefinitionName: \"Key Vault Crypto Service Encryption User\",\n principalId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.principalId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"des-example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n enabled_for_disk_encryption=True,\n purge_protection_enabled=True)\nexample_user = azure.keyvault.AccessPolicy(\"example-user\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"des-example-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_user]))\nexample_disk_encryption_set = azure.compute.DiskEncryptionSet(\"example\",\n name=\"des\",\n resource_group_name=example.name,\n location=example.location,\n key_vault_key_id=example_key.versionless_id,\n auto_key_rotation_enabled=True,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_disk = azure.keyvault.AccessPolicy(\"example-disk\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_disk_encryption_set.identity.tenant_id,\n object_id=example_disk_encryption_set.identity.principal_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ])\nexample_disk_assignment = azure.authorization.Assignment(\"example-disk\",\n scope=example_key_vault.id,\n role_definition_name=\"Key Vault Crypto Service Encryption User\",\n principal_id=example_disk_encryption_set.identity.principal_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"des-example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n EnabledForDiskEncryption = true,\n PurgeProtectionEnabled = true,\n });\n\n var example_user = new Azure.KeyVault.AccessPolicy(\"example-user\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"des-example-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n example_user,\n },\n });\n\n var exampleDiskEncryptionSet = new Azure.Compute.DiskEncryptionSet(\"example\", new()\n {\n Name = \"des\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n KeyVaultKeyId = exampleKey.VersionlessId,\n AutoKeyRotationEnabled = true,\n Identity = new Azure.Compute.Inputs.DiskEncryptionSetIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var example_disk = new Azure.KeyVault.AccessPolicy(\"example-disk\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.TenantId),\n ObjectId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.PrincipalId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n },\n });\n\n var example_diskAssignment = new Azure.Authorization.Assignment(\"example-disk\", new()\n {\n Scope = exampleKeyVault.Id,\n RoleDefinitionName = \"Key Vault Crypto Service Encryption User\",\n PrincipalId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.PrincipalId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/compute\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"des-example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-user\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"des-example-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texample_user,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDiskEncryptionSet, err := compute.NewDiskEncryptionSet(ctx, \"example\", \u0026compute.DiskEncryptionSetArgs{\n\t\t\tName: pulumi.String(\"des\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tKeyVaultKeyId: exampleKey.VersionlessId,\n\t\t\tAutoKeyRotationEnabled: pulumi.Bool(true),\n\t\t\tIdentity: \u0026compute.DiskEncryptionSetIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-disk\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-disk\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleKeyVault.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Key Vault Crypto Service Encryption User\"),\n\t\t\tPrincipalId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.compute.DiskEncryptionSet;\nimport com.pulumi.azure.compute.DiskEncryptionSetArgs;\nimport com.pulumi.azure.compute.inputs.DiskEncryptionSetIdentityArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"des-example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .enabledForDiskEncryption(true)\n .purgeProtectionEnabled(true)\n .build());\n\n var example_user = new AccessPolicy(\"example-user\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"des-example-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(example_user)\n .build());\n\n var exampleDiskEncryptionSet = new DiskEncryptionSet(\"exampleDiskEncryptionSet\", DiskEncryptionSetArgs.builder()\n .name(\"des\")\n .resourceGroupName(example.name())\n .location(example.location())\n .keyVaultKeyId(exampleKey.versionlessId())\n .autoKeyRotationEnabled(true)\n .identity(DiskEncryptionSetIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var example_disk = new AccessPolicy(\"example-disk\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\")\n .build());\n\n var example_diskAssignment = new Assignment(\"example-diskAssignment\", AssignmentArgs.builder()\n .scope(exampleKeyVault.id())\n .roleDefinitionName(\"Key Vault Crypto Service Encryption User\")\n .principalId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: des-example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n enabledForDiskEncryption: true\n purgeProtectionEnabled: true\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: des-example-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${[\"example-user\"]}\n exampleDiskEncryptionSet:\n type: azure:compute:DiskEncryptionSet\n name: example\n properties:\n name: des\n resourceGroupName: ${example.name}\n location: ${example.location}\n keyVaultKeyId: ${exampleKey.versionlessId}\n autoKeyRotationEnabled: true\n identity:\n type: SystemAssigned\n example-disk:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleDiskEncryptionSet.identity.tenantId}\n objectId: ${exampleDiskEncryptionSet.identity.principalId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n example-user:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n - GetRotationPolicy\n example-diskAssignment:\n type: azure:authorization:Assignment\n name: example-disk\n properties:\n scope: ${exampleKeyVault.id}\n roleDefinitionName: Key Vault Crypto Service Encryption User\n principalId: ${exampleDiskEncryptionSet.identity.principalId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDisk Encryption Sets can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:compute/diskEncryptionSet:DiskEncryptionSet example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Compute/diskEncryptionSets/encryptionSet1\n```\n\n", + "description": "Manages a Disk Encryption Set.\n\n\u003e **NOTE:** At this time the Key Vault used to store the Active Key for this Disk Encryption Set must have both Soft Delete \u0026 Purge Protection enabled - which are not yet supported by this provider.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"des-example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n enabledForDiskEncryption: true,\n purgeProtectionEnabled: true,\n});\nconst example_user = new azure.keyvault.AccessPolicy(\"example-user\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"des-example-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [example_user],\n});\nconst exampleDiskEncryptionSet = new azure.compute.DiskEncryptionSet(\"example\", {\n name: \"des\",\n resourceGroupName: example.name,\n location: example.location,\n keyVaultKeyId: exampleKey.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst example_disk = new azure.keyvault.AccessPolicy(\"example-disk\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.tenantId),\n objectId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.principalId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ],\n});\nconst example_diskAssignment = new azure.authorization.Assignment(\"example-disk\", {\n scope: exampleKeyVault.id,\n roleDefinitionName: \"Key Vault Crypto Service Encryption User\",\n principalId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.principalId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"des-example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n enabled_for_disk_encryption=True,\n purge_protection_enabled=True)\nexample_user = azure.keyvault.AccessPolicy(\"example-user\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"des-example-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_user]))\nexample_disk_encryption_set = azure.compute.DiskEncryptionSet(\"example\",\n name=\"des\",\n resource_group_name=example.name,\n location=example.location,\n key_vault_key_id=example_key.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_disk = azure.keyvault.AccessPolicy(\"example-disk\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_disk_encryption_set.identity.tenant_id,\n object_id=example_disk_encryption_set.identity.principal_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ])\nexample_disk_assignment = azure.authorization.Assignment(\"example-disk\",\n scope=example_key_vault.id,\n role_definition_name=\"Key Vault Crypto Service Encryption User\",\n principal_id=example_disk_encryption_set.identity.principal_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"des-example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n EnabledForDiskEncryption = true,\n PurgeProtectionEnabled = true,\n });\n\n var example_user = new Azure.KeyVault.AccessPolicy(\"example-user\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"des-example-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n example_user,\n },\n });\n\n var exampleDiskEncryptionSet = new Azure.Compute.DiskEncryptionSet(\"example\", new()\n {\n Name = \"des\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n KeyVaultKeyId = exampleKey.Id,\n Identity = new Azure.Compute.Inputs.DiskEncryptionSetIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var example_disk = new Azure.KeyVault.AccessPolicy(\"example-disk\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.TenantId),\n ObjectId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.PrincipalId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n },\n });\n\n var example_diskAssignment = new Azure.Authorization.Assignment(\"example-disk\", new()\n {\n Scope = exampleKeyVault.Id,\n RoleDefinitionName = \"Key Vault Crypto Service Encryption User\",\n PrincipalId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.PrincipalId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/compute\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"des-example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-user\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"des-example-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texample_user,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDiskEncryptionSet, err := compute.NewDiskEncryptionSet(ctx, \"example\", \u0026compute.DiskEncryptionSetArgs{\n\t\t\tName: pulumi.String(\"des\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t\tIdentity: \u0026compute.DiskEncryptionSetIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-disk\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-disk\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleKeyVault.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Key Vault Crypto Service Encryption User\"),\n\t\t\tPrincipalId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.compute.DiskEncryptionSet;\nimport com.pulumi.azure.compute.DiskEncryptionSetArgs;\nimport com.pulumi.azure.compute.inputs.DiskEncryptionSetIdentityArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"des-example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .enabledForDiskEncryption(true)\n .purgeProtectionEnabled(true)\n .build());\n\n var example_user = new AccessPolicy(\"example-user\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"des-example-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(example_user)\n .build());\n\n var exampleDiskEncryptionSet = new DiskEncryptionSet(\"exampleDiskEncryptionSet\", DiskEncryptionSetArgs.builder()\n .name(\"des\")\n .resourceGroupName(example.name())\n .location(example.location())\n .keyVaultKeyId(exampleKey.id())\n .identity(DiskEncryptionSetIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var example_disk = new AccessPolicy(\"example-disk\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\")\n .build());\n\n var example_diskAssignment = new Assignment(\"example-diskAssignment\", AssignmentArgs.builder()\n .scope(exampleKeyVault.id())\n .roleDefinitionName(\"Key Vault Crypto Service Encryption User\")\n .principalId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: des-example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n enabledForDiskEncryption: true\n purgeProtectionEnabled: true\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: des-example-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${[\"example-user\"]}\n exampleDiskEncryptionSet:\n type: azure:compute:DiskEncryptionSet\n name: example\n properties:\n name: des\n resourceGroupName: ${example.name}\n location: ${example.location}\n keyVaultKeyId: ${exampleKey.id}\n identity:\n type: SystemAssigned\n example-disk:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleDiskEncryptionSet.identity.tenantId}\n objectId: ${exampleDiskEncryptionSet.identity.principalId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n example-user:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n - GetRotationPolicy\n example-diskAssignment:\n type: azure:authorization:Assignment\n name: example-disk\n properties:\n scope: ${exampleKeyVault.id}\n roleDefinitionName: Key Vault Crypto Service Encryption User\n principalId: ${exampleDiskEncryptionSet.identity.principalId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Automatic Key Rotation Enabled\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"des-example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n enabledForDiskEncryption: true,\n purgeProtectionEnabled: true,\n});\nconst example_user = new azure.keyvault.AccessPolicy(\"example-user\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"des-example-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [example_user],\n});\nconst exampleDiskEncryptionSet = new azure.compute.DiskEncryptionSet(\"example\", {\n name: \"des\",\n resourceGroupName: example.name,\n location: example.location,\n keyVaultKeyId: exampleKey.versionlessId,\n autoKeyRotationEnabled: true,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst example_disk = new azure.keyvault.AccessPolicy(\"example-disk\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.tenantId),\n objectId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.principalId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ],\n});\nconst example_diskAssignment = new azure.authorization.Assignment(\"example-disk\", {\n scope: exampleKeyVault.id,\n roleDefinitionName: \"Key Vault Crypto Service Encryption User\",\n principalId: exampleDiskEncryptionSet.identity.apply(identity =\u003e identity.principalId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"des-example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n enabled_for_disk_encryption=True,\n purge_protection_enabled=True)\nexample_user = azure.keyvault.AccessPolicy(\"example-user\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"des-example-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_user]))\nexample_disk_encryption_set = azure.compute.DiskEncryptionSet(\"example\",\n name=\"des\",\n resource_group_name=example.name,\n location=example.location,\n key_vault_key_id=example_key.versionless_id,\n auto_key_rotation_enabled=True,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_disk = azure.keyvault.AccessPolicy(\"example-disk\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_disk_encryption_set.identity.tenant_id,\n object_id=example_disk_encryption_set.identity.principal_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ])\nexample_disk_assignment = azure.authorization.Assignment(\"example-disk\",\n scope=example_key_vault.id,\n role_definition_name=\"Key Vault Crypto Service Encryption User\",\n principal_id=example_disk_encryption_set.identity.principal_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"des-example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n EnabledForDiskEncryption = true,\n PurgeProtectionEnabled = true,\n });\n\n var example_user = new Azure.KeyVault.AccessPolicy(\"example-user\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"des-example-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n example_user,\n },\n });\n\n var exampleDiskEncryptionSet = new Azure.Compute.DiskEncryptionSet(\"example\", new()\n {\n Name = \"des\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n KeyVaultKeyId = exampleKey.VersionlessId,\n AutoKeyRotationEnabled = true,\n Identity = new Azure.Compute.Inputs.DiskEncryptionSetIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var example_disk = new Azure.KeyVault.AccessPolicy(\"example-disk\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.TenantId),\n ObjectId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.PrincipalId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n },\n });\n\n var example_diskAssignment = new Azure.Authorization.Assignment(\"example-disk\", new()\n {\n Scope = exampleKeyVault.Id,\n RoleDefinitionName = \"Key Vault Crypto Service Encryption User\",\n PrincipalId = exampleDiskEncryptionSet.Identity.Apply(identity =\u003e identity.PrincipalId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/compute\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"des-example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-user\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"des-example-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texample_user,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDiskEncryptionSet, err := compute.NewDiskEncryptionSet(ctx, \"example\", \u0026compute.DiskEncryptionSetArgs{\n\t\t\tName: pulumi.String(\"des\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tKeyVaultKeyId: exampleKey.VersionlessId,\n\t\t\tAutoKeyRotationEnabled: pulumi.Bool(true),\n\t\t\tIdentity: \u0026compute.DiskEncryptionSetIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-disk\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-disk\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleKeyVault.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Key Vault Crypto Service Encryption User\"),\n\t\t\tPrincipalId: pulumi.String(exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.compute.DiskEncryptionSet;\nimport com.pulumi.azure.compute.DiskEncryptionSetArgs;\nimport com.pulumi.azure.compute.inputs.DiskEncryptionSetIdentityArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"des-example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .enabledForDiskEncryption(true)\n .purgeProtectionEnabled(true)\n .build());\n\n var example_user = new AccessPolicy(\"example-user\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"des-example-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(example_user)\n .build());\n\n var exampleDiskEncryptionSet = new DiskEncryptionSet(\"exampleDiskEncryptionSet\", DiskEncryptionSetArgs.builder()\n .name(\"des\")\n .resourceGroupName(example.name())\n .location(example.location())\n .keyVaultKeyId(exampleKey.versionlessId())\n .autoKeyRotationEnabled(true)\n .identity(DiskEncryptionSetIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var example_disk = new AccessPolicy(\"example-disk\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\")\n .build());\n\n var example_diskAssignment = new Assignment(\"example-diskAssignment\", AssignmentArgs.builder()\n .scope(exampleKeyVault.id())\n .roleDefinitionName(\"Key Vault Crypto Service Encryption User\")\n .principalId(exampleDiskEncryptionSet.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: des-example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n enabledForDiskEncryption: true\n purgeProtectionEnabled: true\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: des-example-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${[\"example-user\"]}\n exampleDiskEncryptionSet:\n type: azure:compute:DiskEncryptionSet\n name: example\n properties:\n name: des\n resourceGroupName: ${example.name}\n location: ${example.location}\n keyVaultKeyId: ${exampleKey.versionlessId}\n autoKeyRotationEnabled: true\n identity:\n type: SystemAssigned\n example-disk:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleDiskEncryptionSet.identity.tenantId}\n objectId: ${exampleDiskEncryptionSet.identity.principalId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n example-user:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n - GetRotationPolicy\n example-diskAssignment:\n type: azure:authorization:Assignment\n name: example-disk\n properties:\n scope: ${exampleKeyVault.id}\n roleDefinitionName: Key Vault Crypto Service Encryption User\n principalId: ${exampleDiskEncryptionSet.identity.principalId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDisk Encryption Sets can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:compute/diskEncryptionSet:DiskEncryptionSet example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Compute/diskEncryptionSets/encryptionSet1\n```\n\n", "properties": { "autoKeyRotationEnabled": { "type": "boolean" @@ -147307,7 +147307,7 @@ } }, "azure:confidentialledger/ledger:Ledger": { - "description": "Manages a Confidential Ledger.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst ledger = new azure.confidentialledger.Ledger(\"ledger\", {\n name: \"example-ledger\",\n resourceGroupName: example.name,\n location: example.location,\n ledgerType: \"Private\",\n azureadBasedServicePrincipals: [{\n principalId: current.then(current =\u003e current.objectId),\n tenantId: current.then(current =\u003e current.tenantId),\n ledgerRoleName: \"Administrator\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nledger = azure.confidentialledger.Ledger(\"ledger\",\n name=\"example-ledger\",\n resource_group_name=example.name,\n location=example.location,\n ledger_type=\"Private\",\n azuread_based_service_principals=[{\n \"principal_id\": current.object_id,\n \"tenant_id\": current.tenant_id,\n \"ledger_role_name\": \"Administrator\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var ledger = new Azure.ConfidentialLedger.Ledger(\"ledger\", new()\n {\n Name = \"example-ledger\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n LedgerType = \"Private\",\n AzureadBasedServicePrincipals = new[]\n {\n new Azure.ConfidentialLedger.Inputs.LedgerAzureadBasedServicePrincipalArgs\n {\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n LedgerRoleName = \"Administrator\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/confidentialledger\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = confidentialledger.NewLedger(ctx, \"ledger\", \u0026confidentialledger.LedgerArgs{\n\t\t\tName: pulumi.String(\"example-ledger\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tLedgerType: pulumi.String(\"Private\"),\n\t\t\tAzureadBasedServicePrincipals: confidentialledger.LedgerAzureadBasedServicePrincipalArray{\n\t\t\t\t\u0026confidentialledger.LedgerAzureadBasedServicePrincipalArgs{\n\t\t\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tLedgerRoleName: pulumi.String(\"Administrator\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.confidentialledger.Ledger;\nimport com.pulumi.azure.confidentialledger.LedgerArgs;\nimport com.pulumi.azure.confidentialledger.inputs.LedgerAzureadBasedServicePrincipalArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var ledger = new Ledger(\"ledger\", LedgerArgs.builder()\n .name(\"example-ledger\")\n .resourceGroupName(example.name())\n .location(example.location())\n .ledgerType(\"Private\")\n .azureadBasedServicePrincipals(LedgerAzureadBasedServicePrincipalArgs.builder()\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .ledgerRoleName(\"Administrator\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n ledger:\n type: azure:confidentialledger:Ledger\n properties:\n name: example-ledger\n resourceGroupName: ${example.name}\n location: ${example.location}\n ledgerType: Private\n azureadBasedServicePrincipals:\n - principalId: ${current.objectId}\n tenantId: ${current.tenantId}\n ledgerRoleName: Administrator\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nConfidential Ledgers can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:confidentialledger/ledger:Ledger example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/example-group/providers/Microsoft.ConfidentialLedger/ledgers/example-ledger\n```\n\n", + "description": "Manages a Confidential Ledger.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst ledger = new azure.confidentialledger.Ledger(\"ledger\", {\n name: \"example-ledger\",\n resourceGroupName: example.name,\n location: example.location,\n ledgerType: \"Private\",\n azureadBasedServicePrincipals: [{\n principalId: current.then(current =\u003e current.objectId),\n tenantId: current.then(current =\u003e current.tenantId),\n ledgerRoleName: \"Administrator\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nledger = azure.confidentialledger.Ledger(\"ledger\",\n name=\"example-ledger\",\n resource_group_name=example.name,\n location=example.location,\n ledger_type=\"Private\",\n azuread_based_service_principals=[{\n \"principal_id\": current.object_id,\n \"tenant_id\": current.tenant_id,\n \"ledger_role_name\": \"Administrator\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var ledger = new Azure.ConfidentialLedger.Ledger(\"ledger\", new()\n {\n Name = \"example-ledger\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n LedgerType = \"Private\",\n AzureadBasedServicePrincipals = new[]\n {\n new Azure.ConfidentialLedger.Inputs.LedgerAzureadBasedServicePrincipalArgs\n {\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n LedgerRoleName = \"Administrator\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/confidentialledger\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = confidentialledger.NewLedger(ctx, \"ledger\", \u0026confidentialledger.LedgerArgs{\n\t\t\tName: pulumi.String(\"example-ledger\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tLedgerType: pulumi.String(\"Private\"),\n\t\t\tAzureadBasedServicePrincipals: confidentialledger.LedgerAzureadBasedServicePrincipalArray{\n\t\t\t\t\u0026confidentialledger.LedgerAzureadBasedServicePrincipalArgs{\n\t\t\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tLedgerRoleName: pulumi.String(\"Administrator\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.confidentialledger.Ledger;\nimport com.pulumi.azure.confidentialledger.LedgerArgs;\nimport com.pulumi.azure.confidentialledger.inputs.LedgerAzureadBasedServicePrincipalArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var ledger = new Ledger(\"ledger\", LedgerArgs.builder()\n .name(\"example-ledger\")\n .resourceGroupName(example.name())\n .location(example.location())\n .ledgerType(\"Private\")\n .azureadBasedServicePrincipals(LedgerAzureadBasedServicePrincipalArgs.builder()\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .ledgerRoleName(\"Administrator\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n ledger:\n type: azure:confidentialledger:Ledger\n properties:\n name: example-ledger\n resourceGroupName: ${example.name}\n location: ${example.location}\n ledgerType: Private\n azureadBasedServicePrincipals:\n - principalId: ${current.objectId}\n tenantId: ${current.tenantId}\n ledgerRoleName: Administrator\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nConfidential Ledgers can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:confidentialledger/ledger:Ledger example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/example-group/providers/Microsoft.ConfidentialLedger/ledgers/example-ledger\n```\n\n", "properties": { "azureadBasedServicePrincipals": { "type": "array", @@ -147864,7 +147864,7 @@ } }, "azure:consumption/budgetSubscription:BudgetSubscription": { - "description": "Manages a Subscription Consumption Budget.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"eastus\",\n});\nconst exampleActionGroup = new azure.monitoring.ActionGroup(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n shortName: \"example\",\n});\nconst exampleBudgetSubscription = new azure.consumption.BudgetSubscription(\"example\", {\n name: \"example\",\n subscriptionId: current.then(current =\u003e current.id),\n amount: 1000,\n timeGrain: \"Monthly\",\n timePeriod: {\n startDate: \"2022-06-01T00:00:00Z\",\n endDate: \"2022-07-01T00:00:00Z\",\n },\n filter: {\n dimensions: [{\n name: \"ResourceGroupName\",\n values: [example.name],\n }],\n tags: [{\n name: \"foo\",\n values: [\n \"bar\",\n \"baz\",\n ],\n }],\n },\n notifications: [\n {\n enabled: true,\n threshold: 90,\n operator: \"EqualTo\",\n contactEmails: [\n \"foo@example.com\",\n \"bar@example.com\",\n ],\n contactGroups: [exampleActionGroup.id],\n contactRoles: [\"Owner\"],\n },\n {\n enabled: false,\n threshold: 100,\n operator: \"GreaterThan\",\n thresholdType: \"Forecasted\",\n contactEmails: [\n \"foo@example.com\",\n \"bar@example.com\",\n ],\n },\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"eastus\")\nexample_action_group = azure.monitoring.ActionGroup(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n short_name=\"example\")\nexample_budget_subscription = azure.consumption.BudgetSubscription(\"example\",\n name=\"example\",\n subscription_id=current.id,\n amount=1000,\n time_grain=\"Monthly\",\n time_period={\n \"start_date\": \"2022-06-01T00:00:00Z\",\n \"end_date\": \"2022-07-01T00:00:00Z\",\n },\n filter={\n \"dimensions\": [{\n \"name\": \"ResourceGroupName\",\n \"values\": [example.name],\n }],\n \"tags\": [{\n \"name\": \"foo\",\n \"values\": [\n \"bar\",\n \"baz\",\n ],\n }],\n },\n notifications=[\n {\n \"enabled\": True,\n \"threshold\": 90,\n \"operator\": \"EqualTo\",\n \"contact_emails\": [\n \"foo@example.com\",\n \"bar@example.com\",\n ],\n \"contact_groups\": [example_action_group.id],\n \"contact_roles\": [\"Owner\"],\n },\n {\n \"enabled\": False,\n \"threshold\": 100,\n \"operator\": \"GreaterThan\",\n \"threshold_type\": \"Forecasted\",\n \"contact_emails\": [\n \"foo@example.com\",\n \"bar@example.com\",\n ],\n },\n ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"eastus\",\n });\n\n var exampleActionGroup = new Azure.Monitoring.ActionGroup(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n ShortName = \"example\",\n });\n\n var exampleBudgetSubscription = new Azure.Consumption.BudgetSubscription(\"example\", new()\n {\n Name = \"example\",\n SubscriptionId = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Amount = 1000,\n TimeGrain = \"Monthly\",\n TimePeriod = new Azure.Consumption.Inputs.BudgetSubscriptionTimePeriodArgs\n {\n StartDate = \"2022-06-01T00:00:00Z\",\n EndDate = \"2022-07-01T00:00:00Z\",\n },\n Filter = new Azure.Consumption.Inputs.BudgetSubscriptionFilterArgs\n {\n Dimensions = new[]\n {\n new Azure.Consumption.Inputs.BudgetSubscriptionFilterDimensionArgs\n {\n Name = \"ResourceGroupName\",\n Values = new[]\n {\n example.Name,\n },\n },\n },\n Tags = new[]\n {\n new Azure.Consumption.Inputs.BudgetSubscriptionFilterTagArgs\n {\n Name = \"foo\",\n Values = new[]\n {\n \"bar\",\n \"baz\",\n },\n },\n },\n },\n Notifications = new[]\n {\n new Azure.Consumption.Inputs.BudgetSubscriptionNotificationArgs\n {\n Enabled = true,\n Threshold = 90,\n Operator = \"EqualTo\",\n ContactEmails = new[]\n {\n \"foo@example.com\",\n \"bar@example.com\",\n },\n ContactGroups = new[]\n {\n exampleActionGroup.Id,\n },\n ContactRoles = new[]\n {\n \"Owner\",\n },\n },\n new Azure.Consumption.Inputs.BudgetSubscriptionNotificationArgs\n {\n Enabled = false,\n Threshold = 100,\n Operator = \"GreaterThan\",\n ThresholdType = \"Forecasted\",\n ContactEmails = new[]\n {\n \"foo@example.com\",\n \"bar@example.com\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/consumption\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/monitoring\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"eastus\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleActionGroup, err := monitoring.NewActionGroup(ctx, \"example\", \u0026monitoring.ActionGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tShortName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = consumption.NewBudgetSubscription(ctx, \"example\", \u0026consumption.BudgetSubscriptionArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tSubscriptionId: pulumi.String(current.Id),\n\t\t\tAmount: pulumi.Float64(1000),\n\t\t\tTimeGrain: pulumi.String(\"Monthly\"),\n\t\t\tTimePeriod: \u0026consumption.BudgetSubscriptionTimePeriodArgs{\n\t\t\t\tStartDate: pulumi.String(\"2022-06-01T00:00:00Z\"),\n\t\t\t\tEndDate: pulumi.String(\"2022-07-01T00:00:00Z\"),\n\t\t\t},\n\t\t\tFilter: \u0026consumption.BudgetSubscriptionFilterArgs{\n\t\t\t\tDimensions: consumption.BudgetSubscriptionFilterDimensionArray{\n\t\t\t\t\t\u0026consumption.BudgetSubscriptionFilterDimensionArgs{\n\t\t\t\t\t\tName: pulumi.String(\"ResourceGroupName\"),\n\t\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\t\texample.Name,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tTags: consumption.BudgetSubscriptionFilterTagArray{\n\t\t\t\t\t\u0026consumption.BudgetSubscriptionFilterTagArgs{\n\t\t\t\t\t\tName: pulumi.String(\"foo\"),\n\t\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"bar\"),\n\t\t\t\t\t\t\tpulumi.String(\"baz\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tNotifications: consumption.BudgetSubscriptionNotificationArray{\n\t\t\t\t\u0026consumption.BudgetSubscriptionNotificationArgs{\n\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t\tThreshold: pulumi.Int(90),\n\t\t\t\t\tOperator: pulumi.String(\"EqualTo\"),\n\t\t\t\t\tContactEmails: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"foo@example.com\"),\n\t\t\t\t\t\tpulumi.String(\"bar@example.com\"),\n\t\t\t\t\t},\n\t\t\t\t\tContactGroups: pulumi.StringArray{\n\t\t\t\t\t\texampleActionGroup.ID(),\n\t\t\t\t\t},\n\t\t\t\t\tContactRoles: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Owner\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026consumption.BudgetSubscriptionNotificationArgs{\n\t\t\t\t\tEnabled: pulumi.Bool(false),\n\t\t\t\t\tThreshold: pulumi.Int(100),\n\t\t\t\t\tOperator: pulumi.String(\"GreaterThan\"),\n\t\t\t\t\tThresholdType: pulumi.String(\"Forecasted\"),\n\t\t\t\t\tContactEmails: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"foo@example.com\"),\n\t\t\t\t\t\tpulumi.String(\"bar@example.com\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.monitoring.ActionGroup;\nimport com.pulumi.azure.monitoring.ActionGroupArgs;\nimport com.pulumi.azure.consumption.BudgetSubscription;\nimport com.pulumi.azure.consumption.BudgetSubscriptionArgs;\nimport com.pulumi.azure.consumption.inputs.BudgetSubscriptionTimePeriodArgs;\nimport com.pulumi.azure.consumption.inputs.BudgetSubscriptionFilterArgs;\nimport com.pulumi.azure.consumption.inputs.BudgetSubscriptionNotificationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"eastus\")\n .build());\n\n var exampleActionGroup = new ActionGroup(\"exampleActionGroup\", ActionGroupArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .shortName(\"example\")\n .build());\n\n var exampleBudgetSubscription = new BudgetSubscription(\"exampleBudgetSubscription\", BudgetSubscriptionArgs.builder()\n .name(\"example\")\n .subscriptionId(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .amount(1000)\n .timeGrain(\"Monthly\")\n .timePeriod(BudgetSubscriptionTimePeriodArgs.builder()\n .startDate(\"2022-06-01T00:00:00Z\")\n .endDate(\"2022-07-01T00:00:00Z\")\n .build())\n .filter(BudgetSubscriptionFilterArgs.builder()\n .dimensions(BudgetSubscriptionFilterDimensionArgs.builder()\n .name(\"ResourceGroupName\")\n .values(example.name())\n .build())\n .tags(BudgetSubscriptionFilterTagArgs.builder()\n .name(\"foo\")\n .values( \n \"bar\",\n \"baz\")\n .build())\n .build())\n .notifications( \n BudgetSubscriptionNotificationArgs.builder()\n .enabled(true)\n .threshold(90)\n .operator(\"EqualTo\")\n .contactEmails( \n \"foo@example.com\",\n \"bar@example.com\")\n .contactGroups(exampleActionGroup.id())\n .contactRoles(\"Owner\")\n .build(),\n BudgetSubscriptionNotificationArgs.builder()\n .enabled(false)\n .threshold(100)\n .operator(\"GreaterThan\")\n .thresholdType(\"Forecasted\")\n .contactEmails( \n \"foo@example.com\",\n \"bar@example.com\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: eastus\n exampleActionGroup:\n type: azure:monitoring:ActionGroup\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n shortName: example\n exampleBudgetSubscription:\n type: azure:consumption:BudgetSubscription\n name: example\n properties:\n name: example\n subscriptionId: ${current.id}\n amount: 1000\n timeGrain: Monthly\n timePeriod:\n startDate: 2022-06-01T00:00:00Z\n endDate: 2022-07-01T00:00:00Z\n filter:\n dimensions:\n - name: ResourceGroupName\n values:\n - ${example.name}\n tags:\n - name: foo\n values:\n - bar\n - baz\n notifications:\n - enabled: true\n threshold: 90\n operator: EqualTo\n contactEmails:\n - foo@example.com\n - bar@example.com\n contactGroups:\n - ${exampleActionGroup.id}\n contactRoles:\n - Owner\n - enabled: false\n threshold: 100\n operator: GreaterThan\n thresholdType: Forecasted\n contactEmails:\n - foo@example.com\n - bar@example.com\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSubscription Consumption Budgets can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:consumption/budgetSubscription:BudgetSubscription example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Consumption/budgets/subscription1\n```\n\n", + "description": "Manages a Subscription Consumption Budget.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"eastus\",\n});\nconst exampleActionGroup = new azure.monitoring.ActionGroup(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n shortName: \"example\",\n});\nconst exampleBudgetSubscription = new azure.consumption.BudgetSubscription(\"example\", {\n name: \"example\",\n subscriptionId: current.then(current =\u003e current.id),\n amount: 1000,\n timeGrain: \"Monthly\",\n timePeriod: {\n startDate: \"2022-06-01T00:00:00Z\",\n endDate: \"2022-07-01T00:00:00Z\",\n },\n filter: {\n dimensions: [{\n name: \"ResourceGroupName\",\n values: [example.name],\n }],\n tags: [{\n name: \"foo\",\n values: [\n \"bar\",\n \"baz\",\n ],\n }],\n },\n notifications: [\n {\n enabled: true,\n threshold: 90,\n operator: \"EqualTo\",\n contactEmails: [\n \"foo@example.com\",\n \"bar@example.com\",\n ],\n contactGroups: [exampleActionGroup.id],\n contactRoles: [\"Owner\"],\n },\n {\n enabled: false,\n threshold: 100,\n operator: \"GreaterThan\",\n thresholdType: \"Forecasted\",\n contactEmails: [\n \"foo@example.com\",\n \"bar@example.com\",\n ],\n },\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"eastus\")\nexample_action_group = azure.monitoring.ActionGroup(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n short_name=\"example\")\nexample_budget_subscription = azure.consumption.BudgetSubscription(\"example\",\n name=\"example\",\n subscription_id=current.id,\n amount=1000,\n time_grain=\"Monthly\",\n time_period={\n \"start_date\": \"2022-06-01T00:00:00Z\",\n \"end_date\": \"2022-07-01T00:00:00Z\",\n },\n filter={\n \"dimensions\": [{\n \"name\": \"ResourceGroupName\",\n \"values\": [example.name],\n }],\n \"tags\": [{\n \"name\": \"foo\",\n \"values\": [\n \"bar\",\n \"baz\",\n ],\n }],\n },\n notifications=[\n {\n \"enabled\": True,\n \"threshold\": 90,\n \"operator\": \"EqualTo\",\n \"contact_emails\": [\n \"foo@example.com\",\n \"bar@example.com\",\n ],\n \"contact_groups\": [example_action_group.id],\n \"contact_roles\": [\"Owner\"],\n },\n {\n \"enabled\": False,\n \"threshold\": 100,\n \"operator\": \"GreaterThan\",\n \"threshold_type\": \"Forecasted\",\n \"contact_emails\": [\n \"foo@example.com\",\n \"bar@example.com\",\n ],\n },\n ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"eastus\",\n });\n\n var exampleActionGroup = new Azure.Monitoring.ActionGroup(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n ShortName = \"example\",\n });\n\n var exampleBudgetSubscription = new Azure.Consumption.BudgetSubscription(\"example\", new()\n {\n Name = \"example\",\n SubscriptionId = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Amount = 1000,\n TimeGrain = \"Monthly\",\n TimePeriod = new Azure.Consumption.Inputs.BudgetSubscriptionTimePeriodArgs\n {\n StartDate = \"2022-06-01T00:00:00Z\",\n EndDate = \"2022-07-01T00:00:00Z\",\n },\n Filter = new Azure.Consumption.Inputs.BudgetSubscriptionFilterArgs\n {\n Dimensions = new[]\n {\n new Azure.Consumption.Inputs.BudgetSubscriptionFilterDimensionArgs\n {\n Name = \"ResourceGroupName\",\n Values = new[]\n {\n example.Name,\n },\n },\n },\n Tags = new[]\n {\n new Azure.Consumption.Inputs.BudgetSubscriptionFilterTagArgs\n {\n Name = \"foo\",\n Values = new[]\n {\n \"bar\",\n \"baz\",\n },\n },\n },\n },\n Notifications = new[]\n {\n new Azure.Consumption.Inputs.BudgetSubscriptionNotificationArgs\n {\n Enabled = true,\n Threshold = 90,\n Operator = \"EqualTo\",\n ContactEmails = new[]\n {\n \"foo@example.com\",\n \"bar@example.com\",\n },\n ContactGroups = new[]\n {\n exampleActionGroup.Id,\n },\n ContactRoles = new[]\n {\n \"Owner\",\n },\n },\n new Azure.Consumption.Inputs.BudgetSubscriptionNotificationArgs\n {\n Enabled = false,\n Threshold = 100,\n Operator = \"GreaterThan\",\n ThresholdType = \"Forecasted\",\n ContactEmails = new[]\n {\n \"foo@example.com\",\n \"bar@example.com\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/consumption\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/monitoring\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"eastus\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleActionGroup, err := monitoring.NewActionGroup(ctx, \"example\", \u0026monitoring.ActionGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tShortName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = consumption.NewBudgetSubscription(ctx, \"example\", \u0026consumption.BudgetSubscriptionArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tSubscriptionId: pulumi.String(current.Id),\n\t\t\tAmount: pulumi.Float64(1000),\n\t\t\tTimeGrain: pulumi.String(\"Monthly\"),\n\t\t\tTimePeriod: \u0026consumption.BudgetSubscriptionTimePeriodArgs{\n\t\t\t\tStartDate: pulumi.String(\"2022-06-01T00:00:00Z\"),\n\t\t\t\tEndDate: pulumi.String(\"2022-07-01T00:00:00Z\"),\n\t\t\t},\n\t\t\tFilter: \u0026consumption.BudgetSubscriptionFilterArgs{\n\t\t\t\tDimensions: consumption.BudgetSubscriptionFilterDimensionArray{\n\t\t\t\t\t\u0026consumption.BudgetSubscriptionFilterDimensionArgs{\n\t\t\t\t\t\tName: pulumi.String(\"ResourceGroupName\"),\n\t\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\t\texample.Name,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tTags: consumption.BudgetSubscriptionFilterTagArray{\n\t\t\t\t\t\u0026consumption.BudgetSubscriptionFilterTagArgs{\n\t\t\t\t\t\tName: pulumi.String(\"foo\"),\n\t\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"bar\"),\n\t\t\t\t\t\t\tpulumi.String(\"baz\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tNotifications: consumption.BudgetSubscriptionNotificationArray{\n\t\t\t\t\u0026consumption.BudgetSubscriptionNotificationArgs{\n\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t\tThreshold: pulumi.Int(90),\n\t\t\t\t\tOperator: pulumi.String(\"EqualTo\"),\n\t\t\t\t\tContactEmails: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"foo@example.com\"),\n\t\t\t\t\t\tpulumi.String(\"bar@example.com\"),\n\t\t\t\t\t},\n\t\t\t\t\tContactGroups: pulumi.StringArray{\n\t\t\t\t\t\texampleActionGroup.ID(),\n\t\t\t\t\t},\n\t\t\t\t\tContactRoles: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Owner\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026consumption.BudgetSubscriptionNotificationArgs{\n\t\t\t\t\tEnabled: pulumi.Bool(false),\n\t\t\t\t\tThreshold: pulumi.Int(100),\n\t\t\t\t\tOperator: pulumi.String(\"GreaterThan\"),\n\t\t\t\t\tThresholdType: pulumi.String(\"Forecasted\"),\n\t\t\t\t\tContactEmails: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"foo@example.com\"),\n\t\t\t\t\t\tpulumi.String(\"bar@example.com\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.monitoring.ActionGroup;\nimport com.pulumi.azure.monitoring.ActionGroupArgs;\nimport com.pulumi.azure.consumption.BudgetSubscription;\nimport com.pulumi.azure.consumption.BudgetSubscriptionArgs;\nimport com.pulumi.azure.consumption.inputs.BudgetSubscriptionTimePeriodArgs;\nimport com.pulumi.azure.consumption.inputs.BudgetSubscriptionFilterArgs;\nimport com.pulumi.azure.consumption.inputs.BudgetSubscriptionNotificationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"eastus\")\n .build());\n\n var exampleActionGroup = new ActionGroup(\"exampleActionGroup\", ActionGroupArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .shortName(\"example\")\n .build());\n\n var exampleBudgetSubscription = new BudgetSubscription(\"exampleBudgetSubscription\", BudgetSubscriptionArgs.builder()\n .name(\"example\")\n .subscriptionId(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .amount(1000)\n .timeGrain(\"Monthly\")\n .timePeriod(BudgetSubscriptionTimePeriodArgs.builder()\n .startDate(\"2022-06-01T00:00:00Z\")\n .endDate(\"2022-07-01T00:00:00Z\")\n .build())\n .filter(BudgetSubscriptionFilterArgs.builder()\n .dimensions(BudgetSubscriptionFilterDimensionArgs.builder()\n .name(\"ResourceGroupName\")\n .values(example.name())\n .build())\n .tags(BudgetSubscriptionFilterTagArgs.builder()\n .name(\"foo\")\n .values( \n \"bar\",\n \"baz\")\n .build())\n .build())\n .notifications( \n BudgetSubscriptionNotificationArgs.builder()\n .enabled(true)\n .threshold(90)\n .operator(\"EqualTo\")\n .contactEmails( \n \"foo@example.com\",\n \"bar@example.com\")\n .contactGroups(exampleActionGroup.id())\n .contactRoles(\"Owner\")\n .build(),\n BudgetSubscriptionNotificationArgs.builder()\n .enabled(false)\n .threshold(100)\n .operator(\"GreaterThan\")\n .thresholdType(\"Forecasted\")\n .contactEmails( \n \"foo@example.com\",\n \"bar@example.com\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: eastus\n exampleActionGroup:\n type: azure:monitoring:ActionGroup\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n shortName: example\n exampleBudgetSubscription:\n type: azure:consumption:BudgetSubscription\n name: example\n properties:\n name: example\n subscriptionId: ${current.id}\n amount: 1000\n timeGrain: Monthly\n timePeriod:\n startDate: 2022-06-01T00:00:00Z\n endDate: 2022-07-01T00:00:00Z\n filter:\n dimensions:\n - name: ResourceGroupName\n values:\n - ${example.name}\n tags:\n - name: foo\n values:\n - bar\n - baz\n notifications:\n - enabled: true\n threshold: 90\n operator: EqualTo\n contactEmails:\n - foo@example.com\n - bar@example.com\n contactGroups:\n - ${exampleActionGroup.id}\n contactRoles:\n - Owner\n - enabled: false\n threshold: 100\n operator: GreaterThan\n thresholdType: Forecasted\n contactEmails:\n - foo@example.com\n - bar@example.com\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSubscription Consumption Budgets can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:consumption/budgetSubscription:BudgetSubscription example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Consumption/budgets/subscription1\n```\n\n", "properties": { "amount": { "type": "number", @@ -149387,7 +149387,7 @@ } }, "azure:containerservice/clusterTrustedAccessRoleBinding:ClusterTrustedAccessRoleBinding": { - "description": "\u003c!-- Note: This documentation is generated. Any manual changes will be overwritten --\u003e\n\nManages a Kubernetes Cluster Trusted Access Role Binding\n\u003e **Note:** This Resource is in **Preview** to use this you must be opted into the Preview. You can do this by running `az feature register --namespace Microsoft.ContainerService --name TrustedAccessPreview` and then `az provider register -n Microsoft.ContainerService`\n.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst example = new azure.appinsights.Insights(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n applicationType: \"example-value\",\n});\nconst test = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: exampleAzurermClientConfig.tenantId,\n skuName: \"example-value\",\n softDeleteRetentionDays: \"example-value\",\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleAzurermClientConfig.tenantId,\n objectId: exampleAzurermClientConfig.objectId,\n keyPermissions: \"example-value\",\n});\nconst exampleKubernetesCluster = new azure.containerservice.KubernetesCluster(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n dnsPrefix: \"acctestaksexample\",\n defaultNodePool: {\n name: \"example-value\",\n nodeCount: \"example-value\",\n vmSize: \"example-value\",\n upgradeSettings: {\n maxSurge: \"example-value\",\n },\n },\n identity: {\n type: \"example-value\",\n },\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n accountTier: \"example-value\",\n accountReplicationType: \"example-value\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n applicationInsightsId: example.id,\n identity: {\n type: \"example-value\",\n },\n});\nconst exampleClusterTrustedAccessRoleBinding = new azure.containerservice.ClusterTrustedAccessRoleBinding(\"example\", {\n kubernetesClusterId: exampleKubernetesCluster.id,\n name: \"example\",\n roles: \"example-value\",\n sourceResourceId: exampleWorkspace.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample = azure.appinsights.Insights(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n application_type=\"example-value\")\ntest = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n tenant_id=example_azurerm_client_config[\"tenantId\"],\n sku_name=\"example-value\",\n soft_delete_retention_days=\"example-value\")\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_azurerm_client_config[\"tenantId\"],\n object_id=example_azurerm_client_config[\"objectId\"],\n key_permissions=\"example-value\")\nexample_kubernetes_cluster = azure.containerservice.KubernetesCluster(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n dns_prefix=\"acctestaksexample\",\n default_node_pool={\n \"name\": \"example-value\",\n \"node_count\": \"example-value\",\n \"vm_size\": \"example-value\",\n \"upgrade_settings\": {\n \"max_surge\": \"example-value\",\n },\n },\n identity={\n \"type\": \"example-value\",\n })\nexample_account = azure.storage.Account(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n account_tier=\"example-value\",\n account_replication_type=\"example-value\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n application_insights_id=example.id,\n identity={\n \"type\": \"example-value\",\n })\nexample_cluster_trusted_access_role_binding = azure.containerservice.ClusterTrustedAccessRoleBinding(\"example\",\n kubernetes_cluster_id=example_kubernetes_cluster.id,\n name=\"example\",\n roles=\"example-value\",\n source_resource_id=example_workspace.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var example = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n ApplicationType = \"example-value\",\n });\n\n var test = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = exampleAzurermClientConfig.TenantId,\n SkuName = \"example-value\",\n SoftDeleteRetentionDays = \"example-value\",\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleAzurermClientConfig.TenantId,\n ObjectId = exampleAzurermClientConfig.ObjectId,\n KeyPermissions = \"example-value\",\n });\n\n var exampleKubernetesCluster = new Azure.ContainerService.KubernetesCluster(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n DnsPrefix = \"acctestaksexample\",\n DefaultNodePool = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolArgs\n {\n Name = \"example-value\",\n NodeCount = \"example-value\",\n VmSize = \"example-value\",\n UpgradeSettings = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolUpgradeSettingsArgs\n {\n MaxSurge = \"example-value\",\n },\n },\n Identity = new Azure.ContainerService.Inputs.KubernetesClusterIdentityArgs\n {\n Type = \"example-value\",\n },\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n AccountTier = \"example-value\",\n AccountReplicationType = \"example-value\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n ApplicationInsightsId = example.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"example-value\",\n },\n });\n\n var exampleClusterTrustedAccessRoleBinding = new Azure.ContainerService.ClusterTrustedAccessRoleBinding(\"example\", new()\n {\n KubernetesClusterId = exampleKubernetesCluster.Id,\n Name = \"example\",\n Roles = \"example-value\",\n SourceResourceId = exampleWorkspace.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tApplicationType: pulumi.String(\"example-value\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.Any(exampleAzurermClientConfig.TenantId),\n\t\t\tSkuName: pulumi.String(\"example-value\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(\"example-value\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.Any(exampleAzurermClientConfig.TenantId),\n\t\t\tObjectId: pulumi.Any(exampleAzurermClientConfig.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray(\"example-value\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesCluster, err := containerservice.NewKubernetesCluster(ctx, \"example\", \u0026containerservice.KubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tDnsPrefix: pulumi.String(\"acctestaksexample\"),\n\t\t\tDefaultNodePool: \u0026containerservice.KubernetesClusterDefaultNodePoolArgs{\n\t\t\t\tName: pulumi.String(\"example-value\"),\n\t\t\t\tNodeCount: pulumi.Int(\"example-value\"),\n\t\t\t\tVmSize: pulumi.String(\"example-value\"),\n\t\t\t\tUpgradeSettings: \u0026containerservice.KubernetesClusterDefaultNodePoolUpgradeSettingsArgs{\n\t\t\t\t\tMaxSurge: pulumi.String(\"example-value\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tIdentity: \u0026containerservice.KubernetesClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"example-value\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAccountTier: pulumi.String(\"example-value\"),\n\t\t\tAccountReplicationType: pulumi.String(\"example-value\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tApplicationInsightsId: example.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"example-value\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = containerservice.NewClusterTrustedAccessRoleBinding(ctx, \"example\", \u0026containerservice.ClusterTrustedAccessRoleBindingArgs{\n\t\t\tKubernetesClusterId: exampleKubernetesCluster.ID(),\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tRoles: pulumi.StringArray(\"example-value\"),\n\t\t\tSourceResourceId: exampleWorkspace.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.containerservice.KubernetesCluster;\nimport com.pulumi.azure.containerservice.KubernetesClusterArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolUpgradeSettingsArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBinding;\nimport com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBindingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var example = new Insights(\"example\", InsightsArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .applicationType(\"example-value\")\n .build());\n\n final var test = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(exampleAzurermClientConfig.tenantId())\n .skuName(\"example-value\")\n .softDeleteRetentionDays(\"example-value\")\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleAzurermClientConfig.tenantId())\n .objectId(exampleAzurermClientConfig.objectId())\n .keyPermissions(\"example-value\")\n .build());\n\n var exampleKubernetesCluster = new KubernetesCluster(\"exampleKubernetesCluster\", KubernetesClusterArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .dnsPrefix(\"acctestaksexample\")\n .defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()\n .name(\"example-value\")\n .nodeCount(\"example-value\")\n .vmSize(\"example-value\")\n .upgradeSettings(KubernetesClusterDefaultNodePoolUpgradeSettingsArgs.builder()\n .maxSurge(\"example-value\")\n .build())\n .build())\n .identity(KubernetesClusterIdentityArgs.builder()\n .type(\"example-value\")\n .build())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .accountTier(\"example-value\")\n .accountReplicationType(\"example-value\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .applicationInsightsId(example.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"example-value\")\n .build())\n .build());\n\n var exampleClusterTrustedAccessRoleBinding = new ClusterTrustedAccessRoleBinding(\"exampleClusterTrustedAccessRoleBinding\", ClusterTrustedAccessRoleBindingArgs.builder()\n .kubernetesClusterId(exampleKubernetesCluster.id())\n .name(\"example\")\n .roles(\"example-value\")\n .sourceResourceId(exampleWorkspace.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:appinsights:Insights\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n applicationType: example-value\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${exampleAzurermClientConfig.tenantId}\n skuName: example-value\n softDeleteRetentionDays: example-value\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleAzurermClientConfig.tenantId}\n objectId: ${exampleAzurermClientConfig.objectId}\n keyPermissions: example-value\n exampleKubernetesCluster:\n type: azure:containerservice:KubernetesCluster\n name: example\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n dnsPrefix: acctestaksexample\n defaultNodePool:\n name: example-value\n nodeCount: example-value\n vmSize: example-value\n upgradeSettings:\n maxSurge: example-value\n identity:\n type: example-value\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n applicationInsightsId: ${example.id}\n identity:\n type: example-value\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n accountTier: example-value\n accountReplicationType: example-value\n exampleClusterTrustedAccessRoleBinding:\n type: azure:containerservice:ClusterTrustedAccessRoleBinding\n name: example\n properties:\n kubernetesClusterId: ${exampleKubernetesCluster.id}\n name: example\n roles: example-value\n sourceResourceId: ${exampleWorkspace.id}\nvariables:\n test:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn existing Kubernetes Cluster Trusted Access Role Binding can be imported into Pulumi using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:containerservice/clusterTrustedAccessRoleBinding:ClusterTrustedAccessRoleBinding example /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/{managedClusterName}/trustedAccessRoleBindings/{trustedAccessRoleBindingName}\n```\n\n* Where `{subscriptionId}` is the ID of the Azure Subscription where the Kubernetes Cluster Trusted Access Role Binding exists. For example `12345678-1234-9876-4563-123456789012`.\n\n* Where `{resourceGroupName}` is the name of Resource Group where this Kubernetes Cluster Trusted Access Role Binding exists. For example `example-resource-group`.\n\n* Where `{managedClusterName}` is the name of the Managed Cluster. For example `managedClusterValue`.\n\n* Where `{trustedAccessRoleBindingName}` is the name of the Trusted Access Role Binding. For example `trustedAccessRoleBindingValue`.\n\n", + "description": "\u003c!-- Note: This documentation is generated. Any manual changes will be overwritten --\u003e\n\nManages a Kubernetes Cluster Trusted Access Role Binding\n\u003e **Note:** This Resource is in **Preview** to use this you must be opted into the Preview. You can do this by running `az feature register --namespace Microsoft.ContainerService --name TrustedAccessPreview` and then `az provider register -n Microsoft.ContainerService`\n.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst example = new azure.appinsights.Insights(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n applicationType: \"example-value\",\n});\nconst test = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: exampleAzurermClientConfig.tenantId,\n skuName: \"example-value\",\n softDeleteRetentionDays: \"example-value\",\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleAzurermClientConfig.tenantId,\n objectId: exampleAzurermClientConfig.objectId,\n keyPermissions: \"example-value\",\n});\nconst exampleKubernetesCluster = new azure.containerservice.KubernetesCluster(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n dnsPrefix: \"acctestaksexample\",\n defaultNodePool: {\n name: \"example-value\",\n nodeCount: \"example-value\",\n vmSize: \"example-value\",\n upgradeSettings: {\n maxSurge: \"example-value\",\n },\n },\n identity: {\n type: \"example-value\",\n },\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n accountTier: \"example-value\",\n accountReplicationType: \"example-value\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n applicationInsightsId: example.id,\n identity: {\n type: \"example-value\",\n },\n});\nconst exampleClusterTrustedAccessRoleBinding = new azure.containerservice.ClusterTrustedAccessRoleBinding(\"example\", {\n kubernetesClusterId: exampleKubernetesCluster.id,\n name: \"example\",\n roles: \"example-value\",\n sourceResourceId: exampleWorkspace.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample = azure.appinsights.Insights(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n application_type=\"example-value\")\ntest = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n tenant_id=example_azurerm_client_config[\"tenantId\"],\n sku_name=\"example-value\",\n soft_delete_retention_days=\"example-value\")\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_azurerm_client_config[\"tenantId\"],\n object_id=example_azurerm_client_config[\"objectId\"],\n key_permissions=\"example-value\")\nexample_kubernetes_cluster = azure.containerservice.KubernetesCluster(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n dns_prefix=\"acctestaksexample\",\n default_node_pool={\n \"name\": \"example-value\",\n \"node_count\": \"example-value\",\n \"vm_size\": \"example-value\",\n \"upgrade_settings\": {\n \"max_surge\": \"example-value\",\n },\n },\n identity={\n \"type\": \"example-value\",\n })\nexample_account = azure.storage.Account(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n account_tier=\"example-value\",\n account_replication_type=\"example-value\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n application_insights_id=example.id,\n identity={\n \"type\": \"example-value\",\n })\nexample_cluster_trusted_access_role_binding = azure.containerservice.ClusterTrustedAccessRoleBinding(\"example\",\n kubernetes_cluster_id=example_kubernetes_cluster.id,\n name=\"example\",\n roles=\"example-value\",\n source_resource_id=example_workspace.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var example = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n ApplicationType = \"example-value\",\n });\n\n var test = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = exampleAzurermClientConfig.TenantId,\n SkuName = \"example-value\",\n SoftDeleteRetentionDays = \"example-value\",\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleAzurermClientConfig.TenantId,\n ObjectId = exampleAzurermClientConfig.ObjectId,\n KeyPermissions = \"example-value\",\n });\n\n var exampleKubernetesCluster = new Azure.ContainerService.KubernetesCluster(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n DnsPrefix = \"acctestaksexample\",\n DefaultNodePool = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolArgs\n {\n Name = \"example-value\",\n NodeCount = \"example-value\",\n VmSize = \"example-value\",\n UpgradeSettings = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolUpgradeSettingsArgs\n {\n MaxSurge = \"example-value\",\n },\n },\n Identity = new Azure.ContainerService.Inputs.KubernetesClusterIdentityArgs\n {\n Type = \"example-value\",\n },\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n AccountTier = \"example-value\",\n AccountReplicationType = \"example-value\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n ApplicationInsightsId = example.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"example-value\",\n },\n });\n\n var exampleClusterTrustedAccessRoleBinding = new Azure.ContainerService.ClusterTrustedAccessRoleBinding(\"example\", new()\n {\n KubernetesClusterId = exampleKubernetesCluster.Id,\n Name = \"example\",\n Roles = \"example-value\",\n SourceResourceId = exampleWorkspace.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tApplicationType: pulumi.String(\"example-value\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.Any(exampleAzurermClientConfig.TenantId),\n\t\t\tSkuName: pulumi.String(\"example-value\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(\"example-value\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.Any(exampleAzurermClientConfig.TenantId),\n\t\t\tObjectId: pulumi.Any(exampleAzurermClientConfig.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray(\"example-value\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesCluster, err := containerservice.NewKubernetesCluster(ctx, \"example\", \u0026containerservice.KubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tDnsPrefix: pulumi.String(\"acctestaksexample\"),\n\t\t\tDefaultNodePool: \u0026containerservice.KubernetesClusterDefaultNodePoolArgs{\n\t\t\t\tName: pulumi.String(\"example-value\"),\n\t\t\t\tNodeCount: pulumi.Int(\"example-value\"),\n\t\t\t\tVmSize: pulumi.String(\"example-value\"),\n\t\t\t\tUpgradeSettings: \u0026containerservice.KubernetesClusterDefaultNodePoolUpgradeSettingsArgs{\n\t\t\t\t\tMaxSurge: pulumi.String(\"example-value\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tIdentity: \u0026containerservice.KubernetesClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"example-value\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tAccountTier: pulumi.String(\"example-value\"),\n\t\t\tAccountReplicationType: pulumi.String(\"example-value\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tApplicationInsightsId: example.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"example-value\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = containerservice.NewClusterTrustedAccessRoleBinding(ctx, \"example\", \u0026containerservice.ClusterTrustedAccessRoleBindingArgs{\n\t\t\tKubernetesClusterId: exampleKubernetesCluster.ID(),\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tRoles: pulumi.StringArray(\"example-value\"),\n\t\t\tSourceResourceId: exampleWorkspace.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.containerservice.KubernetesCluster;\nimport com.pulumi.azure.containerservice.KubernetesClusterArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolUpgradeSettingsArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBinding;\nimport com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBindingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var example = new Insights(\"example\", InsightsArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .applicationType(\"example-value\")\n .build());\n\n final var test = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(exampleAzurermClientConfig.tenantId())\n .skuName(\"example-value\")\n .softDeleteRetentionDays(\"example-value\")\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleAzurermClientConfig.tenantId())\n .objectId(exampleAzurermClientConfig.objectId())\n .keyPermissions(\"example-value\")\n .build());\n\n var exampleKubernetesCluster = new KubernetesCluster(\"exampleKubernetesCluster\", KubernetesClusterArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .dnsPrefix(\"acctestaksexample\")\n .defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()\n .name(\"example-value\")\n .nodeCount(\"example-value\")\n .vmSize(\"example-value\")\n .upgradeSettings(KubernetesClusterDefaultNodePoolUpgradeSettingsArgs.builder()\n .maxSurge(\"example-value\")\n .build())\n .build())\n .identity(KubernetesClusterIdentityArgs.builder()\n .type(\"example-value\")\n .build())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .accountTier(\"example-value\")\n .accountReplicationType(\"example-value\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .applicationInsightsId(example.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"example-value\")\n .build())\n .build());\n\n var exampleClusterTrustedAccessRoleBinding = new ClusterTrustedAccessRoleBinding(\"exampleClusterTrustedAccessRoleBinding\", ClusterTrustedAccessRoleBindingArgs.builder()\n .kubernetesClusterId(exampleKubernetesCluster.id())\n .name(\"example\")\n .roles(\"example-value\")\n .sourceResourceId(exampleWorkspace.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:appinsights:Insights\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n applicationType: example-value\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${exampleAzurermClientConfig.tenantId}\n skuName: example-value\n softDeleteRetentionDays: example-value\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleAzurermClientConfig.tenantId}\n objectId: ${exampleAzurermClientConfig.objectId}\n keyPermissions: example-value\n exampleKubernetesCluster:\n type: azure:containerservice:KubernetesCluster\n name: example\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n dnsPrefix: acctestaksexample\n defaultNodePool:\n name: example-value\n nodeCount: example-value\n vmSize: example-value\n upgradeSettings:\n maxSurge: example-value\n identity:\n type: example-value\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n applicationInsightsId: ${example.id}\n identity:\n type: example-value\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: example\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n accountTier: example-value\n accountReplicationType: example-value\n exampleClusterTrustedAccessRoleBinding:\n type: azure:containerservice:ClusterTrustedAccessRoleBinding\n name: example\n properties:\n kubernetesClusterId: ${exampleKubernetesCluster.id}\n name: example\n roles: example-value\n sourceResourceId: ${exampleWorkspace.id}\nvariables:\n test:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn existing Kubernetes Cluster Trusted Access Role Binding can be imported into Pulumi using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:containerservice/clusterTrustedAccessRoleBinding:ClusterTrustedAccessRoleBinding example /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/{managedClusterName}/trustedAccessRoleBindings/{trustedAccessRoleBindingName}\n```\n\n* Where `{subscriptionId}` is the ID of the Azure Subscription where the Kubernetes Cluster Trusted Access Role Binding exists. For example `12345678-1234-9876-4563-123456789012`.\n\n* Where `{resourceGroupName}` is the name of Resource Group where this Kubernetes Cluster Trusted Access Role Binding exists. For example `example-resource-group`.\n\n* Where `{managedClusterName}` is the name of the Managed Cluster. For example `managedClusterValue`.\n\n* Where `{trustedAccessRoleBindingName}` is the name of the Trusted Access Role Binding. For example `trustedAccessRoleBindingValue`.\n\n", "properties": { "kubernetesClusterId": { "type": "string", @@ -152201,7 +152201,7 @@ } }, "azure:containerservice/registry:Registry": { - "description": "Manages an Azure Container Registry.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst acr = new azure.containerservice.Registry(\"acr\", {\n name: \"containerRegistry1\",\n resourceGroupName: example.name,\n location: example.location,\n sku: \"Premium\",\n adminEnabled: false,\n georeplications: [\n {\n location: \"East US\",\n zoneRedundancyEnabled: true,\n tags: {},\n },\n {\n location: \"North Europe\",\n zoneRedundancyEnabled: true,\n tags: {},\n },\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nacr = azure.containerservice.Registry(\"acr\",\n name=\"containerRegistry1\",\n resource_group_name=example.name,\n location=example.location,\n sku=\"Premium\",\n admin_enabled=False,\n georeplications=[\n {\n \"location\": \"East US\",\n \"zone_redundancy_enabled\": True,\n \"tags\": {},\n },\n {\n \"location\": \"North Europe\",\n \"zone_redundancy_enabled\": True,\n \"tags\": {},\n },\n ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var acr = new Azure.ContainerService.Registry(\"acr\", new()\n {\n Name = \"containerRegistry1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Sku = \"Premium\",\n AdminEnabled = false,\n Georeplications = new[]\n {\n new Azure.ContainerService.Inputs.RegistryGeoreplicationArgs\n {\n Location = \"East US\",\n ZoneRedundancyEnabled = true,\n Tags = null,\n },\n new Azure.ContainerService.Inputs.RegistryGeoreplicationArgs\n {\n Location = \"North Europe\",\n ZoneRedundancyEnabled = true,\n Tags = null,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = containerservice.NewRegistry(ctx, \"acr\", \u0026containerservice.RegistryArgs{\n\t\t\tName: pulumi.String(\"containerRegistry1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSku: pulumi.String(\"Premium\"),\n\t\t\tAdminEnabled: pulumi.Bool(false),\n\t\t\tGeoreplications: containerservice.RegistryGeoreplicationArray{\n\t\t\t\t\u0026containerservice.RegistryGeoreplicationArgs{\n\t\t\t\t\tLocation: pulumi.String(\"East US\"),\n\t\t\t\t\tZoneRedundancyEnabled: pulumi.Bool(true),\n\t\t\t\t\tTags: nil,\n\t\t\t\t},\n\t\t\t\t\u0026containerservice.RegistryGeoreplicationArgs{\n\t\t\t\t\tLocation: pulumi.String(\"North Europe\"),\n\t\t\t\t\tZoneRedundancyEnabled: pulumi.Bool(true),\n\t\t\t\t\tTags: nil,\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.containerservice.Registry;\nimport com.pulumi.azure.containerservice.RegistryArgs;\nimport com.pulumi.azure.containerservice.inputs.RegistryGeoreplicationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var acr = new Registry(\"acr\", RegistryArgs.builder()\n .name(\"containerRegistry1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .sku(\"Premium\")\n .adminEnabled(false)\n .georeplications( \n RegistryGeoreplicationArgs.builder()\n .location(\"East US\")\n .zoneRedundancyEnabled(true)\n .tags()\n .build(),\n RegistryGeoreplicationArgs.builder()\n .location(\"North Europe\")\n .zoneRedundancyEnabled(true)\n .tags()\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n acr:\n type: azure:containerservice:Registry\n properties:\n name: containerRegistry1\n resourceGroupName: ${example.name}\n location: ${example.location}\n sku: Premium\n adminEnabled: false\n georeplications:\n - location: East US\n zoneRedundancyEnabled: true\n tags: {}\n - location: North Europe\n zoneRedundancyEnabled: true\n tags: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Encryption)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyvaultFunctions;\nimport com.pulumi.azure.keyvault.inputs.GetKeyArgs;\nimport com.pulumi.azure.containerservice.Registry;\nimport com.pulumi.azure.containerservice.RegistryArgs;\nimport com.pulumi.azure.containerservice.inputs.RegistryIdentityArgs;\nimport com.pulumi.azure.containerservice.inputs.RegistryEncryptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .name(\"registry-uai\")\n .build());\n\n final var example = KeyvaultFunctions.getKey(GetKeyArgs.builder()\n .name(\"super-secret\")\n .keyVaultId(existing.id())\n .build());\n\n var acr = new Registry(\"acr\", RegistryArgs.builder()\n .name(\"containerRegistry1\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .sku(\"Premium\")\n .identity(RegistryIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .encryption(RegistryEncryptionArgs.builder()\n .enabled(true)\n .keyVaultKeyId(example.applyValue(getKeyResult -\u003e getKeyResult.id()))\n .identityClientId(exampleUserAssignedIdentity.clientId())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n acr:\n type: azure:containerservice:Registry\n properties:\n name: containerRegistry1\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n sku: Premium\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n encryption:\n enabled: true\n keyVaultKeyId: ${example.id}\n identityClientId: ${exampleUserAssignedIdentity.clientId}\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n name: registry-uai\nvariables:\n example:\n fn::invoke:\n Function: azure:keyvault:getKey\n Arguments:\n name: super-secret\n keyVaultId: ${existing.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Attaching A Container Registry To A Kubernetes Cluster)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleRegistry = new azure.containerservice.Registry(\"example\", {\n name: \"containerRegistry1\",\n resourceGroupName: example.name,\n location: example.location,\n sku: \"Premium\",\n});\nconst exampleKubernetesCluster = new azure.containerservice.KubernetesCluster(\"example\", {\n name: \"example-aks1\",\n location: example.location,\n resourceGroupName: example.name,\n dnsPrefix: \"exampleaks1\",\n defaultNodePool: {\n name: \"default\",\n nodeCount: 1,\n vmSize: \"Standard_D2_v2\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Environment: \"Production\",\n },\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n principalId: exampleKubernetesCluster.kubeletIdentity.apply(kubeletIdentity =\u003e kubeletIdentity.objectId),\n roleDefinitionName: \"AcrPull\",\n scope: exampleRegistry.id,\n skipServicePrincipalAadCheck: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_registry = azure.containerservice.Registry(\"example\",\n name=\"containerRegistry1\",\n resource_group_name=example.name,\n location=example.location,\n sku=\"Premium\")\nexample_kubernetes_cluster = azure.containerservice.KubernetesCluster(\"example\",\n name=\"example-aks1\",\n location=example.location,\n resource_group_name=example.name,\n dns_prefix=\"exampleaks1\",\n default_node_pool={\n \"name\": \"default\",\n \"node_count\": 1,\n \"vm_size\": \"Standard_D2_v2\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Environment\": \"Production\",\n })\nexample_assignment = azure.authorization.Assignment(\"example\",\n principal_id=example_kubernetes_cluster.kubelet_identity.object_id,\n role_definition_name=\"AcrPull\",\n scope=example_registry.id,\n skip_service_principal_aad_check=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleRegistry = new Azure.ContainerService.Registry(\"example\", new()\n {\n Name = \"containerRegistry1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Sku = \"Premium\",\n });\n\n var exampleKubernetesCluster = new Azure.ContainerService.KubernetesCluster(\"example\", new()\n {\n Name = \"example-aks1\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n DnsPrefix = \"exampleaks1\",\n DefaultNodePool = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolArgs\n {\n Name = \"default\",\n NodeCount = 1,\n VmSize = \"Standard_D2_v2\",\n },\n Identity = new Azure.ContainerService.Inputs.KubernetesClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Environment\", \"Production\" },\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n PrincipalId = exampleKubernetesCluster.KubeletIdentity.Apply(kubeletIdentity =\u003e kubeletIdentity.ObjectId),\n RoleDefinitionName = \"AcrPull\",\n Scope = exampleRegistry.Id,\n SkipServicePrincipalAadCheck = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRegistry, err := containerservice.NewRegistry(ctx, \"example\", \u0026containerservice.RegistryArgs{\n\t\t\tName: pulumi.String(\"containerRegistry1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSku: pulumi.String(\"Premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesCluster, err := containerservice.NewKubernetesCluster(ctx, \"example\", \u0026containerservice.KubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example-aks1\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tDnsPrefix: pulumi.String(\"exampleaks1\"),\n\t\t\tDefaultNodePool: \u0026containerservice.KubernetesClusterDefaultNodePoolArgs{\n\t\t\t\tName: pulumi.String(\"default\"),\n\t\t\t\tNodeCount: pulumi.Int(1),\n\t\t\t\tVmSize: pulumi.String(\"Standard_D2_v2\"),\n\t\t\t},\n\t\t\tIdentity: \u0026containerservice.KubernetesClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tPrincipalId: pulumi.String(exampleKubernetesCluster.KubeletIdentity.ApplyT(func(kubeletIdentity containerservice.KubernetesClusterKubeletIdentity) (*string, error) {\n\t\t\t\treturn \u0026kubeletIdentity.ObjectId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tRoleDefinitionName: pulumi.String(\"AcrPull\"),\n\t\t\tScope: exampleRegistry.ID(),\n\t\t\tSkipServicePrincipalAadCheck: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.containerservice.Registry;\nimport com.pulumi.azure.containerservice.RegistryArgs;\nimport com.pulumi.azure.containerservice.KubernetesCluster;\nimport com.pulumi.azure.containerservice.KubernetesClusterArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleRegistry = new Registry(\"exampleRegistry\", RegistryArgs.builder()\n .name(\"containerRegistry1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .sku(\"Premium\")\n .build());\n\n var exampleKubernetesCluster = new KubernetesCluster(\"exampleKubernetesCluster\", KubernetesClusterArgs.builder()\n .name(\"example-aks1\")\n .location(example.location())\n .resourceGroupName(example.name())\n .dnsPrefix(\"exampleaks1\")\n .defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()\n .name(\"default\")\n .nodeCount(1)\n .vmSize(\"Standard_D2_v2\")\n .build())\n .identity(KubernetesClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Environment\", \"Production\"))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .principalId(exampleKubernetesCluster.kubeletIdentity().applyValue(kubeletIdentity -\u003e kubeletIdentity.objectId()))\n .roleDefinitionName(\"AcrPull\")\n .scope(exampleRegistry.id())\n .skipServicePrincipalAadCheck(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleRegistry:\n type: azure:containerservice:Registry\n name: example\n properties:\n name: containerRegistry1\n resourceGroupName: ${example.name}\n location: ${example.location}\n sku: Premium\n exampleKubernetesCluster:\n type: azure:containerservice:KubernetesCluster\n name: example\n properties:\n name: example-aks1\n location: ${example.location}\n resourceGroupName: ${example.name}\n dnsPrefix: exampleaks1\n defaultNodePool:\n name: default\n nodeCount: 1\n vmSize: Standard_D2_v2\n identity:\n type: SystemAssigned\n tags:\n Environment: Production\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n principalId: ${exampleKubernetesCluster.kubeletIdentity.objectId}\n roleDefinitionName: AcrPull\n scope: ${exampleRegistry.id}\n skipServicePrincipalAadCheck: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nContainer Registries can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:containerservice/registry:Registry example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.ContainerRegistry/registries/myregistry1\n```\n\n", + "description": "Manages an Azure Container Registry.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst acr = new azure.containerservice.Registry(\"acr\", {\n name: \"containerRegistry1\",\n resourceGroupName: example.name,\n location: example.location,\n sku: \"Premium\",\n adminEnabled: false,\n georeplications: [\n {\n location: \"East US\",\n zoneRedundancyEnabled: true,\n tags: {},\n },\n {\n location: \"North Europe\",\n zoneRedundancyEnabled: true,\n tags: {},\n },\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nacr = azure.containerservice.Registry(\"acr\",\n name=\"containerRegistry1\",\n resource_group_name=example.name,\n location=example.location,\n sku=\"Premium\",\n admin_enabled=False,\n georeplications=[\n {\n \"location\": \"East US\",\n \"zone_redundancy_enabled\": True,\n \"tags\": {},\n },\n {\n \"location\": \"North Europe\",\n \"zone_redundancy_enabled\": True,\n \"tags\": {},\n },\n ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var acr = new Azure.ContainerService.Registry(\"acr\", new()\n {\n Name = \"containerRegistry1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Sku = \"Premium\",\n AdminEnabled = false,\n Georeplications = new[]\n {\n new Azure.ContainerService.Inputs.RegistryGeoreplicationArgs\n {\n Location = \"East US\",\n ZoneRedundancyEnabled = true,\n Tags = null,\n },\n new Azure.ContainerService.Inputs.RegistryGeoreplicationArgs\n {\n Location = \"North Europe\",\n ZoneRedundancyEnabled = true,\n Tags = null,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = containerservice.NewRegistry(ctx, \"acr\", \u0026containerservice.RegistryArgs{\n\t\t\tName: pulumi.String(\"containerRegistry1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSku: pulumi.String(\"Premium\"),\n\t\t\tAdminEnabled: pulumi.Bool(false),\n\t\t\tGeoreplications: containerservice.RegistryGeoreplicationArray{\n\t\t\t\t\u0026containerservice.RegistryGeoreplicationArgs{\n\t\t\t\t\tLocation: pulumi.String(\"East US\"),\n\t\t\t\t\tZoneRedundancyEnabled: pulumi.Bool(true),\n\t\t\t\t\tTags: pulumi.StringMap{},\n\t\t\t\t},\n\t\t\t\t\u0026containerservice.RegistryGeoreplicationArgs{\n\t\t\t\t\tLocation: pulumi.String(\"North Europe\"),\n\t\t\t\t\tZoneRedundancyEnabled: pulumi.Bool(true),\n\t\t\t\t\tTags: pulumi.StringMap{},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.containerservice.Registry;\nimport com.pulumi.azure.containerservice.RegistryArgs;\nimport com.pulumi.azure.containerservice.inputs.RegistryGeoreplicationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var acr = new Registry(\"acr\", RegistryArgs.builder()\n .name(\"containerRegistry1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .sku(\"Premium\")\n .adminEnabled(false)\n .georeplications( \n RegistryGeoreplicationArgs.builder()\n .location(\"East US\")\n .zoneRedundancyEnabled(true)\n .tags()\n .build(),\n RegistryGeoreplicationArgs.builder()\n .location(\"North Europe\")\n .zoneRedundancyEnabled(true)\n .tags()\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n acr:\n type: azure:containerservice:Registry\n properties:\n name: containerRegistry1\n resourceGroupName: ${example.name}\n location: ${example.location}\n sku: Premium\n adminEnabled: false\n georeplications:\n - location: East US\n zoneRedundancyEnabled: true\n tags: {}\n - location: North Europe\n zoneRedundancyEnabled: true\n tags: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Encryption)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyvaultFunctions;\nimport com.pulumi.azure.keyvault.inputs.GetKeyArgs;\nimport com.pulumi.azure.containerservice.Registry;\nimport com.pulumi.azure.containerservice.RegistryArgs;\nimport com.pulumi.azure.containerservice.inputs.RegistryIdentityArgs;\nimport com.pulumi.azure.containerservice.inputs.RegistryEncryptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .name(\"registry-uai\")\n .build());\n\n final var example = KeyvaultFunctions.getKey(GetKeyArgs.builder()\n .name(\"super-secret\")\n .keyVaultId(existing.id())\n .build());\n\n var acr = new Registry(\"acr\", RegistryArgs.builder()\n .name(\"containerRegistry1\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .sku(\"Premium\")\n .identity(RegistryIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .encryption(RegistryEncryptionArgs.builder()\n .enabled(true)\n .keyVaultKeyId(example.applyValue(getKeyResult -\u003e getKeyResult.id()))\n .identityClientId(exampleUserAssignedIdentity.clientId())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n acr:\n type: azure:containerservice:Registry\n properties:\n name: containerRegistry1\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n sku: Premium\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n encryption:\n enabled: true\n keyVaultKeyId: ${example.id}\n identityClientId: ${exampleUserAssignedIdentity.clientId}\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n name: registry-uai\nvariables:\n example:\n fn::invoke:\n Function: azure:keyvault:getKey\n Arguments:\n name: super-secret\n keyVaultId: ${existing.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Attaching A Container Registry To A Kubernetes Cluster)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleRegistry = new azure.containerservice.Registry(\"example\", {\n name: \"containerRegistry1\",\n resourceGroupName: example.name,\n location: example.location,\n sku: \"Premium\",\n});\nconst exampleKubernetesCluster = new azure.containerservice.KubernetesCluster(\"example\", {\n name: \"example-aks1\",\n location: example.location,\n resourceGroupName: example.name,\n dnsPrefix: \"exampleaks1\",\n defaultNodePool: {\n name: \"default\",\n nodeCount: 1,\n vmSize: \"Standard_D2_v2\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Environment: \"Production\",\n },\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n principalId: exampleKubernetesCluster.kubeletIdentity.apply(kubeletIdentity =\u003e kubeletIdentity.objectId),\n roleDefinitionName: \"AcrPull\",\n scope: exampleRegistry.id,\n skipServicePrincipalAadCheck: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_registry = azure.containerservice.Registry(\"example\",\n name=\"containerRegistry1\",\n resource_group_name=example.name,\n location=example.location,\n sku=\"Premium\")\nexample_kubernetes_cluster = azure.containerservice.KubernetesCluster(\"example\",\n name=\"example-aks1\",\n location=example.location,\n resource_group_name=example.name,\n dns_prefix=\"exampleaks1\",\n default_node_pool={\n \"name\": \"default\",\n \"node_count\": 1,\n \"vm_size\": \"Standard_D2_v2\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Environment\": \"Production\",\n })\nexample_assignment = azure.authorization.Assignment(\"example\",\n principal_id=example_kubernetes_cluster.kubelet_identity.object_id,\n role_definition_name=\"AcrPull\",\n scope=example_registry.id,\n skip_service_principal_aad_check=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleRegistry = new Azure.ContainerService.Registry(\"example\", new()\n {\n Name = \"containerRegistry1\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Sku = \"Premium\",\n });\n\n var exampleKubernetesCluster = new Azure.ContainerService.KubernetesCluster(\"example\", new()\n {\n Name = \"example-aks1\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n DnsPrefix = \"exampleaks1\",\n DefaultNodePool = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolArgs\n {\n Name = \"default\",\n NodeCount = 1,\n VmSize = \"Standard_D2_v2\",\n },\n Identity = new Azure.ContainerService.Inputs.KubernetesClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Environment\", \"Production\" },\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n PrincipalId = exampleKubernetesCluster.KubeletIdentity.Apply(kubeletIdentity =\u003e kubeletIdentity.ObjectId),\n RoleDefinitionName = \"AcrPull\",\n Scope = exampleRegistry.Id,\n SkipServicePrincipalAadCheck = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRegistry, err := containerservice.NewRegistry(ctx, \"example\", \u0026containerservice.RegistryArgs{\n\t\t\tName: pulumi.String(\"containerRegistry1\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSku: pulumi.String(\"Premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesCluster, err := containerservice.NewKubernetesCluster(ctx, \"example\", \u0026containerservice.KubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example-aks1\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tDnsPrefix: pulumi.String(\"exampleaks1\"),\n\t\t\tDefaultNodePool: \u0026containerservice.KubernetesClusterDefaultNodePoolArgs{\n\t\t\t\tName: pulumi.String(\"default\"),\n\t\t\t\tNodeCount: pulumi.Int(1),\n\t\t\t\tVmSize: pulumi.String(\"Standard_D2_v2\"),\n\t\t\t},\n\t\t\tIdentity: \u0026containerservice.KubernetesClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tPrincipalId: pulumi.String(exampleKubernetesCluster.KubeletIdentity.ApplyT(func(kubeletIdentity containerservice.KubernetesClusterKubeletIdentity) (*string, error) {\n\t\t\t\treturn \u0026kubeletIdentity.ObjectId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tRoleDefinitionName: pulumi.String(\"AcrPull\"),\n\t\t\tScope: exampleRegistry.ID(),\n\t\t\tSkipServicePrincipalAadCheck: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.containerservice.Registry;\nimport com.pulumi.azure.containerservice.RegistryArgs;\nimport com.pulumi.azure.containerservice.KubernetesCluster;\nimport com.pulumi.azure.containerservice.KubernetesClusterArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleRegistry = new Registry(\"exampleRegistry\", RegistryArgs.builder()\n .name(\"containerRegistry1\")\n .resourceGroupName(example.name())\n .location(example.location())\n .sku(\"Premium\")\n .build());\n\n var exampleKubernetesCluster = new KubernetesCluster(\"exampleKubernetesCluster\", KubernetesClusterArgs.builder()\n .name(\"example-aks1\")\n .location(example.location())\n .resourceGroupName(example.name())\n .dnsPrefix(\"exampleaks1\")\n .defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()\n .name(\"default\")\n .nodeCount(1)\n .vmSize(\"Standard_D2_v2\")\n .build())\n .identity(KubernetesClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Environment\", \"Production\"))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .principalId(exampleKubernetesCluster.kubeletIdentity().applyValue(kubeletIdentity -\u003e kubeletIdentity.objectId()))\n .roleDefinitionName(\"AcrPull\")\n .scope(exampleRegistry.id())\n .skipServicePrincipalAadCheck(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleRegistry:\n type: azure:containerservice:Registry\n name: example\n properties:\n name: containerRegistry1\n resourceGroupName: ${example.name}\n location: ${example.location}\n sku: Premium\n exampleKubernetesCluster:\n type: azure:containerservice:KubernetesCluster\n name: example\n properties:\n name: example-aks1\n location: ${example.location}\n resourceGroupName: ${example.name}\n dnsPrefix: exampleaks1\n defaultNodePool:\n name: default\n nodeCount: 1\n vmSize: Standard_D2_v2\n identity:\n type: SystemAssigned\n tags:\n Environment: Production\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n principalId: ${exampleKubernetesCluster.kubeletIdentity.objectId}\n roleDefinitionName: AcrPull\n scope: ${exampleRegistry.id}\n skipServicePrincipalAadCheck: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nContainer Registries can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:containerservice/registry:Registry example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.ContainerRegistry/registries/myregistry1\n```\n\n", "properties": { "adminEnabled": { "type": "boolean", @@ -156173,7 +156173,7 @@ } }, "azure:core/subscriptionCostManagementExport:SubscriptionCostManagementExport": { - "description": "Manages a Cost Management Export for a Subscription.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = azure.core.getSubscription({});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"example\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleContainer = new azure.storage.Container(\"example\", {\n name: \"examplecontainer\",\n storageAccountName: exampleAccount.name,\n});\nconst exampleSubscriptionCostManagementExport = new azure.core.SubscriptionCostManagementExport(\"example\", {\n name: \"example\",\n subscriptionId: example.then(example =\u003e example.id),\n recurrenceType: \"Monthly\",\n recurrencePeriodStartDate: \"2020-08-18T00:00:00Z\",\n recurrencePeriodEndDate: \"2020-09-18T00:00:00Z\",\n exportDataStorageLocation: {\n containerId: exampleContainer.resourceManagerId,\n rootFolderPath: \"/root/updated\",\n },\n exportDataOptions: {\n type: \"Usage\",\n timeFrame: \"WeekToDate\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.get_subscription()\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"example\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_container = azure.storage.Container(\"example\",\n name=\"examplecontainer\",\n storage_account_name=example_account.name)\nexample_subscription_cost_management_export = azure.core.SubscriptionCostManagementExport(\"example\",\n name=\"example\",\n subscription_id=example.id,\n recurrence_type=\"Monthly\",\n recurrence_period_start_date=\"2020-08-18T00:00:00Z\",\n recurrence_period_end_date=\"2020-09-18T00:00:00Z\",\n export_data_storage_location={\n \"container_id\": example_container.resource_manager_id,\n \"root_folder_path\": \"/root/updated\",\n },\n export_data_options={\n \"type\": \"Usage\",\n \"time_frame\": \"WeekToDate\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetSubscription.Invoke();\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleContainer = new Azure.Storage.Container(\"example\", new()\n {\n Name = \"examplecontainer\",\n StorageAccountName = exampleAccount.Name,\n });\n\n var exampleSubscriptionCostManagementExport = new Azure.Core.SubscriptionCostManagementExport(\"example\", new()\n {\n Name = \"example\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RecurrenceType = \"Monthly\",\n RecurrencePeriodStartDate = \"2020-08-18T00:00:00Z\",\n RecurrencePeriodEndDate = \"2020-09-18T00:00:00Z\",\n ExportDataStorageLocation = new Azure.Core.Inputs.SubscriptionCostManagementExportExportDataStorageLocationArgs\n {\n ContainerId = exampleContainer.ResourceManagerId,\n RootFolderPath = \"/root/updated\",\n },\n ExportDataOptions = new Azure.Core.Inputs.SubscriptionCostManagementExportExportDataOptionsArgs\n {\n Type = \"Usage\",\n TimeFrame = \"WeekToDate\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleContainer, err := storage.NewContainer(ctx, \"example\", \u0026storage.ContainerArgs{\n\t\t\tName: pulumi.String(\"examplecontainer\"),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.NewSubscriptionCostManagementExport(ctx, \"example\", \u0026core.SubscriptionCostManagementExportArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tRecurrenceType: pulumi.String(\"Monthly\"),\n\t\t\tRecurrencePeriodStartDate: pulumi.String(\"2020-08-18T00:00:00Z\"),\n\t\t\tRecurrencePeriodEndDate: pulumi.String(\"2020-09-18T00:00:00Z\"),\n\t\t\tExportDataStorageLocation: \u0026core.SubscriptionCostManagementExportExportDataStorageLocationArgs{\n\t\t\t\tContainerId: exampleContainer.ResourceManagerId,\n\t\t\t\tRootFolderPath: pulumi.String(\"/root/updated\"),\n\t\t\t},\n\t\t\tExportDataOptions: \u0026core.SubscriptionCostManagementExportExportDataOptionsArgs{\n\t\t\t\tType: pulumi.String(\"Usage\"),\n\t\t\t\tTimeFrame: pulumi.String(\"WeekToDate\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.Container;\nimport com.pulumi.azure.storage.ContainerArgs;\nimport com.pulumi.azure.core.SubscriptionCostManagementExport;\nimport com.pulumi.azure.core.SubscriptionCostManagementExportArgs;\nimport com.pulumi.azure.core.inputs.SubscriptionCostManagementExportExportDataStorageLocationArgs;\nimport com.pulumi.azure.core.inputs.SubscriptionCostManagementExportExportDataOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getSubscription();\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleContainer = new Container(\"exampleContainer\", ContainerArgs.builder()\n .name(\"examplecontainer\")\n .storageAccountName(exampleAccount.name())\n .build());\n\n var exampleSubscriptionCostManagementExport = new SubscriptionCostManagementExport(\"exampleSubscriptionCostManagementExport\", SubscriptionCostManagementExportArgs.builder()\n .name(\"example\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .recurrenceType(\"Monthly\")\n .recurrencePeriodStartDate(\"2020-08-18T00:00:00Z\")\n .recurrencePeriodEndDate(\"2020-09-18T00:00:00Z\")\n .exportDataStorageLocation(SubscriptionCostManagementExportExportDataStorageLocationArgs.builder()\n .containerId(exampleContainer.resourceManagerId())\n .rootFolderPath(\"/root/updated\")\n .build())\n .exportDataOptions(SubscriptionCostManagementExportExportDataOptionsArgs.builder()\n .type(\"Usage\")\n .timeFrame(\"WeekToDate\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: example\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleContainer:\n type: azure:storage:Container\n name: example\n properties:\n name: examplecontainer\n storageAccountName: ${exampleAccount.name}\n exampleSubscriptionCostManagementExport:\n type: azure:core:SubscriptionCostManagementExport\n name: example\n properties:\n name: example\n subscriptionId: ${example.id}\n recurrenceType: Monthly\n recurrencePeriodStartDate: 2020-08-18T00:00:00Z\n recurrencePeriodEndDate: 2020-09-18T00:00:00Z\n exportDataStorageLocation:\n containerId: ${exampleContainer.resourceManagerId}\n rootFolderPath: /root/updated\n exportDataOptions:\n type: Usage\n timeFrame: WeekToDate\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSubscription Cost Management Exports can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:core/subscriptionCostManagementExport:SubscriptionCostManagementExport example /subscriptions/12345678-1234-9876-4563-123456789012/providers/Microsoft.CostManagement/exports/export1\n```\n\n", + "description": "Manages a Cost Management Export for a Subscription.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = azure.core.getSubscription({});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"example\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleContainer = new azure.storage.Container(\"example\", {\n name: \"examplecontainer\",\n storageAccountName: exampleAccount.name,\n});\nconst exampleSubscriptionCostManagementExport = new azure.core.SubscriptionCostManagementExport(\"example\", {\n name: \"example\",\n subscriptionId: example.then(example =\u003e example.id),\n recurrenceType: \"Monthly\",\n recurrencePeriodStartDate: \"2020-08-18T00:00:00Z\",\n recurrencePeriodEndDate: \"2020-09-18T00:00:00Z\",\n exportDataStorageLocation: {\n containerId: exampleContainer.resourceManagerId,\n rootFolderPath: \"/root/updated\",\n },\n exportDataOptions: {\n type: \"Usage\",\n timeFrame: \"WeekToDate\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.get_subscription()\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"example\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_container = azure.storage.Container(\"example\",\n name=\"examplecontainer\",\n storage_account_name=example_account.name)\nexample_subscription_cost_management_export = azure.core.SubscriptionCostManagementExport(\"example\",\n name=\"example\",\n subscription_id=example.id,\n recurrence_type=\"Monthly\",\n recurrence_period_start_date=\"2020-08-18T00:00:00Z\",\n recurrence_period_end_date=\"2020-09-18T00:00:00Z\",\n export_data_storage_location={\n \"container_id\": example_container.resource_manager_id,\n \"root_folder_path\": \"/root/updated\",\n },\n export_data_options={\n \"type\": \"Usage\",\n \"time_frame\": \"WeekToDate\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetSubscription.Invoke();\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleContainer = new Azure.Storage.Container(\"example\", new()\n {\n Name = \"examplecontainer\",\n StorageAccountName = exampleAccount.Name,\n });\n\n var exampleSubscriptionCostManagementExport = new Azure.Core.SubscriptionCostManagementExport(\"example\", new()\n {\n Name = \"example\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RecurrenceType = \"Monthly\",\n RecurrencePeriodStartDate = \"2020-08-18T00:00:00Z\",\n RecurrencePeriodEndDate = \"2020-09-18T00:00:00Z\",\n ExportDataStorageLocation = new Azure.Core.Inputs.SubscriptionCostManagementExportExportDataStorageLocationArgs\n {\n ContainerId = exampleContainer.ResourceManagerId,\n RootFolderPath = \"/root/updated\",\n },\n ExportDataOptions = new Azure.Core.Inputs.SubscriptionCostManagementExportExportDataOptionsArgs\n {\n Type = \"Usage\",\n TimeFrame = \"WeekToDate\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleContainer, err := storage.NewContainer(ctx, \"example\", \u0026storage.ContainerArgs{\n\t\t\tName: pulumi.String(\"examplecontainer\"),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.NewSubscriptionCostManagementExport(ctx, \"example\", \u0026core.SubscriptionCostManagementExportArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tRecurrenceType: pulumi.String(\"Monthly\"),\n\t\t\tRecurrencePeriodStartDate: pulumi.String(\"2020-08-18T00:00:00Z\"),\n\t\t\tRecurrencePeriodEndDate: pulumi.String(\"2020-09-18T00:00:00Z\"),\n\t\t\tExportDataStorageLocation: \u0026core.SubscriptionCostManagementExportExportDataStorageLocationArgs{\n\t\t\t\tContainerId: exampleContainer.ResourceManagerId,\n\t\t\t\tRootFolderPath: pulumi.String(\"/root/updated\"),\n\t\t\t},\n\t\t\tExportDataOptions: \u0026core.SubscriptionCostManagementExportExportDataOptionsArgs{\n\t\t\t\tType: pulumi.String(\"Usage\"),\n\t\t\t\tTimeFrame: pulumi.String(\"WeekToDate\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.Container;\nimport com.pulumi.azure.storage.ContainerArgs;\nimport com.pulumi.azure.core.SubscriptionCostManagementExport;\nimport com.pulumi.azure.core.SubscriptionCostManagementExportArgs;\nimport com.pulumi.azure.core.inputs.SubscriptionCostManagementExportExportDataStorageLocationArgs;\nimport com.pulumi.azure.core.inputs.SubscriptionCostManagementExportExportDataOptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getSubscription();\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleContainer = new Container(\"exampleContainer\", ContainerArgs.builder()\n .name(\"examplecontainer\")\n .storageAccountName(exampleAccount.name())\n .build());\n\n var exampleSubscriptionCostManagementExport = new SubscriptionCostManagementExport(\"exampleSubscriptionCostManagementExport\", SubscriptionCostManagementExportArgs.builder()\n .name(\"example\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .recurrenceType(\"Monthly\")\n .recurrencePeriodStartDate(\"2020-08-18T00:00:00Z\")\n .recurrencePeriodEndDate(\"2020-09-18T00:00:00Z\")\n .exportDataStorageLocation(SubscriptionCostManagementExportExportDataStorageLocationArgs.builder()\n .containerId(exampleContainer.resourceManagerId())\n .rootFolderPath(\"/root/updated\")\n .build())\n .exportDataOptions(SubscriptionCostManagementExportExportDataOptionsArgs.builder()\n .type(\"Usage\")\n .timeFrame(\"WeekToDate\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: example\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleContainer:\n type: azure:storage:Container\n name: example\n properties:\n name: examplecontainer\n storageAccountName: ${exampleAccount.name}\n exampleSubscriptionCostManagementExport:\n type: azure:core:SubscriptionCostManagementExport\n name: example\n properties:\n name: example\n subscriptionId: ${example.id}\n recurrenceType: Monthly\n recurrencePeriodStartDate: 2020-08-18T00:00:00Z\n recurrencePeriodEndDate: 2020-09-18T00:00:00Z\n exportDataStorageLocation:\n containerId: ${exampleContainer.resourceManagerId}\n rootFolderPath: /root/updated\n exportDataOptions:\n type: Usage\n timeFrame: WeekToDate\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSubscription Cost Management Exports can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:core/subscriptionCostManagementExport:SubscriptionCostManagementExport example /subscriptions/12345678-1234-9876-4563-123456789012/providers/Microsoft.CostManagement/exports/export1\n```\n\n", "properties": { "active": { "type": "boolean", @@ -156479,7 +156479,7 @@ } }, "azure:core/subscriptionPolicyAssignment:SubscriptionPolicyAssignment": { - "description": "Manages a Subscription Policy Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst example = new azure.policy.Definition(\"example\", {\n name: \"only-deploy-in-westeurope\",\n policyType: \"Custom\",\n mode: \"All\",\n displayName: \"Allowed resource types\",\n policyRule: ` {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n`,\n});\nconst exampleSubscriptionPolicyAssignment = new azure.core.SubscriptionPolicyAssignment(\"example\", {\n name: \"example\",\n policyDefinitionId: example.id,\n subscriptionId: current.then(current =\u003e current.id),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nexample = azure.policy.Definition(\"example\",\n name=\"only-deploy-in-westeurope\",\n policy_type=\"Custom\",\n mode=\"All\",\n display_name=\"Allowed resource types\",\n policy_rule=\"\"\" {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n\"\"\")\nexample_subscription_policy_assignment = azure.core.SubscriptionPolicyAssignment(\"example\",\n name=\"example\",\n policy_definition_id=example.id,\n subscription_id=current.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Policy.Definition(\"example\", new()\n {\n Name = \"only-deploy-in-westeurope\",\n PolicyType = \"Custom\",\n Mode = \"All\",\n DisplayName = \"Allowed resource types\",\n PolicyRule = @\" {\n \"\"if\"\": {\n \"\"not\"\": {\n \"\"field\"\": \"\"location\"\",\n \"\"equals\"\": \"\"westeurope\"\"\n }\n },\n \"\"then\"\": {\n \"\"effect\"\": \"\"Deny\"\"\n }\n }\n\",\n });\n\n var exampleSubscriptionPolicyAssignment = new Azure.Core.SubscriptionPolicyAssignment(\"example\", new()\n {\n Name = \"example\",\n PolicyDefinitionId = example.Id,\n SubscriptionId = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/policy\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := policy.NewDefinition(ctx, \"example\", \u0026policy.DefinitionArgs{\n\t\t\tName: pulumi.String(\"only-deploy-in-westeurope\"),\n\t\t\tPolicyType: pulumi.String(\"Custom\"),\n\t\t\tMode: pulumi.String(\"All\"),\n\t\t\tDisplayName: pulumi.String(\"Allowed resource types\"),\n\t\t\tPolicyRule: pulumi.String(` {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n`),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.NewSubscriptionPolicyAssignment(ctx, \"example\", \u0026core.SubscriptionPolicyAssignmentArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tPolicyDefinitionId: example.ID(),\n\t\t\tSubscriptionId: pulumi.String(current.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.policy.Definition;\nimport com.pulumi.azure.policy.DefinitionArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignment;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var example = new Definition(\"example\", DefinitionArgs.builder()\n .name(\"only-deploy-in-westeurope\")\n .policyType(\"Custom\")\n .mode(\"All\")\n .displayName(\"Allowed resource types\")\n .policyRule(\"\"\"\n {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n \"\"\")\n .build());\n\n var exampleSubscriptionPolicyAssignment = new SubscriptionPolicyAssignment(\"exampleSubscriptionPolicyAssignment\", SubscriptionPolicyAssignmentArgs.builder()\n .name(\"example\")\n .policyDefinitionId(example.id())\n .subscriptionId(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:policy:Definition\n properties:\n name: only-deploy-in-westeurope\n policyType: Custom\n mode: All\n displayName: Allowed resource types\n policyRule: |2\n {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n exampleSubscriptionPolicyAssignment:\n type: azure:core:SubscriptionPolicyAssignment\n name: example\n properties:\n name: example\n policyDefinitionId: ${example.id}\n subscriptionId: ${current.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSubscription Policy Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:core/subscriptionPolicyAssignment:SubscriptionPolicyAssignment example /subscriptions/00000000-0000-0000-000000000000/providers/Microsoft.Authorization/policyAssignments/assignment1\n```\n\n", + "description": "Manages a Subscription Policy Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst example = new azure.policy.Definition(\"example\", {\n name: \"only-deploy-in-westeurope\",\n policyType: \"Custom\",\n mode: \"All\",\n displayName: \"Allowed resource types\",\n policyRule: ` {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n`,\n});\nconst exampleSubscriptionPolicyAssignment = new azure.core.SubscriptionPolicyAssignment(\"example\", {\n name: \"example\",\n policyDefinitionId: example.id,\n subscriptionId: current.then(current =\u003e current.id),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nexample = azure.policy.Definition(\"example\",\n name=\"only-deploy-in-westeurope\",\n policy_type=\"Custom\",\n mode=\"All\",\n display_name=\"Allowed resource types\",\n policy_rule=\"\"\" {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n\"\"\")\nexample_subscription_policy_assignment = azure.core.SubscriptionPolicyAssignment(\"example\",\n name=\"example\",\n policy_definition_id=example.id,\n subscription_id=current.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Policy.Definition(\"example\", new()\n {\n Name = \"only-deploy-in-westeurope\",\n PolicyType = \"Custom\",\n Mode = \"All\",\n DisplayName = \"Allowed resource types\",\n PolicyRule = @\" {\n \"\"if\"\": {\n \"\"not\"\": {\n \"\"field\"\": \"\"location\"\",\n \"\"equals\"\": \"\"westeurope\"\"\n }\n },\n \"\"then\"\": {\n \"\"effect\"\": \"\"Deny\"\"\n }\n }\n\",\n });\n\n var exampleSubscriptionPolicyAssignment = new Azure.Core.SubscriptionPolicyAssignment(\"example\", new()\n {\n Name = \"example\",\n PolicyDefinitionId = example.Id,\n SubscriptionId = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/policy\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := policy.NewDefinition(ctx, \"example\", \u0026policy.DefinitionArgs{\n\t\t\tName: pulumi.String(\"only-deploy-in-westeurope\"),\n\t\t\tPolicyType: pulumi.String(\"Custom\"),\n\t\t\tMode: pulumi.String(\"All\"),\n\t\t\tDisplayName: pulumi.String(\"Allowed resource types\"),\n\t\t\tPolicyRule: pulumi.String(` {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n`),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.NewSubscriptionPolicyAssignment(ctx, \"example\", \u0026core.SubscriptionPolicyAssignmentArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tPolicyDefinitionId: example.ID(),\n\t\t\tSubscriptionId: pulumi.String(current.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.policy.Definition;\nimport com.pulumi.azure.policy.DefinitionArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignment;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var example = new Definition(\"example\", DefinitionArgs.builder()\n .name(\"only-deploy-in-westeurope\")\n .policyType(\"Custom\")\n .mode(\"All\")\n .displayName(\"Allowed resource types\")\n .policyRule(\"\"\"\n {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n \"\"\")\n .build());\n\n var exampleSubscriptionPolicyAssignment = new SubscriptionPolicyAssignment(\"exampleSubscriptionPolicyAssignment\", SubscriptionPolicyAssignmentArgs.builder()\n .name(\"example\")\n .policyDefinitionId(example.id())\n .subscriptionId(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:policy:Definition\n properties:\n name: only-deploy-in-westeurope\n policyType: Custom\n mode: All\n displayName: Allowed resource types\n policyRule: |2\n {\n \"if\": {\n \"not\": {\n \"field\": \"location\",\n \"equals\": \"westeurope\"\n }\n },\n \"then\": {\n \"effect\": \"Deny\"\n }\n }\n exampleSubscriptionPolicyAssignment:\n type: azure:core:SubscriptionPolicyAssignment\n name: example\n properties:\n name: example\n policyDefinitionId: ${example.id}\n subscriptionId: ${current.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSubscription Policy Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:core/subscriptionPolicyAssignment:SubscriptionPolicyAssignment example /subscriptions/00000000-0000-0000-000000000000/providers/Microsoft.Authorization/policyAssignments/assignment1\n```\n\n", "properties": { "description": { "type": "string", @@ -156715,7 +156715,7 @@ } }, "azure:core/subscriptionPolicyExemption:SubscriptionPolicyExemption": { - "description": "Manages a Subscription Policy Exemption.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = azure.core.getSubscription({});\nconst exampleGetPolicySetDefinition = azure.policy.getPolicySetDefinition({\n displayName: \"Audit machines with insecure password security settings\",\n});\nconst exampleSubscriptionPolicyAssignment = new azure.core.SubscriptionPolicyAssignment(\"example\", {\n name: \"exampleAssignment\",\n subscriptionId: example.then(example =\u003e example.id),\n policyDefinitionId: exampleGetPolicySetDefinition.then(exampleGetPolicySetDefinition =\u003e exampleGetPolicySetDefinition.id),\n location: \"westus\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleSubscriptionPolicyExemption = new azure.core.SubscriptionPolicyExemption(\"example\", {\n name: \"exampleExemption\",\n subscriptionId: example.then(example =\u003e example.id),\n policyAssignmentId: exampleSubscriptionPolicyAssignment.id,\n exemptionCategory: \"Mitigated\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.get_subscription()\nexample_get_policy_set_definition = azure.policy.get_policy_set_definition(display_name=\"Audit machines with insecure password security settings\")\nexample_subscription_policy_assignment = azure.core.SubscriptionPolicyAssignment(\"example\",\n name=\"exampleAssignment\",\n subscription_id=example.id,\n policy_definition_id=example_get_policy_set_definition.id,\n location=\"westus\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_subscription_policy_exemption = azure.core.SubscriptionPolicyExemption(\"example\",\n name=\"exampleExemption\",\n subscription_id=example.id,\n policy_assignment_id=example_subscription_policy_assignment.id,\n exemption_category=\"Mitigated\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetSubscription.Invoke();\n\n var exampleGetPolicySetDefinition = Azure.Policy.GetPolicySetDefinition.Invoke(new()\n {\n DisplayName = \"Audit machines with insecure password security settings\",\n });\n\n var exampleSubscriptionPolicyAssignment = new Azure.Core.SubscriptionPolicyAssignment(\"example\", new()\n {\n Name = \"exampleAssignment\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PolicyDefinitionId = exampleGetPolicySetDefinition.Apply(getPolicySetDefinitionResult =\u003e getPolicySetDefinitionResult.Id),\n Location = \"westus\",\n Identity = new Azure.Core.Inputs.SubscriptionPolicyAssignmentIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleSubscriptionPolicyExemption = new Azure.Core.SubscriptionPolicyExemption(\"example\", new()\n {\n Name = \"exampleExemption\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PolicyAssignmentId = exampleSubscriptionPolicyAssignment.Id,\n ExemptionCategory = \"Mitigated\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/policy\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetPolicySetDefinition, err := policy.LookupPolicySetDefinition(ctx, \u0026policy.LookupPolicySetDefinitionArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Audit machines with insecure password security settings\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubscriptionPolicyAssignment, err := core.NewSubscriptionPolicyAssignment(ctx, \"example\", \u0026core.SubscriptionPolicyAssignmentArgs{\n\t\t\tName: pulumi.String(\"exampleAssignment\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tPolicyDefinitionId: pulumi.String(exampleGetPolicySetDefinition.Id),\n\t\t\tLocation: pulumi.String(\"westus\"),\n\t\t\tIdentity: \u0026core.SubscriptionPolicyAssignmentIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.NewSubscriptionPolicyExemption(ctx, \"example\", \u0026core.SubscriptionPolicyExemptionArgs{\n\t\t\tName: pulumi.String(\"exampleExemption\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tPolicyAssignmentId: exampleSubscriptionPolicyAssignment.ID(),\n\t\t\tExemptionCategory: pulumi.String(\"Mitigated\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.policy.PolicyFunctions;\nimport com.pulumi.azure.policy.inputs.GetPolicySetDefinitionArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignment;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignmentArgs;\nimport com.pulumi.azure.core.inputs.SubscriptionPolicyAssignmentIdentityArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyExemption;\nimport com.pulumi.azure.core.SubscriptionPolicyExemptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getSubscription();\n\n final var exampleGetPolicySetDefinition = PolicyFunctions.getPolicySetDefinition(GetPolicySetDefinitionArgs.builder()\n .displayName(\"Audit machines with insecure password security settings\")\n .build());\n\n var exampleSubscriptionPolicyAssignment = new SubscriptionPolicyAssignment(\"exampleSubscriptionPolicyAssignment\", SubscriptionPolicyAssignmentArgs.builder()\n .name(\"exampleAssignment\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .policyDefinitionId(exampleGetPolicySetDefinition.applyValue(getPolicySetDefinitionResult -\u003e getPolicySetDefinitionResult.id()))\n .location(\"westus\")\n .identity(SubscriptionPolicyAssignmentIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleSubscriptionPolicyExemption = new SubscriptionPolicyExemption(\"exampleSubscriptionPolicyExemption\", SubscriptionPolicyExemptionArgs.builder()\n .name(\"exampleExemption\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .policyAssignmentId(exampleSubscriptionPolicyAssignment.id())\n .exemptionCategory(\"Mitigated\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleSubscriptionPolicyAssignment:\n type: azure:core:SubscriptionPolicyAssignment\n name: example\n properties:\n name: exampleAssignment\n subscriptionId: ${example.id}\n policyDefinitionId: ${exampleGetPolicySetDefinition.id}\n location: westus\n identity:\n type: SystemAssigned\n exampleSubscriptionPolicyExemption:\n type: azure:core:SubscriptionPolicyExemption\n name: example\n properties:\n name: exampleExemption\n subscriptionId: ${example.id}\n policyAssignmentId: ${exampleSubscriptionPolicyAssignment.id}\n exemptionCategory: Mitigated\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n exampleGetPolicySetDefinition:\n fn::invoke:\n Function: azure:policy:getPolicySetDefinition\n Arguments:\n displayName: Audit machines with insecure password security settings\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPolicy Exemptions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:core/subscriptionPolicyExemption:SubscriptionPolicyExemption exemption1 /subscriptions/00000000-0000-0000-000000000000/providers/Microsoft.Authorization/policyExemptions/exemption1\n```\n\n", + "description": "Manages a Subscription Policy Exemption.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = azure.core.getSubscription({});\nconst exampleGetPolicySetDefinition = azure.policy.getPolicySetDefinition({\n displayName: \"Audit machines with insecure password security settings\",\n});\nconst exampleSubscriptionPolicyAssignment = new azure.core.SubscriptionPolicyAssignment(\"example\", {\n name: \"exampleAssignment\",\n subscriptionId: example.then(example =\u003e example.id),\n policyDefinitionId: exampleGetPolicySetDefinition.then(exampleGetPolicySetDefinition =\u003e exampleGetPolicySetDefinition.id),\n location: \"westus\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleSubscriptionPolicyExemption = new azure.core.SubscriptionPolicyExemption(\"example\", {\n name: \"exampleExemption\",\n subscriptionId: example.then(example =\u003e example.id),\n policyAssignmentId: exampleSubscriptionPolicyAssignment.id,\n exemptionCategory: \"Mitigated\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.get_subscription()\nexample_get_policy_set_definition = azure.policy.get_policy_set_definition(display_name=\"Audit machines with insecure password security settings\")\nexample_subscription_policy_assignment = azure.core.SubscriptionPolicyAssignment(\"example\",\n name=\"exampleAssignment\",\n subscription_id=example.id,\n policy_definition_id=example_get_policy_set_definition.id,\n location=\"westus\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_subscription_policy_exemption = azure.core.SubscriptionPolicyExemption(\"example\",\n name=\"exampleExemption\",\n subscription_id=example.id,\n policy_assignment_id=example_subscription_policy_assignment.id,\n exemption_category=\"Mitigated\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetSubscription.Invoke();\n\n var exampleGetPolicySetDefinition = Azure.Policy.GetPolicySetDefinition.Invoke(new()\n {\n DisplayName = \"Audit machines with insecure password security settings\",\n });\n\n var exampleSubscriptionPolicyAssignment = new Azure.Core.SubscriptionPolicyAssignment(\"example\", new()\n {\n Name = \"exampleAssignment\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PolicyDefinitionId = exampleGetPolicySetDefinition.Apply(getPolicySetDefinitionResult =\u003e getPolicySetDefinitionResult.Id),\n Location = \"westus\",\n Identity = new Azure.Core.Inputs.SubscriptionPolicyAssignmentIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleSubscriptionPolicyExemption = new Azure.Core.SubscriptionPolicyExemption(\"example\", new()\n {\n Name = \"exampleExemption\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PolicyAssignmentId = exampleSubscriptionPolicyAssignment.Id,\n ExemptionCategory = \"Mitigated\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/policy\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetPolicySetDefinition, err := policy.LookupPolicySetDefinition(ctx, \u0026policy.LookupPolicySetDefinitionArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Audit machines with insecure password security settings\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubscriptionPolicyAssignment, err := core.NewSubscriptionPolicyAssignment(ctx, \"example\", \u0026core.SubscriptionPolicyAssignmentArgs{\n\t\t\tName: pulumi.String(\"exampleAssignment\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tPolicyDefinitionId: pulumi.String(exampleGetPolicySetDefinition.Id),\n\t\t\tLocation: pulumi.String(\"westus\"),\n\t\t\tIdentity: \u0026core.SubscriptionPolicyAssignmentIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.NewSubscriptionPolicyExemption(ctx, \"example\", \u0026core.SubscriptionPolicyExemptionArgs{\n\t\t\tName: pulumi.String(\"exampleExemption\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tPolicyAssignmentId: exampleSubscriptionPolicyAssignment.ID(),\n\t\t\tExemptionCategory: pulumi.String(\"Mitigated\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.policy.PolicyFunctions;\nimport com.pulumi.azure.policy.inputs.GetPolicySetDefinitionArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignment;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignmentArgs;\nimport com.pulumi.azure.core.inputs.SubscriptionPolicyAssignmentIdentityArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyExemption;\nimport com.pulumi.azure.core.SubscriptionPolicyExemptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getSubscription();\n\n final var exampleGetPolicySetDefinition = PolicyFunctions.getPolicySetDefinition(GetPolicySetDefinitionArgs.builder()\n .displayName(\"Audit machines with insecure password security settings\")\n .build());\n\n var exampleSubscriptionPolicyAssignment = new SubscriptionPolicyAssignment(\"exampleSubscriptionPolicyAssignment\", SubscriptionPolicyAssignmentArgs.builder()\n .name(\"exampleAssignment\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .policyDefinitionId(exampleGetPolicySetDefinition.applyValue(getPolicySetDefinitionResult -\u003e getPolicySetDefinitionResult.id()))\n .location(\"westus\")\n .identity(SubscriptionPolicyAssignmentIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleSubscriptionPolicyExemption = new SubscriptionPolicyExemption(\"exampleSubscriptionPolicyExemption\", SubscriptionPolicyExemptionArgs.builder()\n .name(\"exampleExemption\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .policyAssignmentId(exampleSubscriptionPolicyAssignment.id())\n .exemptionCategory(\"Mitigated\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleSubscriptionPolicyAssignment:\n type: azure:core:SubscriptionPolicyAssignment\n name: example\n properties:\n name: exampleAssignment\n subscriptionId: ${example.id}\n policyDefinitionId: ${exampleGetPolicySetDefinition.id}\n location: westus\n identity:\n type: SystemAssigned\n exampleSubscriptionPolicyExemption:\n type: azure:core:SubscriptionPolicyExemption\n name: example\n properties:\n name: exampleExemption\n subscriptionId: ${example.id}\n policyAssignmentId: ${exampleSubscriptionPolicyAssignment.id}\n exemptionCategory: Mitigated\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n exampleGetPolicySetDefinition:\n fn::invoke:\n Function: azure:policy:getPolicySetDefinition\n Arguments:\n displayName: Audit machines with insecure password security settings\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPolicy Exemptions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:core/subscriptionPolicyExemption:SubscriptionPolicyExemption exemption1 /subscriptions/00000000-0000-0000-000000000000/providers/Microsoft.Authorization/policyExemptions/exemption1\n```\n\n", "properties": { "description": { "type": "string", @@ -156863,7 +156863,7 @@ } }, "azure:core/subscriptionPolicyRemediation:SubscriptionPolicyRemediation": { - "description": "Manages an Azure Subscription Policy Remediation.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = azure.core.getSubscription({});\nconst exampleGetPolicyDefintion = azure.policy.getPolicyDefintion({\n displayName: \"Allowed resource types\",\n});\nconst exampleSubscriptionPolicyAssignment = new azure.core.SubscriptionPolicyAssignment(\"example\", {\n name: \"exampleAssignment\",\n subscriptionId: example.then(example =\u003e example.id),\n policyDefinitionId: exampleGetPolicyDefintion.then(exampleGetPolicyDefintion =\u003e exampleGetPolicyDefintion.id),\n parameters: JSON.stringify({\n listOfAllowedLocations: {\n value: [\n \"West Europe\",\n \"East US\",\n ],\n },\n }),\n});\nconst exampleSubscriptionPolicyRemediation = new azure.core.SubscriptionPolicyRemediation(\"example\", {\n name: \"example\",\n subscriptionId: example.then(example =\u003e example.id),\n policyAssignmentId: exampleSubscriptionPolicyAssignment.id,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\n\nexample = azure.core.get_subscription()\nexample_get_policy_defintion = azure.policy.get_policy_defintion(display_name=\"Allowed resource types\")\nexample_subscription_policy_assignment = azure.core.SubscriptionPolicyAssignment(\"example\",\n name=\"exampleAssignment\",\n subscription_id=example.id,\n policy_definition_id=example_get_policy_defintion.id,\n parameters=json.dumps({\n \"listOfAllowedLocations\": {\n \"value\": [\n \"West Europe\",\n \"East US\",\n ],\n },\n }))\nexample_subscription_policy_remediation = azure.core.SubscriptionPolicyRemediation(\"example\",\n name=\"example\",\n subscription_id=example.id,\n policy_assignment_id=example_subscription_policy_assignment.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetSubscription.Invoke();\n\n var exampleGetPolicyDefintion = Azure.Policy.GetPolicyDefintion.Invoke(new()\n {\n DisplayName = \"Allowed resource types\",\n });\n\n var exampleSubscriptionPolicyAssignment = new Azure.Core.SubscriptionPolicyAssignment(\"example\", new()\n {\n Name = \"exampleAssignment\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PolicyDefinitionId = exampleGetPolicyDefintion.Apply(getPolicyDefintionResult =\u003e getPolicyDefintionResult.Id),\n Parameters = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"listOfAllowedLocations\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"value\"] = new[]\n {\n \"West Europe\",\n \"East US\",\n },\n },\n }),\n });\n\n var exampleSubscriptionPolicyRemediation = new Azure.Core.SubscriptionPolicyRemediation(\"example\", new()\n {\n Name = \"example\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PolicyAssignmentId = exampleSubscriptionPolicyAssignment.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/policy\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetPolicyDefintion, err := policy.GetPolicyDefintion(ctx, \u0026policy.GetPolicyDefintionArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Allowed resource types\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"listOfAllowedLocations\": map[string]interface{}{\n\t\t\t\t\"value\": []string{\n\t\t\t\t\t\"West Europe\",\n\t\t\t\t\t\"East US\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\texampleSubscriptionPolicyAssignment, err := core.NewSubscriptionPolicyAssignment(ctx, \"example\", \u0026core.SubscriptionPolicyAssignmentArgs{\n\t\t\tName: pulumi.String(\"exampleAssignment\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tPolicyDefinitionId: pulumi.String(exampleGetPolicyDefintion.Id),\n\t\t\tParameters: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.NewSubscriptionPolicyRemediation(ctx, \"example\", \u0026core.SubscriptionPolicyRemediationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tPolicyAssignmentId: exampleSubscriptionPolicyAssignment.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.policy.PolicyFunctions;\nimport com.pulumi.azure.policy.inputs.GetPolicyDefintionArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignment;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignmentArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyRemediation;\nimport com.pulumi.azure.core.SubscriptionPolicyRemediationArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getSubscription();\n\n final var exampleGetPolicyDefintion = PolicyFunctions.getPolicyDefintion(GetPolicyDefintionArgs.builder()\n .displayName(\"Allowed resource types\")\n .build());\n\n var exampleSubscriptionPolicyAssignment = new SubscriptionPolicyAssignment(\"exampleSubscriptionPolicyAssignment\", SubscriptionPolicyAssignmentArgs.builder()\n .name(\"exampleAssignment\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .policyDefinitionId(exampleGetPolicyDefintion.applyValue(getPolicyDefintionResult -\u003e getPolicyDefintionResult.id()))\n .parameters(serializeJson(\n jsonObject(\n jsonProperty(\"listOfAllowedLocations\", jsonObject(\n jsonProperty(\"value\", jsonArray(\n \"West Europe\", \n \"East US\"\n ))\n ))\n )))\n .build());\n\n var exampleSubscriptionPolicyRemediation = new SubscriptionPolicyRemediation(\"exampleSubscriptionPolicyRemediation\", SubscriptionPolicyRemediationArgs.builder()\n .name(\"example\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .policyAssignmentId(exampleSubscriptionPolicyAssignment.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleSubscriptionPolicyAssignment:\n type: azure:core:SubscriptionPolicyAssignment\n name: example\n properties:\n name: exampleAssignment\n subscriptionId: ${example.id}\n policyDefinitionId: ${exampleGetPolicyDefintion.id}\n parameters:\n fn::toJSON:\n listOfAllowedLocations:\n value:\n - West Europe\n - East US\n exampleSubscriptionPolicyRemediation:\n type: azure:core:SubscriptionPolicyRemediation\n name: example\n properties:\n name: example\n subscriptionId: ${example.id}\n policyAssignmentId: ${exampleSubscriptionPolicyAssignment.id}\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n exampleGetPolicyDefintion:\n fn::invoke:\n Function: azure:policy:getPolicyDefintion\n Arguments:\n displayName: Allowed resource types\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPolicy Remediations can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:core/subscriptionPolicyRemediation:SubscriptionPolicyRemediation example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.PolicyInsights/remediations/remediation1\n```\n\n", + "description": "Manages an Azure Subscription Policy Remediation.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = azure.core.getSubscription({});\nconst exampleGetPolicyDefintion = azure.policy.getPolicyDefintion({\n displayName: \"Allowed resource types\",\n});\nconst exampleSubscriptionPolicyAssignment = new azure.core.SubscriptionPolicyAssignment(\"example\", {\n name: \"exampleAssignment\",\n subscriptionId: example.then(example =\u003e example.id),\n policyDefinitionId: exampleGetPolicyDefintion.then(exampleGetPolicyDefintion =\u003e exampleGetPolicyDefintion.id),\n parameters: JSON.stringify({\n listOfAllowedLocations: {\n value: [\n \"West Europe\",\n \"East US\",\n ],\n },\n }),\n});\nconst exampleSubscriptionPolicyRemediation = new azure.core.SubscriptionPolicyRemediation(\"example\", {\n name: \"example\",\n subscriptionId: example.then(example =\u003e example.id),\n policyAssignmentId: exampleSubscriptionPolicyAssignment.id,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\n\nexample = azure.core.get_subscription()\nexample_get_policy_defintion = azure.policy.get_policy_defintion(display_name=\"Allowed resource types\")\nexample_subscription_policy_assignment = azure.core.SubscriptionPolicyAssignment(\"example\",\n name=\"exampleAssignment\",\n subscription_id=example.id,\n policy_definition_id=example_get_policy_defintion.id,\n parameters=json.dumps({\n \"listOfAllowedLocations\": {\n \"value\": [\n \"West Europe\",\n \"East US\",\n ],\n },\n }))\nexample_subscription_policy_remediation = azure.core.SubscriptionPolicyRemediation(\"example\",\n name=\"example\",\n subscription_id=example.id,\n policy_assignment_id=example_subscription_policy_assignment.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetSubscription.Invoke();\n\n var exampleGetPolicyDefintion = Azure.Policy.GetPolicyDefintion.Invoke(new()\n {\n DisplayName = \"Allowed resource types\",\n });\n\n var exampleSubscriptionPolicyAssignment = new Azure.Core.SubscriptionPolicyAssignment(\"example\", new()\n {\n Name = \"exampleAssignment\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PolicyDefinitionId = exampleGetPolicyDefintion.Apply(getPolicyDefintionResult =\u003e getPolicyDefintionResult.Id),\n Parameters = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"listOfAllowedLocations\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"value\"] = new[]\n {\n \"West Europe\",\n \"East US\",\n },\n },\n }),\n });\n\n var exampleSubscriptionPolicyRemediation = new Azure.Core.SubscriptionPolicyRemediation(\"example\", new()\n {\n Name = \"example\",\n SubscriptionId = example.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PolicyAssignmentId = exampleSubscriptionPolicyAssignment.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/policy\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetPolicyDefintion, err := policy.GetPolicyDefintion(ctx, \u0026policy.GetPolicyDefintionArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Allowed resource types\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"listOfAllowedLocations\": map[string]interface{}{\n\t\t\t\t\"value\": []string{\n\t\t\t\t\t\"West Europe\",\n\t\t\t\t\t\"East US\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\texampleSubscriptionPolicyAssignment, err := core.NewSubscriptionPolicyAssignment(ctx, \"example\", \u0026core.SubscriptionPolicyAssignmentArgs{\n\t\t\tName: pulumi.String(\"exampleAssignment\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tPolicyDefinitionId: pulumi.String(exampleGetPolicyDefintion.Id),\n\t\t\tParameters: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.NewSubscriptionPolicyRemediation(ctx, \"example\", \u0026core.SubscriptionPolicyRemediationArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tSubscriptionId: pulumi.String(example.Id),\n\t\t\tPolicyAssignmentId: exampleSubscriptionPolicyAssignment.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.policy.PolicyFunctions;\nimport com.pulumi.azure.policy.inputs.GetPolicyDefintionArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignment;\nimport com.pulumi.azure.core.SubscriptionPolicyAssignmentArgs;\nimport com.pulumi.azure.core.SubscriptionPolicyRemediation;\nimport com.pulumi.azure.core.SubscriptionPolicyRemediationArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getSubscription();\n\n final var exampleGetPolicyDefintion = PolicyFunctions.getPolicyDefintion(GetPolicyDefintionArgs.builder()\n .displayName(\"Allowed resource types\")\n .build());\n\n var exampleSubscriptionPolicyAssignment = new SubscriptionPolicyAssignment(\"exampleSubscriptionPolicyAssignment\", SubscriptionPolicyAssignmentArgs.builder()\n .name(\"exampleAssignment\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .policyDefinitionId(exampleGetPolicyDefintion.applyValue(getPolicyDefintionResult -\u003e getPolicyDefintionResult.id()))\n .parameters(serializeJson(\n jsonObject(\n jsonProperty(\"listOfAllowedLocations\", jsonObject(\n jsonProperty(\"value\", jsonArray(\n \"West Europe\", \n \"East US\"\n ))\n ))\n )))\n .build());\n\n var exampleSubscriptionPolicyRemediation = new SubscriptionPolicyRemediation(\"exampleSubscriptionPolicyRemediation\", SubscriptionPolicyRemediationArgs.builder()\n .name(\"example\")\n .subscriptionId(example.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .policyAssignmentId(exampleSubscriptionPolicyAssignment.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleSubscriptionPolicyAssignment:\n type: azure:core:SubscriptionPolicyAssignment\n name: example\n properties:\n name: exampleAssignment\n subscriptionId: ${example.id}\n policyDefinitionId: ${exampleGetPolicyDefintion.id}\n parameters:\n fn::toJSON:\n listOfAllowedLocations:\n value:\n - West Europe\n - East US\n exampleSubscriptionPolicyRemediation:\n type: azure:core:SubscriptionPolicyRemediation\n name: example\n properties:\n name: example\n subscriptionId: ${example.id}\n policyAssignmentId: ${exampleSubscriptionPolicyAssignment.id}\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n exampleGetPolicyDefintion:\n fn::invoke:\n Function: azure:policy:getPolicyDefintion\n Arguments:\n displayName: Allowed resource types\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPolicy Remediations can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:core/subscriptionPolicyRemediation:SubscriptionPolicyRemediation example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.PolicyInsights/remediations/remediation1\n```\n\n", "properties": { "failurePercentage": { "type": "number", @@ -160293,7 +160293,7 @@ } }, "azure:cosmosdb/sqlRoleAssignment:SqlRoleAssignment": { - "description": "Manages a Cosmos DB SQL Role Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.cosmosdb.Account(\"example\", {\n name: \"example-cosmosdb\",\n location: example.location,\n resourceGroupName: example.name,\n offerType: \"Standard\",\n kind: \"GlobalDocumentDB\",\n consistencyPolicy: {\n consistencyLevel: \"Strong\",\n },\n geoLocations: [{\n location: example.location,\n failoverPriority: 0,\n }],\n});\nconst exampleSqlRoleDefinition = new azure.cosmosdb.SqlRoleDefinition(\"example\", {\n name: \"examplesqlroledef\",\n resourceGroupName: example.name,\n accountName: exampleAccount.name,\n type: \"CustomRole\",\n assignableScopes: [exampleAccount.id],\n permissions: [{\n dataActions: [\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"],\n }],\n});\nconst exampleSqlRoleAssignment = new azure.cosmosdb.SqlRoleAssignment(\"example\", {\n name: \"736180af-7fbc-4c7f-9004-22735173c1c3\",\n resourceGroupName: example.name,\n accountName: exampleAccount.name,\n roleDefinitionId: exampleSqlRoleDefinition.id,\n principalId: current.then(current =\u003e current.objectId),\n scope: exampleAccount.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.cosmosdb.Account(\"example\",\n name=\"example-cosmosdb\",\n location=example.location,\n resource_group_name=example.name,\n offer_type=\"Standard\",\n kind=\"GlobalDocumentDB\",\n consistency_policy={\n \"consistency_level\": \"Strong\",\n },\n geo_locations=[{\n \"location\": example.location,\n \"failover_priority\": 0,\n }])\nexample_sql_role_definition = azure.cosmosdb.SqlRoleDefinition(\"example\",\n name=\"examplesqlroledef\",\n resource_group_name=example.name,\n account_name=example_account.name,\n type=\"CustomRole\",\n assignable_scopes=[example_account.id],\n permissions=[{\n \"data_actions\": [\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"],\n }])\nexample_sql_role_assignment = azure.cosmosdb.SqlRoleAssignment(\"example\",\n name=\"736180af-7fbc-4c7f-9004-22735173c1c3\",\n resource_group_name=example.name,\n account_name=example_account.name,\n role_definition_id=example_sql_role_definition.id,\n principal_id=current.object_id,\n scope=example_account.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.CosmosDB.Account(\"example\", new()\n {\n Name = \"example-cosmosdb\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OfferType = \"Standard\",\n Kind = \"GlobalDocumentDB\",\n ConsistencyPolicy = new Azure.CosmosDB.Inputs.AccountConsistencyPolicyArgs\n {\n ConsistencyLevel = \"Strong\",\n },\n GeoLocations = new[]\n {\n new Azure.CosmosDB.Inputs.AccountGeoLocationArgs\n {\n Location = example.Location,\n FailoverPriority = 0,\n },\n },\n });\n\n var exampleSqlRoleDefinition = new Azure.CosmosDB.SqlRoleDefinition(\"example\", new()\n {\n Name = \"examplesqlroledef\",\n ResourceGroupName = example.Name,\n AccountName = exampleAccount.Name,\n Type = \"CustomRole\",\n AssignableScopes = new[]\n {\n exampleAccount.Id,\n },\n Permissions = new[]\n {\n new Azure.CosmosDB.Inputs.SqlRoleDefinitionPermissionArgs\n {\n DataActions = new[]\n {\n \"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\",\n },\n },\n },\n });\n\n var exampleSqlRoleAssignment = new Azure.CosmosDB.SqlRoleAssignment(\"example\", new()\n {\n Name = \"736180af-7fbc-4c7f-9004-22735173c1c3\",\n ResourceGroupName = example.Name,\n AccountName = exampleAccount.Name,\n RoleDefinitionId = exampleSqlRoleDefinition.Id,\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Scope = exampleAccount.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cosmosdb\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := cosmosdb.NewAccount(ctx, \"example\", \u0026cosmosdb.AccountArgs{\n\t\t\tName: pulumi.String(\"example-cosmosdb\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOfferType: pulumi.String(\"Standard\"),\n\t\t\tKind: pulumi.String(\"GlobalDocumentDB\"),\n\t\t\tConsistencyPolicy: \u0026cosmosdb.AccountConsistencyPolicyArgs{\n\t\t\t\tConsistencyLevel: pulumi.String(\"Strong\"),\n\t\t\t},\n\t\t\tGeoLocations: cosmosdb.AccountGeoLocationArray{\n\t\t\t\t\u0026cosmosdb.AccountGeoLocationArgs{\n\t\t\t\t\tLocation: example.Location,\n\t\t\t\t\tFailoverPriority: pulumi.Int(0),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSqlRoleDefinition, err := cosmosdb.NewSqlRoleDefinition(ctx, \"example\", \u0026cosmosdb.SqlRoleDefinitionArgs{\n\t\t\tName: pulumi.String(\"examplesqlroledef\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountName: exampleAccount.Name,\n\t\t\tType: pulumi.String(\"CustomRole\"),\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\texampleAccount.ID(),\n\t\t\t},\n\t\t\tPermissions: cosmosdb.SqlRoleDefinitionPermissionArray{\n\t\t\t\t\u0026cosmosdb.SqlRoleDefinitionPermissionArgs{\n\t\t\t\t\tDataActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cosmosdb.NewSqlRoleAssignment(ctx, \"example\", \u0026cosmosdb.SqlRoleAssignmentArgs{\n\t\t\tName: pulumi.String(\"736180af-7fbc-4c7f-9004-22735173c1c3\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountName: exampleAccount.Name,\n\t\t\tRoleDefinitionId: exampleSqlRoleDefinition.ID(),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t\tScope: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.cosmosdb.Account;\nimport com.pulumi.azure.cosmosdb.AccountArgs;\nimport com.pulumi.azure.cosmosdb.inputs.AccountConsistencyPolicyArgs;\nimport com.pulumi.azure.cosmosdb.inputs.AccountGeoLocationArgs;\nimport com.pulumi.azure.cosmosdb.SqlRoleDefinition;\nimport com.pulumi.azure.cosmosdb.SqlRoleDefinitionArgs;\nimport com.pulumi.azure.cosmosdb.inputs.SqlRoleDefinitionPermissionArgs;\nimport com.pulumi.azure.cosmosdb.SqlRoleAssignment;\nimport com.pulumi.azure.cosmosdb.SqlRoleAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example-cosmosdb\")\n .location(example.location())\n .resourceGroupName(example.name())\n .offerType(\"Standard\")\n .kind(\"GlobalDocumentDB\")\n .consistencyPolicy(AccountConsistencyPolicyArgs.builder()\n .consistencyLevel(\"Strong\")\n .build())\n .geoLocations(AccountGeoLocationArgs.builder()\n .location(example.location())\n .failoverPriority(0)\n .build())\n .build());\n\n var exampleSqlRoleDefinition = new SqlRoleDefinition(\"exampleSqlRoleDefinition\", SqlRoleDefinitionArgs.builder()\n .name(\"examplesqlroledef\")\n .resourceGroupName(example.name())\n .accountName(exampleAccount.name())\n .type(\"CustomRole\")\n .assignableScopes(exampleAccount.id())\n .permissions(SqlRoleDefinitionPermissionArgs.builder()\n .dataActions(\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\")\n .build())\n .build());\n\n var exampleSqlRoleAssignment = new SqlRoleAssignment(\"exampleSqlRoleAssignment\", SqlRoleAssignmentArgs.builder()\n .name(\"736180af-7fbc-4c7f-9004-22735173c1c3\")\n .resourceGroupName(example.name())\n .accountName(exampleAccount.name())\n .roleDefinitionId(exampleSqlRoleDefinition.id())\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .scope(exampleAccount.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:cosmosdb:Account\n name: example\n properties:\n name: example-cosmosdb\n location: ${example.location}\n resourceGroupName: ${example.name}\n offerType: Standard\n kind: GlobalDocumentDB\n consistencyPolicy:\n consistencyLevel: Strong\n geoLocations:\n - location: ${example.location}\n failoverPriority: 0\n exampleSqlRoleDefinition:\n type: azure:cosmosdb:SqlRoleDefinition\n name: example\n properties:\n name: examplesqlroledef\n resourceGroupName: ${example.name}\n accountName: ${exampleAccount.name}\n type: CustomRole\n assignableScopes:\n - ${exampleAccount.id}\n permissions:\n - dataActions:\n - Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\n exampleSqlRoleAssignment:\n type: azure:cosmosdb:SqlRoleAssignment\n name: example\n properties:\n name: 736180af-7fbc-4c7f-9004-22735173c1c3\n resourceGroupName: ${example.name}\n accountName: ${exampleAccount.name}\n roleDefinitionId: ${exampleSqlRoleDefinition.id}\n principalId: ${current.objectId}\n scope: ${exampleAccount.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCosmos DB SQL Role Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cosmosdb/sqlRoleAssignment:SqlRoleAssignment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DocumentDB/databaseAccounts/account1/sqlRoleAssignments/9e007587-dbcd-4190-84cb-fcab5a09ca39\n```\n\n", + "description": "Manages a Cosmos DB SQL Role Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.cosmosdb.Account(\"example\", {\n name: \"example-cosmosdb\",\n location: example.location,\n resourceGroupName: example.name,\n offerType: \"Standard\",\n kind: \"GlobalDocumentDB\",\n consistencyPolicy: {\n consistencyLevel: \"Strong\",\n },\n geoLocations: [{\n location: example.location,\n failoverPriority: 0,\n }],\n});\nconst exampleSqlRoleDefinition = new azure.cosmosdb.SqlRoleDefinition(\"example\", {\n name: \"examplesqlroledef\",\n resourceGroupName: example.name,\n accountName: exampleAccount.name,\n type: \"CustomRole\",\n assignableScopes: [exampleAccount.id],\n permissions: [{\n dataActions: [\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"],\n }],\n});\nconst exampleSqlRoleAssignment = new azure.cosmosdb.SqlRoleAssignment(\"example\", {\n name: \"736180af-7fbc-4c7f-9004-22735173c1c3\",\n resourceGroupName: example.name,\n accountName: exampleAccount.name,\n roleDefinitionId: exampleSqlRoleDefinition.id,\n principalId: current.then(current =\u003e current.objectId),\n scope: exampleAccount.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.cosmosdb.Account(\"example\",\n name=\"example-cosmosdb\",\n location=example.location,\n resource_group_name=example.name,\n offer_type=\"Standard\",\n kind=\"GlobalDocumentDB\",\n consistency_policy={\n \"consistency_level\": \"Strong\",\n },\n geo_locations=[{\n \"location\": example.location,\n \"failover_priority\": 0,\n }])\nexample_sql_role_definition = azure.cosmosdb.SqlRoleDefinition(\"example\",\n name=\"examplesqlroledef\",\n resource_group_name=example.name,\n account_name=example_account.name,\n type=\"CustomRole\",\n assignable_scopes=[example_account.id],\n permissions=[{\n \"data_actions\": [\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"],\n }])\nexample_sql_role_assignment = azure.cosmosdb.SqlRoleAssignment(\"example\",\n name=\"736180af-7fbc-4c7f-9004-22735173c1c3\",\n resource_group_name=example.name,\n account_name=example_account.name,\n role_definition_id=example_sql_role_definition.id,\n principal_id=current.object_id,\n scope=example_account.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.CosmosDB.Account(\"example\", new()\n {\n Name = \"example-cosmosdb\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OfferType = \"Standard\",\n Kind = \"GlobalDocumentDB\",\n ConsistencyPolicy = new Azure.CosmosDB.Inputs.AccountConsistencyPolicyArgs\n {\n ConsistencyLevel = \"Strong\",\n },\n GeoLocations = new[]\n {\n new Azure.CosmosDB.Inputs.AccountGeoLocationArgs\n {\n Location = example.Location,\n FailoverPriority = 0,\n },\n },\n });\n\n var exampleSqlRoleDefinition = new Azure.CosmosDB.SqlRoleDefinition(\"example\", new()\n {\n Name = \"examplesqlroledef\",\n ResourceGroupName = example.Name,\n AccountName = exampleAccount.Name,\n Type = \"CustomRole\",\n AssignableScopes = new[]\n {\n exampleAccount.Id,\n },\n Permissions = new[]\n {\n new Azure.CosmosDB.Inputs.SqlRoleDefinitionPermissionArgs\n {\n DataActions = new[]\n {\n \"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\",\n },\n },\n },\n });\n\n var exampleSqlRoleAssignment = new Azure.CosmosDB.SqlRoleAssignment(\"example\", new()\n {\n Name = \"736180af-7fbc-4c7f-9004-22735173c1c3\",\n ResourceGroupName = example.Name,\n AccountName = exampleAccount.Name,\n RoleDefinitionId = exampleSqlRoleDefinition.Id,\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Scope = exampleAccount.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cosmosdb\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := cosmosdb.NewAccount(ctx, \"example\", \u0026cosmosdb.AccountArgs{\n\t\t\tName: pulumi.String(\"example-cosmosdb\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOfferType: pulumi.String(\"Standard\"),\n\t\t\tKind: pulumi.String(\"GlobalDocumentDB\"),\n\t\t\tConsistencyPolicy: \u0026cosmosdb.AccountConsistencyPolicyArgs{\n\t\t\t\tConsistencyLevel: pulumi.String(\"Strong\"),\n\t\t\t},\n\t\t\tGeoLocations: cosmosdb.AccountGeoLocationArray{\n\t\t\t\t\u0026cosmosdb.AccountGeoLocationArgs{\n\t\t\t\t\tLocation: example.Location,\n\t\t\t\t\tFailoverPriority: pulumi.Int(0),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSqlRoleDefinition, err := cosmosdb.NewSqlRoleDefinition(ctx, \"example\", \u0026cosmosdb.SqlRoleDefinitionArgs{\n\t\t\tName: pulumi.String(\"examplesqlroledef\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountName: exampleAccount.Name,\n\t\t\tType: pulumi.String(\"CustomRole\"),\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\texampleAccount.ID(),\n\t\t\t},\n\t\t\tPermissions: cosmosdb.SqlRoleDefinitionPermissionArray{\n\t\t\t\t\u0026cosmosdb.SqlRoleDefinitionPermissionArgs{\n\t\t\t\t\tDataActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cosmosdb.NewSqlRoleAssignment(ctx, \"example\", \u0026cosmosdb.SqlRoleAssignmentArgs{\n\t\t\tName: pulumi.String(\"736180af-7fbc-4c7f-9004-22735173c1c3\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountName: exampleAccount.Name,\n\t\t\tRoleDefinitionId: exampleSqlRoleDefinition.ID(),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t\tScope: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.cosmosdb.Account;\nimport com.pulumi.azure.cosmosdb.AccountArgs;\nimport com.pulumi.azure.cosmosdb.inputs.AccountConsistencyPolicyArgs;\nimport com.pulumi.azure.cosmosdb.inputs.AccountGeoLocationArgs;\nimport com.pulumi.azure.cosmosdb.SqlRoleDefinition;\nimport com.pulumi.azure.cosmosdb.SqlRoleDefinitionArgs;\nimport com.pulumi.azure.cosmosdb.inputs.SqlRoleDefinitionPermissionArgs;\nimport com.pulumi.azure.cosmosdb.SqlRoleAssignment;\nimport com.pulumi.azure.cosmosdb.SqlRoleAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example-cosmosdb\")\n .location(example.location())\n .resourceGroupName(example.name())\n .offerType(\"Standard\")\n .kind(\"GlobalDocumentDB\")\n .consistencyPolicy(AccountConsistencyPolicyArgs.builder()\n .consistencyLevel(\"Strong\")\n .build())\n .geoLocations(AccountGeoLocationArgs.builder()\n .location(example.location())\n .failoverPriority(0)\n .build())\n .build());\n\n var exampleSqlRoleDefinition = new SqlRoleDefinition(\"exampleSqlRoleDefinition\", SqlRoleDefinitionArgs.builder()\n .name(\"examplesqlroledef\")\n .resourceGroupName(example.name())\n .accountName(exampleAccount.name())\n .type(\"CustomRole\")\n .assignableScopes(exampleAccount.id())\n .permissions(SqlRoleDefinitionPermissionArgs.builder()\n .dataActions(\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\")\n .build())\n .build());\n\n var exampleSqlRoleAssignment = new SqlRoleAssignment(\"exampleSqlRoleAssignment\", SqlRoleAssignmentArgs.builder()\n .name(\"736180af-7fbc-4c7f-9004-22735173c1c3\")\n .resourceGroupName(example.name())\n .accountName(exampleAccount.name())\n .roleDefinitionId(exampleSqlRoleDefinition.id())\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .scope(exampleAccount.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:cosmosdb:Account\n name: example\n properties:\n name: example-cosmosdb\n location: ${example.location}\n resourceGroupName: ${example.name}\n offerType: Standard\n kind: GlobalDocumentDB\n consistencyPolicy:\n consistencyLevel: Strong\n geoLocations:\n - location: ${example.location}\n failoverPriority: 0\n exampleSqlRoleDefinition:\n type: azure:cosmosdb:SqlRoleDefinition\n name: example\n properties:\n name: examplesqlroledef\n resourceGroupName: ${example.name}\n accountName: ${exampleAccount.name}\n type: CustomRole\n assignableScopes:\n - ${exampleAccount.id}\n permissions:\n - dataActions:\n - Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\n exampleSqlRoleAssignment:\n type: azure:cosmosdb:SqlRoleAssignment\n name: example\n properties:\n name: 736180af-7fbc-4c7f-9004-22735173c1c3\n resourceGroupName: ${example.name}\n accountName: ${exampleAccount.name}\n roleDefinitionId: ${exampleSqlRoleDefinition.id}\n principalId: ${current.objectId}\n scope: ${exampleAccount.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCosmos DB SQL Role Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cosmosdb/sqlRoleAssignment:SqlRoleAssignment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DocumentDB/databaseAccounts/account1/sqlRoleAssignments/9e007587-dbcd-4190-84cb-fcab5a09ca39\n```\n\n", "properties": { "accountName": { "type": "string", @@ -160403,7 +160403,7 @@ } }, "azure:cosmosdb/sqlRoleDefinition:SqlRoleDefinition": { - "description": "Manages a Cosmos DB SQL Role Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.cosmosdb.Account(\"example\", {\n name: \"example-cosmosdb\",\n location: example.location,\n resourceGroupName: example.name,\n offerType: \"Standard\",\n kind: \"GlobalDocumentDB\",\n consistencyPolicy: {\n consistencyLevel: \"Strong\",\n },\n geoLocations: [{\n location: example.location,\n failoverPriority: 0,\n }],\n});\nconst exampleSqlRoleDefinition = new azure.cosmosdb.SqlRoleDefinition(\"example\", {\n roleDefinitionId: \"84cf3a8b-4122-4448-bce2-fa423cfe0a15\",\n resourceGroupName: example.name,\n accountName: exampleAccount.name,\n name: \"acctestsqlrole\",\n assignableScopes: [pulumi.interpolate`${exampleAccount.id}/dbs/sales`],\n permissions: [{\n dataActions: [\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.cosmosdb.Account(\"example\",\n name=\"example-cosmosdb\",\n location=example.location,\n resource_group_name=example.name,\n offer_type=\"Standard\",\n kind=\"GlobalDocumentDB\",\n consistency_policy={\n \"consistency_level\": \"Strong\",\n },\n geo_locations=[{\n \"location\": example.location,\n \"failover_priority\": 0,\n }])\nexample_sql_role_definition = azure.cosmosdb.SqlRoleDefinition(\"example\",\n role_definition_id=\"84cf3a8b-4122-4448-bce2-fa423cfe0a15\",\n resource_group_name=example.name,\n account_name=example_account.name,\n name=\"acctestsqlrole\",\n assignable_scopes=[example_account.id.apply(lambda id: f\"{id}/dbs/sales\")],\n permissions=[{\n \"data_actions\": [\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.CosmosDB.Account(\"example\", new()\n {\n Name = \"example-cosmosdb\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OfferType = \"Standard\",\n Kind = \"GlobalDocumentDB\",\n ConsistencyPolicy = new Azure.CosmosDB.Inputs.AccountConsistencyPolicyArgs\n {\n ConsistencyLevel = \"Strong\",\n },\n GeoLocations = new[]\n {\n new Azure.CosmosDB.Inputs.AccountGeoLocationArgs\n {\n Location = example.Location,\n FailoverPriority = 0,\n },\n },\n });\n\n var exampleSqlRoleDefinition = new Azure.CosmosDB.SqlRoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"84cf3a8b-4122-4448-bce2-fa423cfe0a15\",\n ResourceGroupName = example.Name,\n AccountName = exampleAccount.Name,\n Name = \"acctestsqlrole\",\n AssignableScopes = new[]\n {\n exampleAccount.Id.Apply(id =\u003e $\"{id}/dbs/sales\"),\n },\n Permissions = new[]\n {\n new Azure.CosmosDB.Inputs.SqlRoleDefinitionPermissionArgs\n {\n DataActions = new[]\n {\n \"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cosmosdb\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := cosmosdb.NewAccount(ctx, \"example\", \u0026cosmosdb.AccountArgs{\n\t\t\tName: pulumi.String(\"example-cosmosdb\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOfferType: pulumi.String(\"Standard\"),\n\t\t\tKind: pulumi.String(\"GlobalDocumentDB\"),\n\t\t\tConsistencyPolicy: \u0026cosmosdb.AccountConsistencyPolicyArgs{\n\t\t\t\tConsistencyLevel: pulumi.String(\"Strong\"),\n\t\t\t},\n\t\t\tGeoLocations: cosmosdb.AccountGeoLocationArray{\n\t\t\t\t\u0026cosmosdb.AccountGeoLocationArgs{\n\t\t\t\t\tLocation: example.Location,\n\t\t\t\t\tFailoverPriority: pulumi.Int(0),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cosmosdb.NewSqlRoleDefinition(ctx, \"example\", \u0026cosmosdb.SqlRoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"84cf3a8b-4122-4448-bce2-fa423cfe0a15\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountName: exampleAccount.Name,\n\t\t\tName: pulumi.String(\"acctestsqlrole\"),\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\texampleAccount.ID().ApplyT(func(id string) (string, error) {\n\t\t\t\t\treturn fmt.Sprintf(\"%v/dbs/sales\", id), nil\n\t\t\t\t}).(pulumi.StringOutput),\n\t\t\t},\n\t\t\tPermissions: cosmosdb.SqlRoleDefinitionPermissionArray{\n\t\t\t\t\u0026cosmosdb.SqlRoleDefinitionPermissionArgs{\n\t\t\t\t\tDataActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.cosmosdb.Account;\nimport com.pulumi.azure.cosmosdb.AccountArgs;\nimport com.pulumi.azure.cosmosdb.inputs.AccountConsistencyPolicyArgs;\nimport com.pulumi.azure.cosmosdb.inputs.AccountGeoLocationArgs;\nimport com.pulumi.azure.cosmosdb.SqlRoleDefinition;\nimport com.pulumi.azure.cosmosdb.SqlRoleDefinitionArgs;\nimport com.pulumi.azure.cosmosdb.inputs.SqlRoleDefinitionPermissionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example-cosmosdb\")\n .location(example.location())\n .resourceGroupName(example.name())\n .offerType(\"Standard\")\n .kind(\"GlobalDocumentDB\")\n .consistencyPolicy(AccountConsistencyPolicyArgs.builder()\n .consistencyLevel(\"Strong\")\n .build())\n .geoLocations(AccountGeoLocationArgs.builder()\n .location(example.location())\n .failoverPriority(0)\n .build())\n .build());\n\n var exampleSqlRoleDefinition = new SqlRoleDefinition(\"exampleSqlRoleDefinition\", SqlRoleDefinitionArgs.builder()\n .roleDefinitionId(\"84cf3a8b-4122-4448-bce2-fa423cfe0a15\")\n .resourceGroupName(example.name())\n .accountName(exampleAccount.name())\n .name(\"acctestsqlrole\")\n .assignableScopes(exampleAccount.id().applyValue(id -\u003e String.format(\"%s/dbs/sales\", id)))\n .permissions(SqlRoleDefinitionPermissionArgs.builder()\n .dataActions(\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:cosmosdb:Account\n name: example\n properties:\n name: example-cosmosdb\n location: ${example.location}\n resourceGroupName: ${example.name}\n offerType: Standard\n kind: GlobalDocumentDB\n consistencyPolicy:\n consistencyLevel: Strong\n geoLocations:\n - location: ${example.location}\n failoverPriority: 0\n exampleSqlRoleDefinition:\n type: azure:cosmosdb:SqlRoleDefinition\n name: example\n properties:\n roleDefinitionId: 84cf3a8b-4122-4448-bce2-fa423cfe0a15\n resourceGroupName: ${example.name}\n accountName: ${exampleAccount.name}\n name: acctestsqlrole\n assignableScopes:\n - ${exampleAccount.id}/dbs/sales\n permissions:\n - dataActions:\n - Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCosmos DB SQL Role Definitions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cosmosdb/sqlRoleDefinition:SqlRoleDefinition example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DocumentDB/databaseAccounts/account1/sqlRoleDefinitions/28b3c337-f436-482b-a167-c2618dc52033\n```\n\n", + "description": "Manages a Cosmos DB SQL Role Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.cosmosdb.Account(\"example\", {\n name: \"example-cosmosdb\",\n location: example.location,\n resourceGroupName: example.name,\n offerType: \"Standard\",\n kind: \"GlobalDocumentDB\",\n consistencyPolicy: {\n consistencyLevel: \"Strong\",\n },\n geoLocations: [{\n location: example.location,\n failoverPriority: 0,\n }],\n});\nconst exampleSqlRoleDefinition = new azure.cosmosdb.SqlRoleDefinition(\"example\", {\n roleDefinitionId: \"84cf3a8b-4122-4448-bce2-fa423cfe0a15\",\n resourceGroupName: example.name,\n accountName: exampleAccount.name,\n name: \"acctestsqlrole\",\n assignableScopes: [pulumi.interpolate`${exampleAccount.id}/dbs/sales`],\n permissions: [{\n dataActions: [\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.cosmosdb.Account(\"example\",\n name=\"example-cosmosdb\",\n location=example.location,\n resource_group_name=example.name,\n offer_type=\"Standard\",\n kind=\"GlobalDocumentDB\",\n consistency_policy={\n \"consistency_level\": \"Strong\",\n },\n geo_locations=[{\n \"location\": example.location,\n \"failover_priority\": 0,\n }])\nexample_sql_role_definition = azure.cosmosdb.SqlRoleDefinition(\"example\",\n role_definition_id=\"84cf3a8b-4122-4448-bce2-fa423cfe0a15\",\n resource_group_name=example.name,\n account_name=example_account.name,\n name=\"acctestsqlrole\",\n assignable_scopes=[example_account.id.apply(lambda id: f\"{id}/dbs/sales\")],\n permissions=[{\n \"data_actions\": [\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.CosmosDB.Account(\"example\", new()\n {\n Name = \"example-cosmosdb\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n OfferType = \"Standard\",\n Kind = \"GlobalDocumentDB\",\n ConsistencyPolicy = new Azure.CosmosDB.Inputs.AccountConsistencyPolicyArgs\n {\n ConsistencyLevel = \"Strong\",\n },\n GeoLocations = new[]\n {\n new Azure.CosmosDB.Inputs.AccountGeoLocationArgs\n {\n Location = example.Location,\n FailoverPriority = 0,\n },\n },\n });\n\n var exampleSqlRoleDefinition = new Azure.CosmosDB.SqlRoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"84cf3a8b-4122-4448-bce2-fa423cfe0a15\",\n ResourceGroupName = example.Name,\n AccountName = exampleAccount.Name,\n Name = \"acctestsqlrole\",\n AssignableScopes = new[]\n {\n exampleAccount.Id.Apply(id =\u003e $\"{id}/dbs/sales\"),\n },\n Permissions = new[]\n {\n new Azure.CosmosDB.Inputs.SqlRoleDefinitionPermissionArgs\n {\n DataActions = new[]\n {\n \"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/cosmosdb\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := cosmosdb.NewAccount(ctx, \"example\", \u0026cosmosdb.AccountArgs{\n\t\t\tName: pulumi.String(\"example-cosmosdb\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tOfferType: pulumi.String(\"Standard\"),\n\t\t\tKind: pulumi.String(\"GlobalDocumentDB\"),\n\t\t\tConsistencyPolicy: \u0026cosmosdb.AccountConsistencyPolicyArgs{\n\t\t\t\tConsistencyLevel: pulumi.String(\"Strong\"),\n\t\t\t},\n\t\t\tGeoLocations: cosmosdb.AccountGeoLocationArray{\n\t\t\t\t\u0026cosmosdb.AccountGeoLocationArgs{\n\t\t\t\t\tLocation: example.Location,\n\t\t\t\t\tFailoverPriority: pulumi.Int(0),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = cosmosdb.NewSqlRoleDefinition(ctx, \"example\", \u0026cosmosdb.SqlRoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"84cf3a8b-4122-4448-bce2-fa423cfe0a15\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountName: exampleAccount.Name,\n\t\t\tName: pulumi.String(\"acctestsqlrole\"),\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\texampleAccount.ID().ApplyT(func(id string) (string, error) {\n\t\t\t\t\treturn fmt.Sprintf(\"%v/dbs/sales\", id), nil\n\t\t\t\t}).(pulumi.StringOutput),\n\t\t\t},\n\t\t\tPermissions: cosmosdb.SqlRoleDefinitionPermissionArray{\n\t\t\t\t\u0026cosmosdb.SqlRoleDefinitionPermissionArgs{\n\t\t\t\t\tDataActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.cosmosdb.Account;\nimport com.pulumi.azure.cosmosdb.AccountArgs;\nimport com.pulumi.azure.cosmosdb.inputs.AccountConsistencyPolicyArgs;\nimport com.pulumi.azure.cosmosdb.inputs.AccountGeoLocationArgs;\nimport com.pulumi.azure.cosmosdb.SqlRoleDefinition;\nimport com.pulumi.azure.cosmosdb.SqlRoleDefinitionArgs;\nimport com.pulumi.azure.cosmosdb.inputs.SqlRoleDefinitionPermissionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example-cosmosdb\")\n .location(example.location())\n .resourceGroupName(example.name())\n .offerType(\"Standard\")\n .kind(\"GlobalDocumentDB\")\n .consistencyPolicy(AccountConsistencyPolicyArgs.builder()\n .consistencyLevel(\"Strong\")\n .build())\n .geoLocations(AccountGeoLocationArgs.builder()\n .location(example.location())\n .failoverPriority(0)\n .build())\n .build());\n\n var exampleSqlRoleDefinition = new SqlRoleDefinition(\"exampleSqlRoleDefinition\", SqlRoleDefinitionArgs.builder()\n .roleDefinitionId(\"84cf3a8b-4122-4448-bce2-fa423cfe0a15\")\n .resourceGroupName(example.name())\n .accountName(exampleAccount.name())\n .name(\"acctestsqlrole\")\n .assignableScopes(exampleAccount.id().applyValue(id -\u003e String.format(\"%s/dbs/sales\", id)))\n .permissions(SqlRoleDefinitionPermissionArgs.builder()\n .dataActions(\"Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:cosmosdb:Account\n name: example\n properties:\n name: example-cosmosdb\n location: ${example.location}\n resourceGroupName: ${example.name}\n offerType: Standard\n kind: GlobalDocumentDB\n consistencyPolicy:\n consistencyLevel: Strong\n geoLocations:\n - location: ${example.location}\n failoverPriority: 0\n exampleSqlRoleDefinition:\n type: azure:cosmosdb:SqlRoleDefinition\n name: example\n properties:\n roleDefinitionId: 84cf3a8b-4122-4448-bce2-fa423cfe0a15\n resourceGroupName: ${example.name}\n accountName: ${exampleAccount.name}\n name: acctestsqlrole\n assignableScopes:\n - ${exampleAccount.id}/dbs/sales\n permissions:\n - dataActions:\n - Microsoft.DocumentDB/databaseAccounts/sqlDatabases/containers/items/read\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCosmos DB SQL Role Definitions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:cosmosdb/sqlRoleDefinition:SqlRoleDefinition example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DocumentDB/databaseAccounts/account1/sqlRoleDefinitions/28b3c337-f436-482b-a167-c2618dc52033\n```\n\n", "properties": { "accountName": { "type": "string", @@ -162587,7 +162587,7 @@ } }, "azure:databricks/workspaceRootDbfsCustomerManagedKey:WorkspaceRootDbfsCustomerManagedKey": { - "description": "Manages a Customer Managed Key for the Databricks Workspaces Root Databricks File System(DBFS)\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleWorkspace = new azure.databricks.Workspace(\"example\", {\n name: \"databricks-test\",\n resourceGroupName: example.name,\n location: example.location,\n sku: \"premium\",\n customerManagedKeyEnabled: true,\n tags: {\n Environment: \"Production\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n purgeProtectionEnabled: true,\n softDeleteRetentionDays: 7,\n});\nconst terraform = new azure.keyvault.AccessPolicy(\"terraform\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleKeyVault.tenantId,\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-certificate\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [terraform],\n});\nconst databricks = new azure.keyvault.AccessPolicy(\"databricks\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleWorkspace.storageAccountIdentities.apply(storageAccountIdentities =\u003e storageAccountIdentities[0].tenantId),\n objectId: exampleWorkspace.storageAccountIdentities.apply(storageAccountIdentities =\u003e storageAccountIdentities[0].principalId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ],\n}, {\n dependsOn: [exampleWorkspace],\n});\nconst exampleWorkspaceRootDbfsCustomerManagedKey = new azure.databricks.WorkspaceRootDbfsCustomerManagedKey(\"example\", {\n workspaceId: exampleWorkspace.id,\n keyVaultKeyId: exampleKey.id,\n}, {\n dependsOn: [databricks],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_workspace = azure.databricks.Workspace(\"example\",\n name=\"databricks-test\",\n resource_group_name=example.name,\n location=example.location,\n sku=\"premium\",\n customer_managed_key_enabled=True,\n tags={\n \"Environment\": \"Production\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n purge_protection_enabled=True,\n soft_delete_retention_days=7)\nterraform = azure.keyvault.AccessPolicy(\"terraform\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_key_vault.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-certificate\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[terraform]))\ndatabricks = azure.keyvault.AccessPolicy(\"databricks\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_workspace.storage_account_identities[0].tenant_id,\n object_id=example_workspace.storage_account_identities[0].principal_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_workspace]))\nexample_workspace_root_dbfs_customer_managed_key = azure.databricks.WorkspaceRootDbfsCustomerManagedKey(\"example\",\n workspace_id=example_workspace.id,\n key_vault_key_id=example_key.id,\n opts = pulumi.ResourceOptions(depends_on=[databricks]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleWorkspace = new Azure.DataBricks.Workspace(\"example\", new()\n {\n Name = \"databricks-test\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Sku = \"premium\",\n CustomerManagedKeyEnabled = true,\n Tags = \n {\n { \"Environment\", \"Production\" },\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n PurgeProtectionEnabled = true,\n SoftDeleteRetentionDays = 7,\n });\n\n var terraform = new Azure.KeyVault.AccessPolicy(\"terraform\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleKeyVault.TenantId,\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-certificate\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n terraform,\n },\n });\n\n var databricks = new Azure.KeyVault.AccessPolicy(\"databricks\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleWorkspace.StorageAccountIdentities.Apply(storageAccountIdentities =\u003e storageAccountIdentities[0].TenantId),\n ObjectId = exampleWorkspace.StorageAccountIdentities.Apply(storageAccountIdentities =\u003e storageAccountIdentities[0].PrincipalId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleWorkspace,\n },\n });\n\n var exampleWorkspaceRootDbfsCustomerManagedKey = new Azure.DataBricks.WorkspaceRootDbfsCustomerManagedKey(\"example\", new()\n {\n WorkspaceId = exampleWorkspace.Id,\n KeyVaultKeyId = exampleKey.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n databricks,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/databricks\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := databricks.NewWorkspace(ctx, \"example\", \u0026databricks.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"databricks-test\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSku: pulumi.String(\"premium\"),\n\t\t\tCustomerManagedKeyEnabled: pulumi.Bool(true),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tterraform, err := keyvault.NewAccessPolicy(ctx, \"terraform\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: exampleKeyVault.TenantId,\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-certificate\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tterraform,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdatabricks, err := keyvault.NewAccessPolicy(ctx, \"databricks\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleWorkspace.StorageAccountIdentities.ApplyT(func(storageAccountIdentities []databricks.WorkspaceStorageAccountIdentity) (*string, error) {\n\t\t\t\treturn \u0026storageAccountIdentities[0].TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleWorkspace.StorageAccountIdentities.ApplyT(func(storageAccountIdentities []databricks.WorkspaceStorageAccountIdentity) (*string, error) {\n\t\t\t\treturn \u0026storageAccountIdentities[0].PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleWorkspace,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = databricks.NewWorkspaceRootDbfsCustomerManagedKey(ctx, \"example\", \u0026databricks.WorkspaceRootDbfsCustomerManagedKeyArgs{\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdatabricks,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.databricks.Workspace;\nimport com.pulumi.azure.databricks.WorkspaceArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.databricks.WorkspaceRootDbfsCustomerManagedKey;\nimport com.pulumi.azure.databricks.WorkspaceRootDbfsCustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"databricks-test\")\n .resourceGroupName(example.name())\n .location(example.location())\n .sku(\"premium\")\n .customerManagedKeyEnabled(true)\n .tags(Map.of(\"Environment\", \"Production\"))\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .purgeProtectionEnabled(true)\n .softDeleteRetentionDays(7)\n .build());\n\n var terraform = new AccessPolicy(\"terraform\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleKeyVault.tenantId())\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-certificate\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(terraform)\n .build());\n\n var databricks = new AccessPolicy(\"databricks\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleWorkspace.storageAccountIdentities().applyValue(storageAccountIdentities -\u003e storageAccountIdentities[0].tenantId()))\n .objectId(exampleWorkspace.storageAccountIdentities().applyValue(storageAccountIdentities -\u003e storageAccountIdentities[0].principalId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleWorkspace)\n .build());\n\n var exampleWorkspaceRootDbfsCustomerManagedKey = new WorkspaceRootDbfsCustomerManagedKey(\"exampleWorkspaceRootDbfsCustomerManagedKey\", WorkspaceRootDbfsCustomerManagedKeyArgs.builder()\n .workspaceId(exampleWorkspace.id())\n .keyVaultKeyId(exampleKey.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(databricks)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleWorkspace:\n type: azure:databricks:Workspace\n name: example\n properties:\n name: databricks-test\n resourceGroupName: ${example.name}\n location: ${example.location}\n sku: premium\n customerManagedKeyEnabled: true\n tags:\n Environment: Production\n exampleWorkspaceRootDbfsCustomerManagedKey:\n type: azure:databricks:WorkspaceRootDbfsCustomerManagedKey\n name: example\n properties:\n workspaceId: ${exampleWorkspace.id}\n keyVaultKeyId: ${exampleKey.id}\n options:\n dependson:\n - ${databricks}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n purgeProtectionEnabled: true\n softDeleteRetentionDays: 7\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-certificate\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${terraform}\n terraform:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleKeyVault.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n - GetRotationPolicy\n databricks:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleWorkspace.storageAccountIdentities[0].tenantId}\n objectId: ${exampleWorkspace.storageAccountIdentities[0].principalId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n options:\n dependson:\n - ${exampleWorkspace}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Example HCL Configurations\n\n* Databricks Workspace with Root Databricks File System Customer Managed Keys\n* Databricks Workspace with Root Databricks File System Customer Managed Keys in a Different Subscription\n* Databricks Workspace with Private Endpoint, Customer Managed Keys for Managed Services and Root Databricks File System Customer Managed Keys\n\n## Import\n\nDatabricks Workspace Root DBFS Customer Managed Key can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:databricks/workspaceRootDbfsCustomerManagedKey:WorkspaceRootDbfsCustomerManagedKey workspace1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Databricks/workspaces/workspace1\n```\n\n", + "description": "Manages a Customer Managed Key for the Databricks Workspaces Root Databricks File System(DBFS)\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleWorkspace = new azure.databricks.Workspace(\"example\", {\n name: \"databricks-test\",\n resourceGroupName: example.name,\n location: example.location,\n sku: \"premium\",\n customerManagedKeyEnabled: true,\n tags: {\n Environment: \"Production\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n purgeProtectionEnabled: true,\n softDeleteRetentionDays: 7,\n});\nconst terraform = new azure.keyvault.AccessPolicy(\"terraform\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleKeyVault.tenantId,\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-certificate\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [terraform],\n});\nconst databricks = new azure.keyvault.AccessPolicy(\"databricks\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleWorkspace.storageAccountIdentities.apply(storageAccountIdentities =\u003e storageAccountIdentities[0].tenantId),\n objectId: exampleWorkspace.storageAccountIdentities.apply(storageAccountIdentities =\u003e storageAccountIdentities[0].principalId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ],\n}, {\n dependsOn: [exampleWorkspace],\n});\nconst exampleWorkspaceRootDbfsCustomerManagedKey = new azure.databricks.WorkspaceRootDbfsCustomerManagedKey(\"example\", {\n workspaceId: exampleWorkspace.id,\n keyVaultKeyId: exampleKey.id,\n}, {\n dependsOn: [databricks],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_workspace = azure.databricks.Workspace(\"example\",\n name=\"databricks-test\",\n resource_group_name=example.name,\n location=example.location,\n sku=\"premium\",\n customer_managed_key_enabled=True,\n tags={\n \"Environment\": \"Production\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n purge_protection_enabled=True,\n soft_delete_retention_days=7)\nterraform = azure.keyvault.AccessPolicy(\"terraform\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_key_vault.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-certificate\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[terraform]))\ndatabricks = azure.keyvault.AccessPolicy(\"databricks\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_workspace.storage_account_identities[0].tenant_id,\n object_id=example_workspace.storage_account_identities[0].principal_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_workspace]))\nexample_workspace_root_dbfs_customer_managed_key = azure.databricks.WorkspaceRootDbfsCustomerManagedKey(\"example\",\n workspace_id=example_workspace.id,\n key_vault_key_id=example_key.id,\n opts = pulumi.ResourceOptions(depends_on=[databricks]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleWorkspace = new Azure.DataBricks.Workspace(\"example\", new()\n {\n Name = \"databricks-test\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Sku = \"premium\",\n CustomerManagedKeyEnabled = true,\n Tags = \n {\n { \"Environment\", \"Production\" },\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n PurgeProtectionEnabled = true,\n SoftDeleteRetentionDays = 7,\n });\n\n var terraform = new Azure.KeyVault.AccessPolicy(\"terraform\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleKeyVault.TenantId,\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-certificate\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n terraform,\n },\n });\n\n var databricks = new Azure.KeyVault.AccessPolicy(\"databricks\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleWorkspace.StorageAccountIdentities.Apply(storageAccountIdentities =\u003e storageAccountIdentities[0].TenantId),\n ObjectId = exampleWorkspace.StorageAccountIdentities.Apply(storageAccountIdentities =\u003e storageAccountIdentities[0].PrincipalId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleWorkspace,\n },\n });\n\n var exampleWorkspaceRootDbfsCustomerManagedKey = new Azure.DataBricks.WorkspaceRootDbfsCustomerManagedKey(\"example\", new()\n {\n WorkspaceId = exampleWorkspace.Id,\n KeyVaultKeyId = exampleKey.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n databricks,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/databricks\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := databricks.NewWorkspace(ctx, \"example\", \u0026databricks.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"databricks-test\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSku: pulumi.String(\"premium\"),\n\t\t\tCustomerManagedKeyEnabled: pulumi.Bool(true),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tterraform, err := keyvault.NewAccessPolicy(ctx, \"terraform\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: exampleKeyVault.TenantId,\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-certificate\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tterraform,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdatabricks, err := keyvault.NewAccessPolicy(ctx, \"databricks\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleWorkspace.StorageAccountIdentities.ApplyT(func(storageAccountIdentities []databricks.WorkspaceStorageAccountIdentity) (*string, error) {\n\t\t\t\treturn \u0026storageAccountIdentities[0].TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleWorkspace.StorageAccountIdentities.ApplyT(func(storageAccountIdentities []databricks.WorkspaceStorageAccountIdentity) (*string, error) {\n\t\t\t\treturn \u0026storageAccountIdentities[0].PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleWorkspace,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = databricks.NewWorkspaceRootDbfsCustomerManagedKey(ctx, \"example\", \u0026databricks.WorkspaceRootDbfsCustomerManagedKeyArgs{\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdatabricks,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.databricks.Workspace;\nimport com.pulumi.azure.databricks.WorkspaceArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.databricks.WorkspaceRootDbfsCustomerManagedKey;\nimport com.pulumi.azure.databricks.WorkspaceRootDbfsCustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"databricks-test\")\n .resourceGroupName(example.name())\n .location(example.location())\n .sku(\"premium\")\n .customerManagedKeyEnabled(true)\n .tags(Map.of(\"Environment\", \"Production\"))\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .purgeProtectionEnabled(true)\n .softDeleteRetentionDays(7)\n .build());\n\n var terraform = new AccessPolicy(\"terraform\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleKeyVault.tenantId())\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-certificate\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(terraform)\n .build());\n\n var databricks = new AccessPolicy(\"databricks\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleWorkspace.storageAccountIdentities().applyValue(storageAccountIdentities -\u003e storageAccountIdentities[0].tenantId()))\n .objectId(exampleWorkspace.storageAccountIdentities().applyValue(storageAccountIdentities -\u003e storageAccountIdentities[0].principalId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"List\",\n \"Decrypt\",\n \"Sign\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleWorkspace)\n .build());\n\n var exampleWorkspaceRootDbfsCustomerManagedKey = new WorkspaceRootDbfsCustomerManagedKey(\"exampleWorkspaceRootDbfsCustomerManagedKey\", WorkspaceRootDbfsCustomerManagedKeyArgs.builder()\n .workspaceId(exampleWorkspace.id())\n .keyVaultKeyId(exampleKey.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(databricks)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleWorkspace:\n type: azure:databricks:Workspace\n name: example\n properties:\n name: databricks-test\n resourceGroupName: ${example.name}\n location: ${example.location}\n sku: premium\n customerManagedKeyEnabled: true\n tags:\n Environment: Production\n exampleWorkspaceRootDbfsCustomerManagedKey:\n type: azure:databricks:WorkspaceRootDbfsCustomerManagedKey\n name: example\n properties:\n workspaceId: ${exampleWorkspace.id}\n keyVaultKeyId: ${exampleKey.id}\n options:\n dependson:\n - ${databricks}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n purgeProtectionEnabled: true\n softDeleteRetentionDays: 7\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-certificate\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${terraform}\n terraform:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleKeyVault.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n - GetRotationPolicy\n databricks:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleWorkspace.storageAccountIdentities[0].tenantId}\n objectId: ${exampleWorkspace.storageAccountIdentities[0].principalId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - List\n - Decrypt\n - Sign\n options:\n dependson:\n - ${exampleWorkspace}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Example HCL Configurations\n\n* Databricks Workspace with Root Databricks File System Customer Managed Keys\n* Databricks Workspace with Root Databricks File System Customer Managed Keys in a Different Subscription\n* Databricks Workspace with Private Endpoint, Customer Managed Keys for Managed Services and Root Databricks File System Customer Managed Keys\n\n## Import\n\nDatabricks Workspace Root DBFS Customer Managed Key can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:databricks/workspaceRootDbfsCustomerManagedKey:WorkspaceRootDbfsCustomerManagedKey workspace1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Databricks/workspaces/workspace1\n```\n\n", "properties": { "keyVaultId": { "type": "string" @@ -162646,7 +162646,7 @@ ] }, "azure:datadog/monitor:Monitor": { - "description": "Manages a datadog Monitor.\n\n## Example Usage\n\n### Monitor creation with linking to Datadog organization\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-datadog\",\n location: \"West US 2\",\n});\nconst exampleMonitor = new azure.datadog.Monitor(\"example\", {\n name: \"example-monitor\",\n resourceGroupName: example.name,\n location: example.location,\n datadogOrganization: {\n apiKey: \"XXXX\",\n applicationKey: \"XXXX\",\n },\n user: {\n name: \"Example\",\n email: \"abc@xyz.com\",\n },\n skuName: \"Linked\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-datadog\",\n location=\"West US 2\")\nexample_monitor = azure.datadog.Monitor(\"example\",\n name=\"example-monitor\",\n resource_group_name=example.name,\n location=example.location,\n datadog_organization={\n \"api_key\": \"XXXX\",\n \"application_key\": \"XXXX\",\n },\n user={\n \"name\": \"Example\",\n \"email\": \"abc@xyz.com\",\n },\n sku_name=\"Linked\",\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-datadog\",\n Location = \"West US 2\",\n });\n\n var exampleMonitor = new Azure.Datadog.Monitor(\"example\", new()\n {\n Name = \"example-monitor\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n DatadogOrganization = new Azure.Datadog.Inputs.MonitorDatadogOrganizationArgs\n {\n ApiKey = \"XXXX\",\n ApplicationKey = \"XXXX\",\n },\n User = new Azure.Datadog.Inputs.MonitorUserArgs\n {\n Name = \"Example\",\n Email = \"abc@xyz.com\",\n },\n SkuName = \"Linked\",\n Identity = new Azure.Datadog.Inputs.MonitorIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datadog\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-datadog\"),\n\t\t\tLocation: pulumi.String(\"West US 2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datadog.NewMonitor(ctx, \"example\", \u0026datadog.MonitorArgs{\n\t\t\tName: pulumi.String(\"example-monitor\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tDatadogOrganization: \u0026datadog.MonitorDatadogOrganizationArgs{\n\t\t\t\tApiKey: pulumi.String(\"XXXX\"),\n\t\t\t\tApplicationKey: pulumi.String(\"XXXX\"),\n\t\t\t},\n\t\t\tUser: \u0026datadog.MonitorUserArgs{\n\t\t\t\tName: pulumi.String(\"Example\"),\n\t\t\t\tEmail: pulumi.String(\"abc@xyz.com\"),\n\t\t\t},\n\t\t\tSkuName: pulumi.String(\"Linked\"),\n\t\t\tIdentity: \u0026datadog.MonitorIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datadog.Monitor;\nimport com.pulumi.azure.datadog.MonitorArgs;\nimport com.pulumi.azure.datadog.inputs.MonitorDatadogOrganizationArgs;\nimport com.pulumi.azure.datadog.inputs.MonitorUserArgs;\nimport com.pulumi.azure.datadog.inputs.MonitorIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-datadog\")\n .location(\"West US 2\")\n .build());\n\n var exampleMonitor = new Monitor(\"exampleMonitor\", MonitorArgs.builder()\n .name(\"example-monitor\")\n .resourceGroupName(example.name())\n .location(example.location())\n .datadogOrganization(MonitorDatadogOrganizationArgs.builder()\n .apiKey(\"XXXX\")\n .applicationKey(\"XXXX\")\n .build())\n .user(MonitorUserArgs.builder()\n .name(\"Example\")\n .email(\"abc@xyz.com\")\n .build())\n .skuName(\"Linked\")\n .identity(MonitorIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-datadog\n location: West US 2\n exampleMonitor:\n type: azure:datadog:Monitor\n name: example\n properties:\n name: example-monitor\n resourceGroupName: ${example.name}\n location: ${example.location}\n datadogOrganization:\n apiKey: XXXX\n applicationKey: XXXX\n user:\n name: Example\n email: abc@xyz.com\n skuName: Linked\n identity:\n type: SystemAssigned\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Role Assignment\n\nTo enable metrics flow, perform role assignment on the identity created above. `Monitoring reader(43d0d8ad-25c7-4714-9337-8ba259a9fe05)` role is required .\n\n### Role assignment on the monitor created\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst monitoringReader = azure.authorization.getRoleDefinition({\n name: \"Monitoring Reader\",\n});\nconst example = new azure.authorization.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: monitoringReader.then(monitoringReader =\u003e monitoringReader.roleDefinitionId),\n principalId: exampleAzurermDatadogMonitor.identity[0].principalId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nmonitoring_reader = azure.authorization.get_role_definition(name=\"Monitoring Reader\")\nexample = azure.authorization.Assignment(\"example\",\n scope=primary.id,\n role_definition_id=monitoring_reader.role_definition_id,\n principal_id=example_azurerm_datadog_monitor[\"identity\"][0][\"principalId\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var monitoringReader = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Monitoring Reader\",\n });\n\n var example = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = monitoringReader.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n PrincipalId = exampleAzurermDatadogMonitor.Identity[0].PrincipalId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmonitoringReader, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Monitoring Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: pulumi.String(monitoringReader.RoleDefinitionId),\n\t\t\tPrincipalId: pulumi.Any(exampleAzurermDatadogMonitor.Identity[0].PrincipalId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var monitoringReader = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Monitoring Reader\")\n .build());\n\n var example = new Assignment(\"example\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(monitoringReader.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .principalId(exampleAzurermDatadogMonitor.identity()[0].principalId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:authorization:Assignment\n properties:\n scope: ${primary.id}\n roleDefinitionId: ${monitoringReader.roleDefinitionId}\n principalId: ${exampleAzurermDatadogMonitor.identity[0].principalId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n monitoringReader:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Monitoring Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDatadog Monitors can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datadog/monitor:Monitor example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Datadog/monitors/monitor1\n```\n\n", + "description": "Manages a datadog Monitor.\n\n## Example Usage\n\n### Monitor creation with linking to Datadog organization\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-datadog\",\n location: \"West US 2\",\n});\nconst exampleMonitor = new azure.datadog.Monitor(\"example\", {\n name: \"example-monitor\",\n resourceGroupName: example.name,\n location: example.location,\n datadogOrganization: {\n apiKey: \"XXXX\",\n applicationKey: \"XXXX\",\n },\n user: {\n name: \"Example\",\n email: \"abc@xyz.com\",\n },\n skuName: \"Linked\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-datadog\",\n location=\"West US 2\")\nexample_monitor = azure.datadog.Monitor(\"example\",\n name=\"example-monitor\",\n resource_group_name=example.name,\n location=example.location,\n datadog_organization={\n \"api_key\": \"XXXX\",\n \"application_key\": \"XXXX\",\n },\n user={\n \"name\": \"Example\",\n \"email\": \"abc@xyz.com\",\n },\n sku_name=\"Linked\",\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-datadog\",\n Location = \"West US 2\",\n });\n\n var exampleMonitor = new Azure.Datadog.Monitor(\"example\", new()\n {\n Name = \"example-monitor\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n DatadogOrganization = new Azure.Datadog.Inputs.MonitorDatadogOrganizationArgs\n {\n ApiKey = \"XXXX\",\n ApplicationKey = \"XXXX\",\n },\n User = new Azure.Datadog.Inputs.MonitorUserArgs\n {\n Name = \"Example\",\n Email = \"abc@xyz.com\",\n },\n SkuName = \"Linked\",\n Identity = new Azure.Datadog.Inputs.MonitorIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datadog\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-datadog\"),\n\t\t\tLocation: pulumi.String(\"West US 2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datadog.NewMonitor(ctx, \"example\", \u0026datadog.MonitorArgs{\n\t\t\tName: pulumi.String(\"example-monitor\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tDatadogOrganization: \u0026datadog.MonitorDatadogOrganizationArgs{\n\t\t\t\tApiKey: pulumi.String(\"XXXX\"),\n\t\t\t\tApplicationKey: pulumi.String(\"XXXX\"),\n\t\t\t},\n\t\t\tUser: \u0026datadog.MonitorUserArgs{\n\t\t\t\tName: pulumi.String(\"Example\"),\n\t\t\t\tEmail: pulumi.String(\"abc@xyz.com\"),\n\t\t\t},\n\t\t\tSkuName: pulumi.String(\"Linked\"),\n\t\t\tIdentity: \u0026datadog.MonitorIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datadog.Monitor;\nimport com.pulumi.azure.datadog.MonitorArgs;\nimport com.pulumi.azure.datadog.inputs.MonitorDatadogOrganizationArgs;\nimport com.pulumi.azure.datadog.inputs.MonitorUserArgs;\nimport com.pulumi.azure.datadog.inputs.MonitorIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-datadog\")\n .location(\"West US 2\")\n .build());\n\n var exampleMonitor = new Monitor(\"exampleMonitor\", MonitorArgs.builder()\n .name(\"example-monitor\")\n .resourceGroupName(example.name())\n .location(example.location())\n .datadogOrganization(MonitorDatadogOrganizationArgs.builder()\n .apiKey(\"XXXX\")\n .applicationKey(\"XXXX\")\n .build())\n .user(MonitorUserArgs.builder()\n .name(\"Example\")\n .email(\"abc@xyz.com\")\n .build())\n .skuName(\"Linked\")\n .identity(MonitorIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-datadog\n location: West US 2\n exampleMonitor:\n type: azure:datadog:Monitor\n name: example\n properties:\n name: example-monitor\n resourceGroupName: ${example.name}\n location: ${example.location}\n datadogOrganization:\n apiKey: XXXX\n applicationKey: XXXX\n user:\n name: Example\n email: abc@xyz.com\n skuName: Linked\n identity:\n type: SystemAssigned\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Role Assignment\n\nTo enable metrics flow, perform role assignment on the identity created above. `Monitoring reader(43d0d8ad-25c7-4714-9337-8ba259a9fe05)` role is required .\n\n### Role assignment on the monitor created\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst monitoringReader = azure.authorization.getRoleDefinition({\n name: \"Monitoring Reader\",\n});\nconst example = new azure.authorization.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: monitoringReader.then(monitoringReader =\u003e monitoringReader.roleDefinitionId),\n principalId: exampleAzurermDatadogMonitor.identity[0].principalId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nmonitoring_reader = azure.authorization.get_role_definition(name=\"Monitoring Reader\")\nexample = azure.authorization.Assignment(\"example\",\n scope=primary.id,\n role_definition_id=monitoring_reader.role_definition_id,\n principal_id=example_azurerm_datadog_monitor[\"identity\"][0][\"principalId\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var monitoringReader = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Monitoring Reader\",\n });\n\n var example = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = monitoringReader.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n PrincipalId = exampleAzurermDatadogMonitor.Identity[0].PrincipalId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmonitoringReader, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Monitoring Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: pulumi.String(monitoringReader.RoleDefinitionId),\n\t\t\tPrincipalId: pulumi.Any(exampleAzurermDatadogMonitor.Identity[0].PrincipalId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var monitoringReader = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Monitoring Reader\")\n .build());\n\n var example = new Assignment(\"example\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(monitoringReader.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .principalId(exampleAzurermDatadogMonitor.identity()[0].principalId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:authorization:Assignment\n properties:\n scope: ${primary.id}\n roleDefinitionId: ${monitoringReader.roleDefinitionId}\n principalId: ${exampleAzurermDatadogMonitor.identity[0].principalId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n monitoringReader:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Monitoring Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDatadog Monitors can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datadog/monitor:Monitor example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Datadog/monitors/monitor1\n```\n\n", "properties": { "datadogOrganization": { "$ref": "#/types/azure:datadog/MonitorDatadogOrganization:MonitorDatadogOrganization", @@ -162976,7 +162976,7 @@ } }, "azure:datafactory/credentialServicePrincipal:CredentialServicePrincipal": { - "description": "Manage a Data Factory Service Principal credential resource. These resources are used by Data Factory to access data sources.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"westeurope\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }],\n});\nconst exampleSecret = new azure.keyvault.Secret(\"example\", {\n name: \"example\",\n value: \"example-secret\",\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleCredentialServicePrincipal = new azure.datafactory.CredentialServicePrincipal(\"example\", {\n name: \"example\",\n description: \"example description\",\n dataFactoryId: exampleFactory.id,\n tenantId: current.then(current =\u003e current.tenantId),\n servicePrincipalId: current.then(current =\u003e current.clientId),\n servicePrincipalKey: {\n linkedServiceName: exampleLinkedServiceKeyVault.name,\n secretName: exampleSecret.name,\n secretVersion: exampleSecret.version,\n },\n annotations: [\n \"1\",\n \"2\",\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"westeurope\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }])\nexample_secret = azure.keyvault.Secret(\"example\",\n name=\"example\",\n value=\"example-secret\",\n key_vault_id=example_key_vault.id)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\nexample_credential_service_principal = azure.datafactory.CredentialServicePrincipal(\"example\",\n name=\"example\",\n description=\"example description\",\n data_factory_id=example_factory.id,\n tenant_id=current.tenant_id,\n service_principal_id=current.client_id,\n service_principal_key={\n \"linked_service_name\": example_linked_service_key_vault.name,\n \"secret_name\": example_secret.name,\n \"secret_version\": example_secret.version,\n },\n annotations=[\n \"1\",\n \"2\",\n ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"westeurope\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n },\n });\n\n var exampleSecret = new Azure.KeyVault.Secret(\"example\", new()\n {\n Name = \"example\",\n Value = \"example-secret\",\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleCredentialServicePrincipal = new Azure.DataFactory.CredentialServicePrincipal(\"example\", new()\n {\n Name = \"example\",\n Description = \"example description\",\n DataFactoryId = exampleFactory.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ServicePrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n ServicePrincipalKey = new Azure.DataFactory.Inputs.CredentialServicePrincipalServicePrincipalKeyArgs\n {\n LinkedServiceName = exampleLinkedServiceKeyVault.Name,\n SecretName = exampleSecret.Name,\n SecretVersion = exampleSecret.Version,\n },\n Annotations = new[]\n {\n \"1\",\n \"2\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"westeurope\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSecret, err := keyvault.NewSecret(ctx, \"example\", \u0026keyvault.SecretArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tValue: pulumi.String(\"example-secret\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkedServiceKeyVault, err := datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewCredentialServicePrincipal(ctx, \"example\", \u0026datafactory.CredentialServicePrincipalArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDescription: pulumi.String(\"example description\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tServicePrincipalId: pulumi.String(current.ClientId),\n\t\t\tServicePrincipalKey: \u0026datafactory.CredentialServicePrincipalServicePrincipalKeyArgs{\n\t\t\t\tLinkedServiceName: exampleLinkedServiceKeyVault.Name,\n\t\t\t\tSecretName: exampleSecret.Name,\n\t\t\t\tSecretVersion: exampleSecret.Version,\n\t\t\t},\n\t\t\tAnnotations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"1\"),\n\t\t\t\tpulumi.String(\"2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Secret;\nimport com.pulumi.azure.keyvault.SecretArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport com.pulumi.azure.datafactory.CredentialServicePrincipal;\nimport com.pulumi.azure.datafactory.CredentialServicePrincipalArgs;\nimport com.pulumi.azure.datafactory.inputs.CredentialServicePrincipalServicePrincipalKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"westeurope\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build())\n .build());\n\n var exampleSecret = new Secret(\"exampleSecret\", SecretArgs.builder()\n .name(\"example\")\n .value(\"example-secret\")\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleCredentialServicePrincipal = new CredentialServicePrincipal(\"exampleCredentialServicePrincipal\", CredentialServicePrincipalArgs.builder()\n .name(\"example\")\n .description(\"example description\")\n .dataFactoryId(exampleFactory.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .servicePrincipalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .servicePrincipalKey(CredentialServicePrincipalServicePrincipalKeyArgs.builder()\n .linkedServiceName(exampleLinkedServiceKeyVault.name())\n .secretName(exampleSecret.name())\n .secretVersion(exampleSecret.version())\n .build())\n .annotations( \n \"1\",\n \"2\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: westeurope\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n exampleSecret:\n type: azure:keyvault:Secret\n name: example\n properties:\n name: example\n value: example-secret\n keyVaultId: ${exampleKeyVault.id}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\n exampleCredentialServicePrincipal:\n type: azure:datafactory:CredentialServicePrincipal\n name: example\n properties:\n name: example\n description: example description\n dataFactoryId: ${exampleFactory.id}\n tenantId: ${current.tenantId}\n servicePrincipalId: ${current.clientId}\n servicePrincipalKey:\n linkedServiceName: ${exampleLinkedServiceKeyVault.name}\n secretName: ${exampleSecret.name}\n secretVersion: ${exampleSecret.version}\n annotations:\n - '1'\n - '2'\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Credentials can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/credentialServicePrincipal:CredentialServicePrincipal example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example-resources/providers/Microsoft.DataFactory/factories/example/credentials/credential1\n```\n\n", + "description": "Manage a Data Factory Service Principal credential resource. These resources are used by Data Factory to access data sources.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"westeurope\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }],\n});\nconst exampleSecret = new azure.keyvault.Secret(\"example\", {\n name: \"example\",\n value: \"example-secret\",\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleCredentialServicePrincipal = new azure.datafactory.CredentialServicePrincipal(\"example\", {\n name: \"example\",\n description: \"example description\",\n dataFactoryId: exampleFactory.id,\n tenantId: current.then(current =\u003e current.tenantId),\n servicePrincipalId: current.then(current =\u003e current.clientId),\n servicePrincipalKey: {\n linkedServiceName: exampleLinkedServiceKeyVault.name,\n secretName: exampleSecret.name,\n secretVersion: exampleSecret.version,\n },\n annotations: [\n \"1\",\n \"2\",\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"westeurope\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }])\nexample_secret = azure.keyvault.Secret(\"example\",\n name=\"example\",\n value=\"example-secret\",\n key_vault_id=example_key_vault.id)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\nexample_credential_service_principal = azure.datafactory.CredentialServicePrincipal(\"example\",\n name=\"example\",\n description=\"example description\",\n data_factory_id=example_factory.id,\n tenant_id=current.tenant_id,\n service_principal_id=current.client_id,\n service_principal_key={\n \"linked_service_name\": example_linked_service_key_vault.name,\n \"secret_name\": example_secret.name,\n \"secret_version\": example_secret.version,\n },\n annotations=[\n \"1\",\n \"2\",\n ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"westeurope\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n },\n });\n\n var exampleSecret = new Azure.KeyVault.Secret(\"example\", new()\n {\n Name = \"example\",\n Value = \"example-secret\",\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleCredentialServicePrincipal = new Azure.DataFactory.CredentialServicePrincipal(\"example\", new()\n {\n Name = \"example\",\n Description = \"example description\",\n DataFactoryId = exampleFactory.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ServicePrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n ServicePrincipalKey = new Azure.DataFactory.Inputs.CredentialServicePrincipalServicePrincipalKeyArgs\n {\n LinkedServiceName = exampleLinkedServiceKeyVault.Name,\n SecretName = exampleSecret.Name,\n SecretVersion = exampleSecret.Version,\n },\n Annotations = new[]\n {\n \"1\",\n \"2\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"westeurope\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSecret, err := keyvault.NewSecret(ctx, \"example\", \u0026keyvault.SecretArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tValue: pulumi.String(\"example-secret\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkedServiceKeyVault, err := datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewCredentialServicePrincipal(ctx, \"example\", \u0026datafactory.CredentialServicePrincipalArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDescription: pulumi.String(\"example description\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tServicePrincipalId: pulumi.String(current.ClientId),\n\t\t\tServicePrincipalKey: \u0026datafactory.CredentialServicePrincipalServicePrincipalKeyArgs{\n\t\t\t\tLinkedServiceName: exampleLinkedServiceKeyVault.Name,\n\t\t\t\tSecretName: exampleSecret.Name,\n\t\t\t\tSecretVersion: exampleSecret.Version,\n\t\t\t},\n\t\t\tAnnotations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"1\"),\n\t\t\t\tpulumi.String(\"2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Secret;\nimport com.pulumi.azure.keyvault.SecretArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport com.pulumi.azure.datafactory.CredentialServicePrincipal;\nimport com.pulumi.azure.datafactory.CredentialServicePrincipalArgs;\nimport com.pulumi.azure.datafactory.inputs.CredentialServicePrincipalServicePrincipalKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"westeurope\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build())\n .build());\n\n var exampleSecret = new Secret(\"exampleSecret\", SecretArgs.builder()\n .name(\"example\")\n .value(\"example-secret\")\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleCredentialServicePrincipal = new CredentialServicePrincipal(\"exampleCredentialServicePrincipal\", CredentialServicePrincipalArgs.builder()\n .name(\"example\")\n .description(\"example description\")\n .dataFactoryId(exampleFactory.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .servicePrincipalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .servicePrincipalKey(CredentialServicePrincipalServicePrincipalKeyArgs.builder()\n .linkedServiceName(exampleLinkedServiceKeyVault.name())\n .secretName(exampleSecret.name())\n .secretVersion(exampleSecret.version())\n .build())\n .annotations( \n \"1\",\n \"2\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: westeurope\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n exampleSecret:\n type: azure:keyvault:Secret\n name: example\n properties:\n name: example\n value: example-secret\n keyVaultId: ${exampleKeyVault.id}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\n exampleCredentialServicePrincipal:\n type: azure:datafactory:CredentialServicePrincipal\n name: example\n properties:\n name: example\n description: example description\n dataFactoryId: ${exampleFactory.id}\n tenantId: ${current.tenantId}\n servicePrincipalId: ${current.clientId}\n servicePrincipalKey:\n linkedServiceName: ${exampleLinkedServiceKeyVault.name}\n secretName: ${exampleSecret.name}\n secretVersion: ${exampleSecret.version}\n annotations:\n - '1'\n - '2'\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Credentials can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/credentialServicePrincipal:CredentialServicePrincipal example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example-resources/providers/Microsoft.DataFactory/factories/example/credentials/credential1\n```\n\n", "properties": { "annotations": { "type": "array", @@ -168916,7 +168916,7 @@ } }, "azure:datafactory/linkedServiceDataLakeStorageGen2:LinkedServiceDataLakeStorageGen2": { - "description": "Manages a Linked Service (connection) between Data Lake Storage Gen2 and Azure Data Factory.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleLinkedServiceDataLakeStorageGen2 = new azure.datafactory.LinkedServiceDataLakeStorageGen2(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n servicePrincipalId: current.then(current =\u003e current.clientId),\n servicePrincipalKey: \"exampleKey\",\n tenant: \"11111111-1111-1111-1111-111111111111\",\n url: \"https://datalakestoragegen2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\ncurrent = azure.core.get_client_config()\nexample_linked_service_data_lake_storage_gen2 = azure.datafactory.LinkedServiceDataLakeStorageGen2(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n service_principal_id=current.client_id,\n service_principal_key=\"exampleKey\",\n tenant=\"11111111-1111-1111-1111-111111111111\",\n url=\"https://datalakestoragegen2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleLinkedServiceDataLakeStorageGen2 = new Azure.DataFactory.LinkedServiceDataLakeStorageGen2(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ServicePrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n ServicePrincipalKey = \"exampleKey\",\n Tenant = \"11111111-1111-1111-1111-111111111111\",\n Url = \"https://datalakestoragegen2\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceDataLakeStorageGen2(ctx, \"example\", \u0026datafactory.LinkedServiceDataLakeStorageGen2Args{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tServicePrincipalId: pulumi.String(current.ClientId),\n\t\t\tServicePrincipalKey: pulumi.String(\"exampleKey\"),\n\t\t\tTenant: pulumi.String(\"11111111-1111-1111-1111-111111111111\"),\n\t\t\tUrl: pulumi.String(\"https://datalakestoragegen2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.datafactory.LinkedServiceDataLakeStorageGen2;\nimport com.pulumi.azure.datafactory.LinkedServiceDataLakeStorageGen2Args;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleLinkedServiceDataLakeStorageGen2 = new LinkedServiceDataLakeStorageGen2(\"exampleLinkedServiceDataLakeStorageGen2\", LinkedServiceDataLakeStorageGen2Args.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .servicePrincipalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .servicePrincipalKey(\"exampleKey\")\n .tenant(\"11111111-1111-1111-1111-111111111111\")\n .url(\"https://datalakestoragegen2\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceDataLakeStorageGen2:\n type: azure:datafactory:LinkedServiceDataLakeStorageGen2\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n servicePrincipalId: ${current.clientId}\n servicePrincipalKey: exampleKey\n tenant: 11111111-1111-1111-1111-111111111111\n url: https://datalakestoragegen2\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Data Lake Storage Gen2 Linked Services can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceDataLakeStorageGen2:LinkedServiceDataLakeStorageGen2 example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", + "description": "Manages a Linked Service (connection) between Data Lake Storage Gen2 and Azure Data Factory.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleLinkedServiceDataLakeStorageGen2 = new azure.datafactory.LinkedServiceDataLakeStorageGen2(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n servicePrincipalId: current.then(current =\u003e current.clientId),\n servicePrincipalKey: \"exampleKey\",\n tenant: \"11111111-1111-1111-1111-111111111111\",\n url: \"https://datalakestoragegen2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\ncurrent = azure.core.get_client_config()\nexample_linked_service_data_lake_storage_gen2 = azure.datafactory.LinkedServiceDataLakeStorageGen2(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n service_principal_id=current.client_id,\n service_principal_key=\"exampleKey\",\n tenant=\"11111111-1111-1111-1111-111111111111\",\n url=\"https://datalakestoragegen2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleLinkedServiceDataLakeStorageGen2 = new Azure.DataFactory.LinkedServiceDataLakeStorageGen2(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ServicePrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n ServicePrincipalKey = \"exampleKey\",\n Tenant = \"11111111-1111-1111-1111-111111111111\",\n Url = \"https://datalakestoragegen2\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceDataLakeStorageGen2(ctx, \"example\", \u0026datafactory.LinkedServiceDataLakeStorageGen2Args{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tServicePrincipalId: pulumi.String(current.ClientId),\n\t\t\tServicePrincipalKey: pulumi.String(\"exampleKey\"),\n\t\t\tTenant: pulumi.String(\"11111111-1111-1111-1111-111111111111\"),\n\t\t\tUrl: pulumi.String(\"https://datalakestoragegen2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.datafactory.LinkedServiceDataLakeStorageGen2;\nimport com.pulumi.azure.datafactory.LinkedServiceDataLakeStorageGen2Args;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleLinkedServiceDataLakeStorageGen2 = new LinkedServiceDataLakeStorageGen2(\"exampleLinkedServiceDataLakeStorageGen2\", LinkedServiceDataLakeStorageGen2Args.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .servicePrincipalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .servicePrincipalKey(\"exampleKey\")\n .tenant(\"11111111-1111-1111-1111-111111111111\")\n .url(\"https://datalakestoragegen2\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceDataLakeStorageGen2:\n type: azure:datafactory:LinkedServiceDataLakeStorageGen2\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n servicePrincipalId: ${current.clientId}\n servicePrincipalKey: exampleKey\n tenant: 11111111-1111-1111-1111-111111111111\n url: https://datalakestoragegen2\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Data Lake Storage Gen2 Linked Services can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceDataLakeStorageGen2:LinkedServiceDataLakeStorageGen2 example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", "properties": { "additionalProperties": { "type": "object", @@ -169125,7 +169125,7 @@ } }, "azure:datafactory/linkedServiceKeyVault:LinkedServiceKeyVault": { - "description": "Manages a Linked Service (connection) between Key Vault and Azure Data Factory.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Key Vault Linked Service's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceKeyVault:LinkedServiceKeyVault example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", + "description": "Manages a Linked Service (connection) between Key Vault and Azure Data Factory.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Key Vault Linked Service's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceKeyVault:LinkedServiceKeyVault example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", "properties": { "additionalProperties": { "type": "object", @@ -170340,7 +170340,7 @@ } }, "azure:datafactory/linkedServiceSnowflake:LinkedServiceSnowflake": { - "description": "Manages a Linked Service (connection) between Snowflake and Azure Data Factory.\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceSnowflake = new azure.datafactory.LinkedServiceSnowflake(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_snowflake = azure.datafactory.LinkedServiceSnowflake(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceSnowflake = new Azure.DataFactory.LinkedServiceSnowflake(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSnowflake(ctx, \"example\", \u0026datafactory.LinkedServiceSnowflakeArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSnowflake;\nimport com.pulumi.azure.datafactory.LinkedServiceSnowflakeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceSnowflake = new LinkedServiceSnowflake(\"exampleLinkedServiceSnowflake\", LinkedServiceSnowflakeArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceSnowflake:\n type: azure:datafactory:LinkedServiceSnowflake\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Password In Key Vault\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"kvlink\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleLinkedServiceSnowflake = new azure.datafactory.LinkedServiceSnowflake(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n keyVaultPassword: {\n linkedServiceName: exampleLinkedServiceKeyVault.name,\n secretName: \"secret\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"kvlink\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\nexample_linked_service_snowflake = azure.datafactory.LinkedServiceSnowflake(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n key_vault_password={\n \"linked_service_name\": example_linked_service_key_vault.name,\n \"secret_name\": \"secret\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"kvlink\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleLinkedServiceSnowflake = new Azure.DataFactory.LinkedServiceSnowflake(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n KeyVaultPassword = new Azure.DataFactory.Inputs.LinkedServiceSnowflakeKeyVaultPasswordArgs\n {\n LinkedServiceName = exampleLinkedServiceKeyVault.Name,\n SecretName = \"secret\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkedServiceKeyVault, err := datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"kvlink\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSnowflake(ctx, \"example\", \u0026datafactory.LinkedServiceSnowflakeArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\"),\n\t\t\tKeyVaultPassword: \u0026datafactory.LinkedServiceSnowflakeKeyVaultPasswordArgs{\n\t\t\t\tLinkedServiceName: exampleLinkedServiceKeyVault.Name,\n\t\t\t\tSecretName: pulumi.String(\"secret\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSnowflake;\nimport com.pulumi.azure.datafactory.LinkedServiceSnowflakeArgs;\nimport com.pulumi.azure.datafactory.inputs.LinkedServiceSnowflakeKeyVaultPasswordArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"kvlink\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleLinkedServiceSnowflake = new LinkedServiceSnowflake(\"exampleLinkedServiceSnowflake\", LinkedServiceSnowflakeArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\")\n .keyVaultPassword(LinkedServiceSnowflakeKeyVaultPasswordArgs.builder()\n .linkedServiceName(exampleLinkedServiceKeyVault.name())\n .secretName(\"secret\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: kvlink\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\n exampleLinkedServiceSnowflake:\n type: azure:datafactory:LinkedServiceSnowflake\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\n keyVaultPassword:\n linkedServiceName: ${exampleLinkedServiceKeyVault.name}\n secretName: secret\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Snowflake Linked Service's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceSnowflake:LinkedServiceSnowflake example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", + "description": "Manages a Linked Service (connection) between Snowflake and Azure Data Factory.\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceSnowflake = new azure.datafactory.LinkedServiceSnowflake(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_snowflake = azure.datafactory.LinkedServiceSnowflake(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceSnowflake = new Azure.DataFactory.LinkedServiceSnowflake(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSnowflake(ctx, \"example\", \u0026datafactory.LinkedServiceSnowflakeArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSnowflake;\nimport com.pulumi.azure.datafactory.LinkedServiceSnowflakeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceSnowflake = new LinkedServiceSnowflake(\"exampleLinkedServiceSnowflake\", LinkedServiceSnowflakeArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceSnowflake:\n type: azure:datafactory:LinkedServiceSnowflake\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Password In Key Vault\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"kvlink\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleLinkedServiceSnowflake = new azure.datafactory.LinkedServiceSnowflake(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n keyVaultPassword: {\n linkedServiceName: exampleLinkedServiceKeyVault.name,\n secretName: \"secret\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"kvlink\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\nexample_linked_service_snowflake = azure.datafactory.LinkedServiceSnowflake(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n key_vault_password={\n \"linked_service_name\": example_linked_service_key_vault.name,\n \"secret_name\": \"secret\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"kvlink\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleLinkedServiceSnowflake = new Azure.DataFactory.LinkedServiceSnowflake(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\",\n KeyVaultPassword = new Azure.DataFactory.Inputs.LinkedServiceSnowflakeKeyVaultPasswordArgs\n {\n LinkedServiceName = exampleLinkedServiceKeyVault.Name,\n SecretName = \"secret\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkedServiceKeyVault, err := datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"kvlink\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSnowflake(ctx, \"example\", \u0026datafactory.LinkedServiceSnowflakeArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\"),\n\t\t\tKeyVaultPassword: \u0026datafactory.LinkedServiceSnowflakeKeyVaultPasswordArgs{\n\t\t\t\tLinkedServiceName: exampleLinkedServiceKeyVault.Name,\n\t\t\t\tSecretName: pulumi.String(\"secret\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSnowflake;\nimport com.pulumi.azure.datafactory.LinkedServiceSnowflakeArgs;\nimport com.pulumi.azure.datafactory.inputs.LinkedServiceSnowflakeKeyVaultPasswordArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"kvlink\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleLinkedServiceSnowflake = new LinkedServiceSnowflake(\"exampleLinkedServiceSnowflake\", LinkedServiceSnowflakeArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\")\n .keyVaultPassword(LinkedServiceSnowflakeKeyVaultPasswordArgs.builder()\n .linkedServiceName(exampleLinkedServiceKeyVault.name())\n .secretName(\"secret\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: kvlink\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\n exampleLinkedServiceSnowflake:\n type: azure:datafactory:LinkedServiceSnowflake\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: jdbc:snowflake://account.region.snowflakecomputing.com/?user=user\u0026db=db\u0026warehouse=wh\n keyVaultPassword:\n linkedServiceName: ${exampleLinkedServiceKeyVault.name}\n secretName: secret\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Snowflake Linked Service's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceSnowflake:LinkedServiceSnowflake example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", "properties": { "additionalProperties": { "type": "object", @@ -170501,7 +170501,7 @@ } }, "azure:datafactory/linkedServiceSqlServer:LinkedServiceSqlServer": { - "description": "Manages a Linked Service (connection) between a SQL Server and Azure Data Factory.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceSqlServer = new azure.datafactory.LinkedServiceSqlServer(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_sql_server = azure.datafactory.LinkedServiceSqlServer(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceSqlServer = new Azure.DataFactory.LinkedServiceSqlServer(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSqlServer(ctx, \"example\", \u0026datafactory.LinkedServiceSqlServerArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSqlServer;\nimport com.pulumi.azure.datafactory.LinkedServiceSqlServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceSqlServer = new LinkedServiceSqlServer(\"exampleLinkedServiceSqlServer\", LinkedServiceSqlServerArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceSqlServer:\n type: azure:datafactory:LinkedServiceSqlServer\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Password In Key Vault\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"kvlink\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleLinkedServiceSqlServer = new azure.datafactory.LinkedServiceSqlServer(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n keyVaultPassword: {\n linkedServiceName: exampleLinkedServiceKeyVault.name,\n secretName: \"secret\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"kvlink\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\nexample_linked_service_sql_server = azure.datafactory.LinkedServiceSqlServer(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n key_vault_password={\n \"linked_service_name\": example_linked_service_key_vault.name,\n \"secret_name\": \"secret\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"kvlink\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleLinkedServiceSqlServer = new Azure.DataFactory.LinkedServiceSqlServer(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n KeyVaultPassword = new Azure.DataFactory.Inputs.LinkedServiceSqlServerKeyVaultPasswordArgs\n {\n LinkedServiceName = exampleLinkedServiceKeyVault.Name,\n SecretName = \"secret\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkedServiceKeyVault, err := datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"kvlink\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSqlServer(ctx, \"example\", \u0026datafactory.LinkedServiceSqlServerArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\"),\n\t\t\tKeyVaultPassword: \u0026datafactory.LinkedServiceSqlServerKeyVaultPasswordArgs{\n\t\t\t\tLinkedServiceName: exampleLinkedServiceKeyVault.Name,\n\t\t\t\tSecretName: pulumi.String(\"secret\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSqlServer;\nimport com.pulumi.azure.datafactory.LinkedServiceSqlServerArgs;\nimport com.pulumi.azure.datafactory.inputs.LinkedServiceSqlServerKeyVaultPasswordArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"kvlink\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleLinkedServiceSqlServer = new LinkedServiceSqlServer(\"exampleLinkedServiceSqlServer\", LinkedServiceSqlServerArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\")\n .keyVaultPassword(LinkedServiceSqlServerKeyVaultPasswordArgs.builder()\n .linkedServiceName(exampleLinkedServiceKeyVault.name())\n .secretName(\"secret\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: kvlink\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\n exampleLinkedServiceSqlServer:\n type: azure:datafactory:LinkedServiceSqlServer\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\n keyVaultPassword:\n linkedServiceName: ${exampleLinkedServiceKeyVault.name}\n secretName: secret\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory SQL Server Linked Service's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceSqlServer:LinkedServiceSqlServer example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", + "description": "Manages a Linked Service (connection) between a SQL Server and Azure Data Factory.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceSqlServer = new azure.datafactory.LinkedServiceSqlServer(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_sql_server = azure.datafactory.LinkedServiceSqlServer(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceSqlServer = new Azure.DataFactory.LinkedServiceSqlServer(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSqlServer(ctx, \"example\", \u0026datafactory.LinkedServiceSqlServerArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSqlServer;\nimport com.pulumi.azure.datafactory.LinkedServiceSqlServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceSqlServer = new LinkedServiceSqlServer(\"exampleLinkedServiceSqlServer\", LinkedServiceSqlServerArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceSqlServer:\n type: azure:datafactory:LinkedServiceSqlServer\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Password In Key Vault\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"kvlink\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleLinkedServiceSqlServer = new azure.datafactory.LinkedServiceSqlServer(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n keyVaultPassword: {\n linkedServiceName: exampleLinkedServiceKeyVault.name,\n secretName: \"secret\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"kvlink\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\nexample_linked_service_sql_server = azure.datafactory.LinkedServiceSqlServer(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n key_vault_password={\n \"linked_service_name\": example_linked_service_key_vault.name,\n \"secret_name\": \"secret\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"kvlink\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleLinkedServiceSqlServer = new Azure.DataFactory.LinkedServiceSqlServer(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n KeyVaultPassword = new Azure.DataFactory.Inputs.LinkedServiceSqlServerKeyVaultPasswordArgs\n {\n LinkedServiceName = exampleLinkedServiceKeyVault.Name,\n SecretName = \"secret\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkedServiceKeyVault, err := datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"kvlink\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSqlServer(ctx, \"example\", \u0026datafactory.LinkedServiceSqlServerArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\"),\n\t\t\tKeyVaultPassword: \u0026datafactory.LinkedServiceSqlServerKeyVaultPasswordArgs{\n\t\t\t\tLinkedServiceName: exampleLinkedServiceKeyVault.Name,\n\t\t\t\tSecretName: pulumi.String(\"secret\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSqlServer;\nimport com.pulumi.azure.datafactory.LinkedServiceSqlServerArgs;\nimport com.pulumi.azure.datafactory.inputs.LinkedServiceSqlServerKeyVaultPasswordArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"kvlink\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleLinkedServiceSqlServer = new LinkedServiceSqlServer(\"exampleLinkedServiceSqlServer\", LinkedServiceSqlServerArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\")\n .keyVaultPassword(LinkedServiceSqlServerKeyVaultPasswordArgs.builder()\n .linkedServiceName(exampleLinkedServiceKeyVault.name())\n .secretName(\"secret\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: kvlink\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\n exampleLinkedServiceSqlServer:\n type: azure:datafactory:LinkedServiceSqlServer\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\n keyVaultPassword:\n linkedServiceName: ${exampleLinkedServiceKeyVault.name}\n secretName: secret\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory SQL Server Linked Service's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceSqlServer:LinkedServiceSqlServer example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", "properties": { "additionalProperties": { "type": "object", @@ -170684,7 +170684,7 @@ } }, "azure:datafactory/linkedServiceSynapse:LinkedServiceSynapse": { - "description": "Manages a Linked Service (connection) between Synapse and Azure Data Factory.\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceSynapse = new azure.datafactory.LinkedServiceSynapse(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_synapse = azure.datafactory.LinkedServiceSynapse(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceSynapse = new Azure.DataFactory.LinkedServiceSynapse(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSynapse(ctx, \"example\", \u0026datafactory.LinkedServiceSynapseArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSynapse;\nimport com.pulumi.azure.datafactory.LinkedServiceSynapseArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceSynapse = new LinkedServiceSynapse(\"exampleLinkedServiceSynapse\", LinkedServiceSynapseArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceSynapse:\n type: azure:datafactory:LinkedServiceSynapse\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Password In Key Vault\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"kvlink\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleLinkedServiceSynapse = new azure.datafactory.LinkedServiceSynapse(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n keyVaultPassword: {\n linkedServiceName: exampleLinkedServiceKeyVault.name,\n secretName: \"secret\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"kvlink\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\nexample_linked_service_synapse = azure.datafactory.LinkedServiceSynapse(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n key_vault_password={\n \"linked_service_name\": example_linked_service_key_vault.name,\n \"secret_name\": \"secret\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"kvlink\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleLinkedServiceSynapse = new Azure.DataFactory.LinkedServiceSynapse(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n KeyVaultPassword = new Azure.DataFactory.Inputs.LinkedServiceSynapseKeyVaultPasswordArgs\n {\n LinkedServiceName = exampleLinkedServiceKeyVault.Name,\n SecretName = \"secret\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkedServiceKeyVault, err := datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"kvlink\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSynapse(ctx, \"example\", \u0026datafactory.LinkedServiceSynapseArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\"),\n\t\t\tKeyVaultPassword: \u0026datafactory.LinkedServiceSynapseKeyVaultPasswordArgs{\n\t\t\t\tLinkedServiceName: exampleLinkedServiceKeyVault.Name,\n\t\t\t\tSecretName: pulumi.String(\"secret\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSynapse;\nimport com.pulumi.azure.datafactory.LinkedServiceSynapseArgs;\nimport com.pulumi.azure.datafactory.inputs.LinkedServiceSynapseKeyVaultPasswordArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"kvlink\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleLinkedServiceSynapse = new LinkedServiceSynapse(\"exampleLinkedServiceSynapse\", LinkedServiceSynapseArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\")\n .keyVaultPassword(LinkedServiceSynapseKeyVaultPasswordArgs.builder()\n .linkedServiceName(exampleLinkedServiceKeyVault.name())\n .secretName(\"secret\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: kvlink\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\n exampleLinkedServiceSynapse:\n type: azure:datafactory:LinkedServiceSynapse\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\n keyVaultPassword:\n linkedServiceName: ${exampleLinkedServiceKeyVault.name}\n secretName: secret\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Synapse Linked Service's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceSynapse:LinkedServiceSynapse example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", + "description": "Manages a Linked Service (connection) between Synapse and Azure Data Factory.\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceSynapse = new azure.datafactory.LinkedServiceSynapse(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_synapse = azure.datafactory.LinkedServiceSynapse(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceSynapse = new Azure.DataFactory.LinkedServiceSynapse(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSynapse(ctx, \"example\", \u0026datafactory.LinkedServiceSynapseArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSynapse;\nimport com.pulumi.azure.datafactory.LinkedServiceSynapseArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceSynapse = new LinkedServiceSynapse(\"exampleLinkedServiceSynapse\", LinkedServiceSynapseArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceSynapse:\n type: azure:datafactory:LinkedServiceSynapse\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;Password=test\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Password In Key Vault\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n});\nconst exampleFactory = new azure.datafactory.Factory(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleLinkedServiceKeyVault = new azure.datafactory.LinkedServiceKeyVault(\"example\", {\n name: \"kvlink\",\n dataFactoryId: exampleFactory.id,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleLinkedServiceSynapse = new azure.datafactory.LinkedServiceSynapse(\"example\", {\n name: \"example\",\n dataFactoryId: exampleFactory.id,\n connectionString: \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n keyVaultPassword: {\n linkedServiceName: exampleLinkedServiceKeyVault.name,\n secretName: \"secret\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\")\nexample_factory = azure.datafactory.Factory(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_linked_service_key_vault = azure.datafactory.LinkedServiceKeyVault(\"example\",\n name=\"kvlink\",\n data_factory_id=example_factory.id,\n key_vault_id=example_key_vault.id)\nexample_linked_service_synapse = azure.datafactory.LinkedServiceSynapse(\"example\",\n name=\"example\",\n data_factory_id=example_factory.id,\n connection_string=\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n key_vault_password={\n \"linked_service_name\": example_linked_service_key_vault.name,\n \"secret_name\": \"secret\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n });\n\n var exampleFactory = new Azure.DataFactory.Factory(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleLinkedServiceKeyVault = new Azure.DataFactory.LinkedServiceKeyVault(\"example\", new()\n {\n Name = \"kvlink\",\n DataFactoryId = exampleFactory.Id,\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleLinkedServiceSynapse = new Azure.DataFactory.LinkedServiceSynapse(\"example\", new()\n {\n Name = \"example\",\n DataFactoryId = exampleFactory.Id,\n ConnectionString = \"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\",\n KeyVaultPassword = new Azure.DataFactory.Inputs.LinkedServiceSynapseKeyVaultPasswordArgs\n {\n LinkedServiceName = exampleLinkedServiceKeyVault.Name,\n SecretName = \"secret\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/datafactory\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFactory, err := datafactory.NewFactory(ctx, \"example\", \u0026datafactory.FactoryArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLinkedServiceKeyVault, err := datafactory.NewLinkedServiceKeyVault(ctx, \"example\", \u0026datafactory.LinkedServiceKeyVaultArgs{\n\t\t\tName: pulumi.String(\"kvlink\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = datafactory.NewLinkedServiceSynapse(ctx, \"example\", \u0026datafactory.LinkedServiceSynapseArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tDataFactoryId: exampleFactory.ID(),\n\t\t\tConnectionString: pulumi.String(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\"),\n\t\t\tKeyVaultPassword: \u0026datafactory.LinkedServiceSynapseKeyVaultPasswordArgs{\n\t\t\t\tLinkedServiceName: exampleLinkedServiceKeyVault.Name,\n\t\t\t\tSecretName: pulumi.String(\"secret\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.datafactory.Factory;\nimport com.pulumi.azure.datafactory.FactoryArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVault;\nimport com.pulumi.azure.datafactory.LinkedServiceKeyVaultArgs;\nimport com.pulumi.azure.datafactory.LinkedServiceSynapse;\nimport com.pulumi.azure.datafactory.LinkedServiceSynapseArgs;\nimport com.pulumi.azure.datafactory.inputs.LinkedServiceSynapseKeyVaultPasswordArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .build());\n\n var exampleFactory = new Factory(\"exampleFactory\", FactoryArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleLinkedServiceKeyVault = new LinkedServiceKeyVault(\"exampleLinkedServiceKeyVault\", LinkedServiceKeyVaultArgs.builder()\n .name(\"kvlink\")\n .dataFactoryId(exampleFactory.id())\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleLinkedServiceSynapse = new LinkedServiceSynapse(\"exampleLinkedServiceSynapse\", LinkedServiceSynapseArgs.builder()\n .name(\"example\")\n .dataFactoryId(exampleFactory.id())\n .connectionString(\"Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\")\n .keyVaultPassword(LinkedServiceSynapseKeyVaultPasswordArgs.builder()\n .linkedServiceName(exampleLinkedServiceKeyVault.name())\n .secretName(\"secret\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n exampleFactory:\n type: azure:datafactory:Factory\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleLinkedServiceKeyVault:\n type: azure:datafactory:LinkedServiceKeyVault\n name: example\n properties:\n name: kvlink\n dataFactoryId: ${exampleFactory.id}\n keyVaultId: ${exampleKeyVault.id}\n exampleLinkedServiceSynapse:\n type: azure:datafactory:LinkedServiceSynapse\n name: example\n properties:\n name: example\n dataFactoryId: ${exampleFactory.id}\n connectionString: Integrated Security=False;Data Source=test;Initial Catalog=test;User ID=test;\n keyVaultPassword:\n linkedServiceName: ${exampleLinkedServiceKeyVault.name}\n secretName: secret\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Factory Synapse Linked Service's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:datafactory/linkedServiceSynapse:LinkedServiceSynapse example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example/providers/Microsoft.DataFactory/factories/example/linkedservices/example\n```\n\n", "properties": { "additionalProperties": { "type": "object", @@ -172411,7 +172411,7 @@ } }, "azure:dataprotection/backupInstanceKubernetesCluster:BackupInstanceKubernetesCluster": { - "description": "Manages a Backup Instance to back up a Kubernetes Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst snap = new azure.core.ResourceGroup(\"snap\", {\n name: \"example-snap\",\n location: \"West Europe\",\n});\nconst exampleBackupVault = new azure.dataprotection.BackupVault(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n datastoreType: \"VaultStore\",\n redundancy: \"LocallyRedundant\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKubernetesCluster = new azure.containerservice.KubernetesCluster(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n dnsPrefix: \"dns\",\n defaultNodePool: {\n name: \"default\",\n nodeCount: 1,\n vmSize: \"Standard_DS2_v2\",\n hostEncryptionEnabled: true,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst aksClusterTrustedAccess = new azure.containerservice.ClusterTrustedAccessRoleBinding(\"aks_cluster_trusted_access\", {\n kubernetesClusterId: exampleKubernetesCluster.id,\n name: \"example\",\n roles: [\"Microsoft.DataProtection/backupVaults/backup-operator\"],\n sourceResourceId: exampleBackupVault.id,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleContainer = new azure.storage.Container(\"example\", {\n name: \"example\",\n storageAccountName: exampleAccount.name,\n containerAccessType: \"private\",\n});\nconst exampleKubernetesClusterExtension = new azure.containerservice.KubernetesClusterExtension(\"example\", {\n name: \"example\",\n clusterId: exampleKubernetesCluster.id,\n extensionType: \"Microsoft.DataProtection.Kubernetes\",\n releaseTrain: \"stable\",\n releaseNamespace: \"dataprotection-microsoft\",\n configurationSettings: {\n \"configuration.backupStorageLocation.bucket\": exampleContainer.name,\n \"configuration.backupStorageLocation.config.resourceGroup\": example.name,\n \"configuration.backupStorageLocation.config.storageAccount\": exampleAccount.name,\n \"configuration.backupStorageLocation.config.subscriptionId\": current.then(current =\u003e current.subscriptionId),\n \"credentials.tenantId\": current.then(current =\u003e current.tenantId),\n },\n});\nconst testExtensionAndStorageAccountPermission = new azure.authorization.Assignment(\"test_extension_and_storage_account_permission\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Storage Account Contributor\",\n principalId: exampleKubernetesClusterExtension.aksAssignedIdentities.apply(aksAssignedIdentities =\u003e aksAssignedIdentities[0].principalId),\n});\nconst testVaultMsiReadOnCluster = new azure.authorization.Assignment(\"test_vault_msi_read_on_cluster\", {\n scope: exampleKubernetesCluster.id,\n roleDefinitionName: \"Reader\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testVaultMsiReadOnSnapRg = new azure.authorization.Assignment(\"test_vault_msi_read_on_snap_rg\", {\n scope: snap.id,\n roleDefinitionName: \"Reader\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testVaultMsiSnapshotContributorOnSnapRg = new azure.authorization.Assignment(\"test_vault_msi_snapshot_contributor_on_snap_rg\", {\n scope: snap.id,\n roleDefinitionName: \"Disk Snapshot Contributor\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testVaultDataOperatorOnSnapRg = new azure.authorization.Assignment(\"test_vault_data_operator_on_snap_rg\", {\n scope: snap.id,\n roleDefinitionName: \"Data Operator for Managed Disks\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testVaultDataContributorOnStorage = new azure.authorization.Assignment(\"test_vault_data_contributor_on_storage\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Storage Blob Data Contributor\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testClusterMsiContributorOnSnapRg = new azure.authorization.Assignment(\"test_cluster_msi_contributor_on_snap_rg\", {\n scope: snap.id,\n roleDefinitionName: \"Contributor\",\n principalId: exampleKubernetesCluster.identity.apply(identity =\u003e identity?.principalId),\n});\nconst exampleBackupPolicyKubernetesCluster = new azure.dataprotection.BackupPolicyKubernetesCluster(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n vaultName: exampleBackupVault.name,\n backupRepeatingTimeIntervals: [\"R/2023-05-23T02:30:00+00:00/P1W\"],\n retentionRules: [{\n name: \"Daily\",\n priority: 25,\n lifeCycles: [{\n duration: \"P84D\",\n dataStoreType: \"OperationalStore\",\n }],\n criteria: {\n daysOfWeeks: [\"Thursday\"],\n monthsOfYears: [\"November\"],\n weeksOfMonths: [\"First\"],\n scheduledBackupTimes: [\"2023-05-23T02:30:00Z\"],\n },\n }],\n defaultRetentionRule: {\n lifeCycles: [{\n duration: \"P14D\",\n dataStoreType: \"OperationalStore\",\n }],\n },\n});\nconst exampleBackupInstanceKubernetesCluster = new azure.dataprotection.BackupInstanceKubernetesCluster(\"example\", {\n name: \"example\",\n location: example.location,\n vaultId: exampleBackupVault.id,\n kubernetesClusterId: exampleKubernetesCluster.id,\n snapshotResourceGroupName: snap.name,\n backupPolicyId: exampleBackupPolicyKubernetesCluster.id,\n backupDatasourceParameters: {\n excludedNamespaces: [\"test-excluded-namespaces\"],\n excludedResourceTypes: [\"exvolumesnapshotcontents.snapshot.storage.k8s.io\"],\n clusterScopedResourcesEnabled: true,\n includedNamespaces: [\"test-included-namespaces\"],\n includedResourceTypes: [\"involumesnapshotcontents.snapshot.storage.k8s.io\"],\n labelSelectors: [\"kubernetes.io/metadata.name:test\"],\n volumeSnapshotEnabled: true,\n },\n}, {\n dependsOn: [\n testExtensionAndStorageAccountPermission,\n testVaultMsiReadOnCluster,\n testVaultMsiReadOnSnapRg,\n testClusterMsiContributorOnSnapRg,\n testVaultMsiSnapshotContributorOnSnapRg,\n testVaultDataOperatorOnSnapRg,\n testVaultDataContributorOnStorage,\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\nsnap = azure.core.ResourceGroup(\"snap\",\n name=\"example-snap\",\n location=\"West Europe\")\nexample_backup_vault = azure.dataprotection.BackupVault(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n datastore_type=\"VaultStore\",\n redundancy=\"LocallyRedundant\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_kubernetes_cluster = azure.containerservice.KubernetesCluster(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n dns_prefix=\"dns\",\n default_node_pool={\n \"name\": \"default\",\n \"node_count\": 1,\n \"vm_size\": \"Standard_DS2_v2\",\n \"host_encryption_enabled\": True,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\naks_cluster_trusted_access = azure.containerservice.ClusterTrustedAccessRoleBinding(\"aks_cluster_trusted_access\",\n kubernetes_cluster_id=example_kubernetes_cluster.id,\n name=\"example\",\n roles=[\"Microsoft.DataProtection/backupVaults/backup-operator\"],\n source_resource_id=example_backup_vault.id)\nexample_account = azure.storage.Account(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_container = azure.storage.Container(\"example\",\n name=\"example\",\n storage_account_name=example_account.name,\n container_access_type=\"private\")\nexample_kubernetes_cluster_extension = azure.containerservice.KubernetesClusterExtension(\"example\",\n name=\"example\",\n cluster_id=example_kubernetes_cluster.id,\n extension_type=\"Microsoft.DataProtection.Kubernetes\",\n release_train=\"stable\",\n release_namespace=\"dataprotection-microsoft\",\n configuration_settings={\n \"configuration.backupStorageLocation.bucket\": example_container.name,\n \"configuration.backupStorageLocation.config.resourceGroup\": example.name,\n \"configuration.backupStorageLocation.config.storageAccount\": example_account.name,\n \"configuration.backupStorageLocation.config.subscriptionId\": current.subscription_id,\n \"credentials.tenantId\": current.tenant_id,\n })\ntest_extension_and_storage_account_permission = azure.authorization.Assignment(\"test_extension_and_storage_account_permission\",\n scope=example_account.id,\n role_definition_name=\"Storage Account Contributor\",\n principal_id=example_kubernetes_cluster_extension.aks_assigned_identities[0].principal_id)\ntest_vault_msi_read_on_cluster = azure.authorization.Assignment(\"test_vault_msi_read_on_cluster\",\n scope=example_kubernetes_cluster.id,\n role_definition_name=\"Reader\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_vault_msi_read_on_snap_rg = azure.authorization.Assignment(\"test_vault_msi_read_on_snap_rg\",\n scope=snap.id,\n role_definition_name=\"Reader\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_vault_msi_snapshot_contributor_on_snap_rg = azure.authorization.Assignment(\"test_vault_msi_snapshot_contributor_on_snap_rg\",\n scope=snap.id,\n role_definition_name=\"Disk Snapshot Contributor\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_vault_data_operator_on_snap_rg = azure.authorization.Assignment(\"test_vault_data_operator_on_snap_rg\",\n scope=snap.id,\n role_definition_name=\"Data Operator for Managed Disks\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_vault_data_contributor_on_storage = azure.authorization.Assignment(\"test_vault_data_contributor_on_storage\",\n scope=example_account.id,\n role_definition_name=\"Storage Blob Data Contributor\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_cluster_msi_contributor_on_snap_rg = azure.authorization.Assignment(\"test_cluster_msi_contributor_on_snap_rg\",\n scope=snap.id,\n role_definition_name=\"Contributor\",\n principal_id=example_kubernetes_cluster.identity.principal_id)\nexample_backup_policy_kubernetes_cluster = azure.dataprotection.BackupPolicyKubernetesCluster(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n vault_name=example_backup_vault.name,\n backup_repeating_time_intervals=[\"R/2023-05-23T02:30:00+00:00/P1W\"],\n retention_rules=[{\n \"name\": \"Daily\",\n \"priority\": 25,\n \"life_cycles\": [{\n \"duration\": \"P84D\",\n \"data_store_type\": \"OperationalStore\",\n }],\n \"criteria\": {\n \"days_of_weeks\": [\"Thursday\"],\n \"months_of_years\": [\"November\"],\n \"weeks_of_months\": [\"First\"],\n \"scheduled_backup_times\": [\"2023-05-23T02:30:00Z\"],\n },\n }],\n default_retention_rule={\n \"life_cycles\": [{\n \"duration\": \"P14D\",\n \"data_store_type\": \"OperationalStore\",\n }],\n })\nexample_backup_instance_kubernetes_cluster = azure.dataprotection.BackupInstanceKubernetesCluster(\"example\",\n name=\"example\",\n location=example.location,\n vault_id=example_backup_vault.id,\n kubernetes_cluster_id=example_kubernetes_cluster.id,\n snapshot_resource_group_name=snap.name,\n backup_policy_id=example_backup_policy_kubernetes_cluster.id,\n backup_datasource_parameters={\n \"excluded_namespaces\": [\"test-excluded-namespaces\"],\n \"excluded_resource_types\": [\"exvolumesnapshotcontents.snapshot.storage.k8s.io\"],\n \"cluster_scoped_resources_enabled\": True,\n \"included_namespaces\": [\"test-included-namespaces\"],\n \"included_resource_types\": [\"involumesnapshotcontents.snapshot.storage.k8s.io\"],\n \"label_selectors\": [\"kubernetes.io/metadata.name:test\"],\n \"volume_snapshot_enabled\": True,\n },\n opts = pulumi.ResourceOptions(depends_on=[\n test_extension_and_storage_account_permission,\n test_vault_msi_read_on_cluster,\n test_vault_msi_read_on_snap_rg,\n test_cluster_msi_contributor_on_snap_rg,\n test_vault_msi_snapshot_contributor_on_snap_rg,\n test_vault_data_operator_on_snap_rg,\n test_vault_data_contributor_on_storage,\n ]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var snap = new Azure.Core.ResourceGroup(\"snap\", new()\n {\n Name = \"example-snap\",\n Location = \"West Europe\",\n });\n\n var exampleBackupVault = new Azure.DataProtection.BackupVault(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n DatastoreType = \"VaultStore\",\n Redundancy = \"LocallyRedundant\",\n Identity = new Azure.DataProtection.Inputs.BackupVaultIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKubernetesCluster = new Azure.ContainerService.KubernetesCluster(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n DnsPrefix = \"dns\",\n DefaultNodePool = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolArgs\n {\n Name = \"default\",\n NodeCount = 1,\n VmSize = \"Standard_DS2_v2\",\n HostEncryptionEnabled = true,\n },\n Identity = new Azure.ContainerService.Inputs.KubernetesClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var aksClusterTrustedAccess = new Azure.ContainerService.ClusterTrustedAccessRoleBinding(\"aks_cluster_trusted_access\", new()\n {\n KubernetesClusterId = exampleKubernetesCluster.Id,\n Name = \"example\",\n Roles = new[]\n {\n \"Microsoft.DataProtection/backupVaults/backup-operator\",\n },\n SourceResourceId = exampleBackupVault.Id,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleContainer = new Azure.Storage.Container(\"example\", new()\n {\n Name = \"example\",\n StorageAccountName = exampleAccount.Name,\n ContainerAccessType = \"private\",\n });\n\n var exampleKubernetesClusterExtension = new Azure.ContainerService.KubernetesClusterExtension(\"example\", new()\n {\n Name = \"example\",\n ClusterId = exampleKubernetesCluster.Id,\n ExtensionType = \"Microsoft.DataProtection.Kubernetes\",\n ReleaseTrain = \"stable\",\n ReleaseNamespace = \"dataprotection-microsoft\",\n ConfigurationSettings = \n {\n { \"configuration.backupStorageLocation.bucket\", exampleContainer.Name },\n { \"configuration.backupStorageLocation.config.resourceGroup\", example.Name },\n { \"configuration.backupStorageLocation.config.storageAccount\", exampleAccount.Name },\n { \"configuration.backupStorageLocation.config.subscriptionId\", current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId) },\n { \"credentials.tenantId\", current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId) },\n },\n });\n\n var testExtensionAndStorageAccountPermission = new Azure.Authorization.Assignment(\"test_extension_and_storage_account_permission\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Storage Account Contributor\",\n PrincipalId = exampleKubernetesClusterExtension.AksAssignedIdentities.Apply(aksAssignedIdentities =\u003e aksAssignedIdentities[0].PrincipalId),\n });\n\n var testVaultMsiReadOnCluster = new Azure.Authorization.Assignment(\"test_vault_msi_read_on_cluster\", new()\n {\n Scope = exampleKubernetesCluster.Id,\n RoleDefinitionName = \"Reader\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testVaultMsiReadOnSnapRg = new Azure.Authorization.Assignment(\"test_vault_msi_read_on_snap_rg\", new()\n {\n Scope = snap.Id,\n RoleDefinitionName = \"Reader\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testVaultMsiSnapshotContributorOnSnapRg = new Azure.Authorization.Assignment(\"test_vault_msi_snapshot_contributor_on_snap_rg\", new()\n {\n Scope = snap.Id,\n RoleDefinitionName = \"Disk Snapshot Contributor\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testVaultDataOperatorOnSnapRg = new Azure.Authorization.Assignment(\"test_vault_data_operator_on_snap_rg\", new()\n {\n Scope = snap.Id,\n RoleDefinitionName = \"Data Operator for Managed Disks\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testVaultDataContributorOnStorage = new Azure.Authorization.Assignment(\"test_vault_data_contributor_on_storage\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Storage Blob Data Contributor\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testClusterMsiContributorOnSnapRg = new Azure.Authorization.Assignment(\"test_cluster_msi_contributor_on_snap_rg\", new()\n {\n Scope = snap.Id,\n RoleDefinitionName = \"Contributor\",\n PrincipalId = exampleKubernetesCluster.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var exampleBackupPolicyKubernetesCluster = new Azure.DataProtection.BackupPolicyKubernetesCluster(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n VaultName = exampleBackupVault.Name,\n BackupRepeatingTimeIntervals = new[]\n {\n \"R/2023-05-23T02:30:00+00:00/P1W\",\n },\n RetentionRules = new[]\n {\n new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterRetentionRuleArgs\n {\n Name = \"Daily\",\n Priority = 25,\n LifeCycles = new[]\n {\n new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterRetentionRuleLifeCycleArgs\n {\n Duration = \"P84D\",\n DataStoreType = \"OperationalStore\",\n },\n },\n Criteria = new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterRetentionRuleCriteriaArgs\n {\n DaysOfWeeks = new[]\n {\n \"Thursday\",\n },\n MonthsOfYears = new[]\n {\n \"November\",\n },\n WeeksOfMonths = new[]\n {\n \"First\",\n },\n ScheduledBackupTimes = new[]\n {\n \"2023-05-23T02:30:00Z\",\n },\n },\n },\n },\n DefaultRetentionRule = new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterDefaultRetentionRuleArgs\n {\n LifeCycles = new[]\n {\n new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterDefaultRetentionRuleLifeCycleArgs\n {\n Duration = \"P14D\",\n DataStoreType = \"OperationalStore\",\n },\n },\n },\n });\n\n var exampleBackupInstanceKubernetesCluster = new Azure.DataProtection.BackupInstanceKubernetesCluster(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n VaultId = exampleBackupVault.Id,\n KubernetesClusterId = exampleKubernetesCluster.Id,\n SnapshotResourceGroupName = snap.Name,\n BackupPolicyId = exampleBackupPolicyKubernetesCluster.Id,\n BackupDatasourceParameters = new Azure.DataProtection.Inputs.BackupInstanceKubernetesClusterBackupDatasourceParametersArgs\n {\n ExcludedNamespaces = new[]\n {\n \"test-excluded-namespaces\",\n },\n ExcludedResourceTypes = new[]\n {\n \"exvolumesnapshotcontents.snapshot.storage.k8s.io\",\n },\n ClusterScopedResourcesEnabled = true,\n IncludedNamespaces = new[]\n {\n \"test-included-namespaces\",\n },\n IncludedResourceTypes = new[]\n {\n \"involumesnapshotcontents.snapshot.storage.k8s.io\",\n },\n LabelSelectors = new[]\n {\n \"kubernetes.io/metadata.name:test\",\n },\n VolumeSnapshotEnabled = true,\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n testExtensionAndStorageAccountPermission,\n testVaultMsiReadOnCluster,\n testVaultMsiReadOnSnapRg,\n testClusterMsiContributorOnSnapRg,\n testVaultMsiSnapshotContributorOnSnapRg,\n testVaultDataOperatorOnSnapRg,\n testVaultDataContributorOnStorage,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/dataprotection\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsnap, err := core.NewResourceGroup(ctx, \"snap\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-snap\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleBackupVault, err := dataprotection.NewBackupVault(ctx, \"example\", \u0026dataprotection.BackupVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tDatastoreType: pulumi.String(\"VaultStore\"),\n\t\t\tRedundancy: pulumi.String(\"LocallyRedundant\"),\n\t\t\tIdentity: \u0026dataprotection.BackupVaultIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesCluster, err := containerservice.NewKubernetesCluster(ctx, \"example\", \u0026containerservice.KubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tDnsPrefix: pulumi.String(\"dns\"),\n\t\t\tDefaultNodePool: \u0026containerservice.KubernetesClusterDefaultNodePoolArgs{\n\t\t\t\tName: pulumi.String(\"default\"),\n\t\t\t\tNodeCount: pulumi.Int(1),\n\t\t\t\tVmSize: pulumi.String(\"Standard_DS2_v2\"),\n\t\t\t\tHostEncryptionEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t\tIdentity: \u0026containerservice.KubernetesClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = containerservice.NewClusterTrustedAccessRoleBinding(ctx, \"aks_cluster_trusted_access\", \u0026containerservice.ClusterTrustedAccessRoleBindingArgs{\n\t\t\tKubernetesClusterId: exampleKubernetesCluster.ID(),\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tRoles: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Microsoft.DataProtection/backupVaults/backup-operator\"),\n\t\t\t},\n\t\t\tSourceResourceId: exampleBackupVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleContainer, err := storage.NewContainer(ctx, \"example\", \u0026storage.ContainerArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tContainerAccessType: pulumi.String(\"private\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesClusterExtension, err := containerservice.NewKubernetesClusterExtension(ctx, \"example\", \u0026containerservice.KubernetesClusterExtensionArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tClusterId: exampleKubernetesCluster.ID(),\n\t\t\tExtensionType: pulumi.String(\"Microsoft.DataProtection.Kubernetes\"),\n\t\t\tReleaseTrain: pulumi.String(\"stable\"),\n\t\t\tReleaseNamespace: pulumi.String(\"dataprotection-microsoft\"),\n\t\t\tConfigurationSettings: pulumi.StringMap{\n\t\t\t\t\"configuration.backupStorageLocation.bucket\": exampleContainer.Name,\n\t\t\t\t\"configuration.backupStorageLocation.config.resourceGroup\": example.Name,\n\t\t\t\t\"configuration.backupStorageLocation.config.storageAccount\": exampleAccount.Name,\n\t\t\t\t\"configuration.backupStorageLocation.config.subscriptionId\": pulumi.String(current.SubscriptionId),\n\t\t\t\t\"credentials.tenantId\": pulumi.String(current.TenantId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestExtensionAndStorageAccountPermission, err := authorization.NewAssignment(ctx, \"test_extension_and_storage_account_permission\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Storage Account Contributor\"),\n\t\t\tPrincipalId: pulumi.String(exampleKubernetesClusterExtension.AksAssignedIdentities.ApplyT(func(aksAssignedIdentities []containerservice.KubernetesClusterExtensionAksAssignedIdentity) (*string, error) {\n\t\t\t\treturn \u0026aksAssignedIdentities[0].PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultMsiReadOnCluster, err := authorization.NewAssignment(ctx, \"test_vault_msi_read_on_cluster\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleKubernetesCluster.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultMsiReadOnSnapRg, err := authorization.NewAssignment(ctx, \"test_vault_msi_read_on_snap_rg\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: snap.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultMsiSnapshotContributorOnSnapRg, err := authorization.NewAssignment(ctx, \"test_vault_msi_snapshot_contributor_on_snap_rg\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: snap.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Disk Snapshot Contributor\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultDataOperatorOnSnapRg, err := authorization.NewAssignment(ctx, \"test_vault_data_operator_on_snap_rg\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: snap.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Data Operator for Managed Disks\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultDataContributorOnStorage, err := authorization.NewAssignment(ctx, \"test_vault_data_contributor_on_storage\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Storage Blob Data Contributor\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestClusterMsiContributorOnSnapRg, err := authorization.NewAssignment(ctx, \"test_cluster_msi_contributor_on_snap_rg\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: snap.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Contributor\"),\n\t\t\tPrincipalId: pulumi.String(exampleKubernetesCluster.Identity.ApplyT(func(identity containerservice.KubernetesClusterIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleBackupPolicyKubernetesCluster, err := dataprotection.NewBackupPolicyKubernetesCluster(ctx, \"example\", \u0026dataprotection.BackupPolicyKubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVaultName: exampleBackupVault.Name,\n\t\t\tBackupRepeatingTimeIntervals: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"R/2023-05-23T02:30:00+00:00/P1W\"),\n\t\t\t},\n\t\t\tRetentionRules: dataprotection.BackupPolicyKubernetesClusterRetentionRuleArray{\n\t\t\t\t\u0026dataprotection.BackupPolicyKubernetesClusterRetentionRuleArgs{\n\t\t\t\t\tName: pulumi.String(\"Daily\"),\n\t\t\t\t\tPriority: pulumi.Int(25),\n\t\t\t\t\tLifeCycles: dataprotection.BackupPolicyKubernetesClusterRetentionRuleLifeCycleArray{\n\t\t\t\t\t\t\u0026dataprotection.BackupPolicyKubernetesClusterRetentionRuleLifeCycleArgs{\n\t\t\t\t\t\t\tDuration: pulumi.String(\"P84D\"),\n\t\t\t\t\t\t\tDataStoreType: pulumi.String(\"OperationalStore\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tCriteria: \u0026dataprotection.BackupPolicyKubernetesClusterRetentionRuleCriteriaArgs{\n\t\t\t\t\t\tDaysOfWeeks: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"Thursday\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tMonthsOfYears: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"November\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tWeeksOfMonths: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"First\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tScheduledBackupTimes: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"2023-05-23T02:30:00Z\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tDefaultRetentionRule: \u0026dataprotection.BackupPolicyKubernetesClusterDefaultRetentionRuleArgs{\n\t\t\t\tLifeCycles: dataprotection.BackupPolicyKubernetesClusterDefaultRetentionRuleLifeCycleArray{\n\t\t\t\t\t\u0026dataprotection.BackupPolicyKubernetesClusterDefaultRetentionRuleLifeCycleArgs{\n\t\t\t\t\t\tDuration: pulumi.String(\"P14D\"),\n\t\t\t\t\t\tDataStoreType: pulumi.String(\"OperationalStore\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = dataprotection.NewBackupInstanceKubernetesCluster(ctx, \"example\", \u0026dataprotection.BackupInstanceKubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tVaultId: exampleBackupVault.ID(),\n\t\t\tKubernetesClusterId: exampleKubernetesCluster.ID(),\n\t\t\tSnapshotResourceGroupName: snap.Name,\n\t\t\tBackupPolicyId: exampleBackupPolicyKubernetesCluster.ID(),\n\t\t\tBackupDatasourceParameters: \u0026dataprotection.BackupInstanceKubernetesClusterBackupDatasourceParametersArgs{\n\t\t\t\tExcludedNamespaces: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"test-excluded-namespaces\"),\n\t\t\t\t},\n\t\t\t\tExcludedResourceTypes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"exvolumesnapshotcontents.snapshot.storage.k8s.io\"),\n\t\t\t\t},\n\t\t\t\tClusterScopedResourcesEnabled: pulumi.Bool(true),\n\t\t\t\tIncludedNamespaces: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"test-included-namespaces\"),\n\t\t\t\t},\n\t\t\t\tIncludedResourceTypes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"involumesnapshotcontents.snapshot.storage.k8s.io\"),\n\t\t\t\t},\n\t\t\t\tLabelSelectors: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"kubernetes.io/metadata.name:test\"),\n\t\t\t\t},\n\t\t\t\tVolumeSnapshotEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\ttestExtensionAndStorageAccountPermission,\n\t\t\ttestVaultMsiReadOnCluster,\n\t\t\ttestVaultMsiReadOnSnapRg,\n\t\t\ttestClusterMsiContributorOnSnapRg,\n\t\t\ttestVaultMsiSnapshotContributorOnSnapRg,\n\t\t\ttestVaultDataOperatorOnSnapRg,\n\t\t\ttestVaultDataContributorOnStorage,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.dataprotection.BackupVault;\nimport com.pulumi.azure.dataprotection.BackupVaultArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupVaultIdentityArgs;\nimport com.pulumi.azure.containerservice.KubernetesCluster;\nimport com.pulumi.azure.containerservice.KubernetesClusterArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;\nimport com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBinding;\nimport com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBindingArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.Container;\nimport com.pulumi.azure.storage.ContainerArgs;\nimport com.pulumi.azure.containerservice.KubernetesClusterExtension;\nimport com.pulumi.azure.containerservice.KubernetesClusterExtensionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.dataprotection.BackupPolicyKubernetesCluster;\nimport com.pulumi.azure.dataprotection.BackupPolicyKubernetesClusterArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupPolicyKubernetesClusterRetentionRuleArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupPolicyKubernetesClusterRetentionRuleCriteriaArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupPolicyKubernetesClusterDefaultRetentionRuleArgs;\nimport com.pulumi.azure.dataprotection.BackupInstanceKubernetesCluster;\nimport com.pulumi.azure.dataprotection.BackupInstanceKubernetesClusterArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupInstanceKubernetesClusterBackupDatasourceParametersArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n var snap = new ResourceGroup(\"snap\", ResourceGroupArgs.builder()\n .name(\"example-snap\")\n .location(\"West Europe\")\n .build());\n\n var exampleBackupVault = new BackupVault(\"exampleBackupVault\", BackupVaultArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .datastoreType(\"VaultStore\")\n .redundancy(\"LocallyRedundant\")\n .identity(BackupVaultIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKubernetesCluster = new KubernetesCluster(\"exampleKubernetesCluster\", KubernetesClusterArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .dnsPrefix(\"dns\")\n .defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()\n .name(\"default\")\n .nodeCount(1)\n .vmSize(\"Standard_DS2_v2\")\n .hostEncryptionEnabled(true)\n .build())\n .identity(KubernetesClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var aksClusterTrustedAccess = new ClusterTrustedAccessRoleBinding(\"aksClusterTrustedAccess\", ClusterTrustedAccessRoleBindingArgs.builder()\n .kubernetesClusterId(exampleKubernetesCluster.id())\n .name(\"example\")\n .roles(\"Microsoft.DataProtection/backupVaults/backup-operator\")\n .sourceResourceId(exampleBackupVault.id())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleContainer = new Container(\"exampleContainer\", ContainerArgs.builder()\n .name(\"example\")\n .storageAccountName(exampleAccount.name())\n .containerAccessType(\"private\")\n .build());\n\n var exampleKubernetesClusterExtension = new KubernetesClusterExtension(\"exampleKubernetesClusterExtension\", KubernetesClusterExtensionArgs.builder()\n .name(\"example\")\n .clusterId(exampleKubernetesCluster.id())\n .extensionType(\"Microsoft.DataProtection.Kubernetes\")\n .releaseTrain(\"stable\")\n .releaseNamespace(\"dataprotection-microsoft\")\n .configurationSettings(Map.ofEntries(\n Map.entry(\"configuration.backupStorageLocation.bucket\", exampleContainer.name()),\n Map.entry(\"configuration.backupStorageLocation.config.resourceGroup\", example.name()),\n Map.entry(\"configuration.backupStorageLocation.config.storageAccount\", exampleAccount.name()),\n Map.entry(\"configuration.backupStorageLocation.config.subscriptionId\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())),\n Map.entry(\"credentials.tenantId\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n ))\n .build());\n\n var testExtensionAndStorageAccountPermission = new Assignment(\"testExtensionAndStorageAccountPermission\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Storage Account Contributor\")\n .principalId(exampleKubernetesClusterExtension.aksAssignedIdentities().applyValue(aksAssignedIdentities -\u003e aksAssignedIdentities[0].principalId()))\n .build());\n\n var testVaultMsiReadOnCluster = new Assignment(\"testVaultMsiReadOnCluster\", AssignmentArgs.builder()\n .scope(exampleKubernetesCluster.id())\n .roleDefinitionName(\"Reader\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testVaultMsiReadOnSnapRg = new Assignment(\"testVaultMsiReadOnSnapRg\", AssignmentArgs.builder()\n .scope(snap.id())\n .roleDefinitionName(\"Reader\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testVaultMsiSnapshotContributorOnSnapRg = new Assignment(\"testVaultMsiSnapshotContributorOnSnapRg\", AssignmentArgs.builder()\n .scope(snap.id())\n .roleDefinitionName(\"Disk Snapshot Contributor\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testVaultDataOperatorOnSnapRg = new Assignment(\"testVaultDataOperatorOnSnapRg\", AssignmentArgs.builder()\n .scope(snap.id())\n .roleDefinitionName(\"Data Operator for Managed Disks\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testVaultDataContributorOnStorage = new Assignment(\"testVaultDataContributorOnStorage\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Storage Blob Data Contributor\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testClusterMsiContributorOnSnapRg = new Assignment(\"testClusterMsiContributorOnSnapRg\", AssignmentArgs.builder()\n .scope(snap.id())\n .roleDefinitionName(\"Contributor\")\n .principalId(exampleKubernetesCluster.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var exampleBackupPolicyKubernetesCluster = new BackupPolicyKubernetesCluster(\"exampleBackupPolicyKubernetesCluster\", BackupPolicyKubernetesClusterArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .vaultName(exampleBackupVault.name())\n .backupRepeatingTimeIntervals(\"R/2023-05-23T02:30:00+00:00/P1W\")\n .retentionRules(BackupPolicyKubernetesClusterRetentionRuleArgs.builder()\n .name(\"Daily\")\n .priority(25)\n .lifeCycles(BackupPolicyKubernetesClusterRetentionRuleLifeCycleArgs.builder()\n .duration(\"P84D\")\n .dataStoreType(\"OperationalStore\")\n .build())\n .criteria(BackupPolicyKubernetesClusterRetentionRuleCriteriaArgs.builder()\n .daysOfWeeks(\"Thursday\")\n .monthsOfYears(\"November\")\n .weeksOfMonths(\"First\")\n .scheduledBackupTimes(\"2023-05-23T02:30:00Z\")\n .build())\n .build())\n .defaultRetentionRule(BackupPolicyKubernetesClusterDefaultRetentionRuleArgs.builder()\n .lifeCycles(BackupPolicyKubernetesClusterDefaultRetentionRuleLifeCycleArgs.builder()\n .duration(\"P14D\")\n .dataStoreType(\"OperationalStore\")\n .build())\n .build())\n .build());\n\n var exampleBackupInstanceKubernetesCluster = new BackupInstanceKubernetesCluster(\"exampleBackupInstanceKubernetesCluster\", BackupInstanceKubernetesClusterArgs.builder()\n .name(\"example\")\n .location(example.location())\n .vaultId(exampleBackupVault.id())\n .kubernetesClusterId(exampleKubernetesCluster.id())\n .snapshotResourceGroupName(snap.name())\n .backupPolicyId(exampleBackupPolicyKubernetesCluster.id())\n .backupDatasourceParameters(BackupInstanceKubernetesClusterBackupDatasourceParametersArgs.builder()\n .excludedNamespaces(\"test-excluded-namespaces\")\n .excludedResourceTypes(\"exvolumesnapshotcontents.snapshot.storage.k8s.io\")\n .clusterScopedResourcesEnabled(true)\n .includedNamespaces(\"test-included-namespaces\")\n .includedResourceTypes(\"involumesnapshotcontents.snapshot.storage.k8s.io\")\n .labelSelectors(\"kubernetes.io/metadata.name:test\")\n .volumeSnapshotEnabled(true)\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n testExtensionAndStorageAccountPermission,\n testVaultMsiReadOnCluster,\n testVaultMsiReadOnSnapRg,\n testClusterMsiContributorOnSnapRg,\n testVaultMsiSnapshotContributorOnSnapRg,\n testVaultDataOperatorOnSnapRg,\n testVaultDataContributorOnStorage)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: West Europe\n snap:\n type: azure:core:ResourceGroup\n properties:\n name: example-snap\n location: West Europe\n exampleBackupVault:\n type: azure:dataprotection:BackupVault\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n datastoreType: VaultStore\n redundancy: LocallyRedundant\n identity:\n type: SystemAssigned\n exampleKubernetesCluster:\n type: azure:containerservice:KubernetesCluster\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n dnsPrefix: dns\n defaultNodePool:\n name: default\n nodeCount: 1\n vmSize: Standard_DS2_v2\n hostEncryptionEnabled: true\n identity:\n type: SystemAssigned\n aksClusterTrustedAccess:\n type: azure:containerservice:ClusterTrustedAccessRoleBinding\n name: aks_cluster_trusted_access\n properties:\n kubernetesClusterId: ${exampleKubernetesCluster.id}\n name: example\n roles:\n - Microsoft.DataProtection/backupVaults/backup-operator\n sourceResourceId: ${exampleBackupVault.id}\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleContainer:\n type: azure:storage:Container\n name: example\n properties:\n name: example\n storageAccountName: ${exampleAccount.name}\n containerAccessType: private\n exampleKubernetesClusterExtension:\n type: azure:containerservice:KubernetesClusterExtension\n name: example\n properties:\n name: example\n clusterId: ${exampleKubernetesCluster.id}\n extensionType: Microsoft.DataProtection.Kubernetes\n releaseTrain: stable\n releaseNamespace: dataprotection-microsoft\n configurationSettings:\n configuration.backupStorageLocation.bucket: ${exampleContainer.name}\n configuration.backupStorageLocation.config.resourceGroup: ${example.name}\n configuration.backupStorageLocation.config.storageAccount: ${exampleAccount.name}\n configuration.backupStorageLocation.config.subscriptionId: ${current.subscriptionId}\n credentials.tenantId: ${current.tenantId}\n testExtensionAndStorageAccountPermission:\n type: azure:authorization:Assignment\n name: test_extension_and_storage_account_permission\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Storage Account Contributor\n principalId: ${exampleKubernetesClusterExtension.aksAssignedIdentities[0].principalId}\n testVaultMsiReadOnCluster:\n type: azure:authorization:Assignment\n name: test_vault_msi_read_on_cluster\n properties:\n scope: ${exampleKubernetesCluster.id}\n roleDefinitionName: Reader\n principalId: ${exampleBackupVault.identity.principalId}\n testVaultMsiReadOnSnapRg:\n type: azure:authorization:Assignment\n name: test_vault_msi_read_on_snap_rg\n properties:\n scope: ${snap.id}\n roleDefinitionName: Reader\n principalId: ${exampleBackupVault.identity.principalId}\n testVaultMsiSnapshotContributorOnSnapRg:\n type: azure:authorization:Assignment\n name: test_vault_msi_snapshot_contributor_on_snap_rg\n properties:\n scope: ${snap.id}\n roleDefinitionName: Disk Snapshot Contributor\n principalId: ${exampleBackupVault.identity.principalId}\n testVaultDataOperatorOnSnapRg:\n type: azure:authorization:Assignment\n name: test_vault_data_operator_on_snap_rg\n properties:\n scope: ${snap.id}\n roleDefinitionName: Data Operator for Managed Disks\n principalId: ${exampleBackupVault.identity.principalId}\n testVaultDataContributorOnStorage:\n type: azure:authorization:Assignment\n name: test_vault_data_contributor_on_storage\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Storage Blob Data Contributor\n principalId: ${exampleBackupVault.identity.principalId}\n testClusterMsiContributorOnSnapRg:\n type: azure:authorization:Assignment\n name: test_cluster_msi_contributor_on_snap_rg\n properties:\n scope: ${snap.id}\n roleDefinitionName: Contributor\n principalId: ${exampleKubernetesCluster.identity.principalId}\n exampleBackupPolicyKubernetesCluster:\n type: azure:dataprotection:BackupPolicyKubernetesCluster\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n vaultName: ${exampleBackupVault.name}\n backupRepeatingTimeIntervals:\n - R/2023-05-23T02:30:00+00:00/P1W\n retentionRules:\n - name: Daily\n priority: 25\n lifeCycles:\n - duration: P84D\n dataStoreType: OperationalStore\n criteria:\n daysOfWeeks:\n - Thursday\n monthsOfYears:\n - November\n weeksOfMonths:\n - First\n scheduledBackupTimes:\n - 2023-05-23T02:30:00Z\n defaultRetentionRule:\n lifeCycles:\n - duration: P14D\n dataStoreType: OperationalStore\n exampleBackupInstanceKubernetesCluster:\n type: azure:dataprotection:BackupInstanceKubernetesCluster\n name: example\n properties:\n name: example\n location: ${example.location}\n vaultId: ${exampleBackupVault.id}\n kubernetesClusterId: ${exampleKubernetesCluster.id}\n snapshotResourceGroupName: ${snap.name}\n backupPolicyId: ${exampleBackupPolicyKubernetesCluster.id}\n backupDatasourceParameters:\n excludedNamespaces:\n - test-excluded-namespaces\n excludedResourceTypes:\n - exvolumesnapshotcontents.snapshot.storage.k8s.io\n clusterScopedResourcesEnabled: true\n includedNamespaces:\n - test-included-namespaces\n includedResourceTypes:\n - involumesnapshotcontents.snapshot.storage.k8s.io\n labelSelectors:\n - kubernetes.io/metadata.name:test\n volumeSnapshotEnabled: true\n options:\n dependson:\n - ${testExtensionAndStorageAccountPermission}\n - ${testVaultMsiReadOnCluster}\n - ${testVaultMsiReadOnSnapRg}\n - ${testClusterMsiContributorOnSnapRg}\n - ${testVaultMsiSnapshotContributorOnSnapRg}\n - ${testVaultDataOperatorOnSnapRg}\n - ${testVaultDataContributorOnStorage}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBackup Instance Kubernetes Cluster can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:dataprotection/backupInstanceKubernetesCluster:BackupInstanceKubernetesCluster example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DataProtection/backupVaults/vault1/backupInstances/backupInstance1\n```\n\n", + "description": "Manages a Backup Instance to back up a Kubernetes Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst snap = new azure.core.ResourceGroup(\"snap\", {\n name: \"example-snap\",\n location: \"West Europe\",\n});\nconst exampleBackupVault = new azure.dataprotection.BackupVault(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n datastoreType: \"VaultStore\",\n redundancy: \"LocallyRedundant\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKubernetesCluster = new azure.containerservice.KubernetesCluster(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n dnsPrefix: \"dns\",\n defaultNodePool: {\n name: \"default\",\n nodeCount: 1,\n vmSize: \"Standard_DS2_v2\",\n hostEncryptionEnabled: true,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst aksClusterTrustedAccess = new azure.containerservice.ClusterTrustedAccessRoleBinding(\"aks_cluster_trusted_access\", {\n kubernetesClusterId: exampleKubernetesCluster.id,\n name: \"example\",\n roles: [\"Microsoft.DataProtection/backupVaults/backup-operator\"],\n sourceResourceId: exampleBackupVault.id,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleContainer = new azure.storage.Container(\"example\", {\n name: \"example\",\n storageAccountName: exampleAccount.name,\n containerAccessType: \"private\",\n});\nconst exampleKubernetesClusterExtension = new azure.containerservice.KubernetesClusterExtension(\"example\", {\n name: \"example\",\n clusterId: exampleKubernetesCluster.id,\n extensionType: \"Microsoft.DataProtection.Kubernetes\",\n releaseTrain: \"stable\",\n releaseNamespace: \"dataprotection-microsoft\",\n configurationSettings: {\n \"configuration.backupStorageLocation.bucket\": exampleContainer.name,\n \"configuration.backupStorageLocation.config.resourceGroup\": example.name,\n \"configuration.backupStorageLocation.config.storageAccount\": exampleAccount.name,\n \"configuration.backupStorageLocation.config.subscriptionId\": current.then(current =\u003e current.subscriptionId),\n \"credentials.tenantId\": current.then(current =\u003e current.tenantId),\n },\n});\nconst testExtensionAndStorageAccountPermission = new azure.authorization.Assignment(\"test_extension_and_storage_account_permission\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Storage Account Contributor\",\n principalId: exampleKubernetesClusterExtension.aksAssignedIdentities.apply(aksAssignedIdentities =\u003e aksAssignedIdentities[0].principalId),\n});\nconst testVaultMsiReadOnCluster = new azure.authorization.Assignment(\"test_vault_msi_read_on_cluster\", {\n scope: exampleKubernetesCluster.id,\n roleDefinitionName: \"Reader\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testVaultMsiReadOnSnapRg = new azure.authorization.Assignment(\"test_vault_msi_read_on_snap_rg\", {\n scope: snap.id,\n roleDefinitionName: \"Reader\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testVaultMsiSnapshotContributorOnSnapRg = new azure.authorization.Assignment(\"test_vault_msi_snapshot_contributor_on_snap_rg\", {\n scope: snap.id,\n roleDefinitionName: \"Disk Snapshot Contributor\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testVaultDataOperatorOnSnapRg = new azure.authorization.Assignment(\"test_vault_data_operator_on_snap_rg\", {\n scope: snap.id,\n roleDefinitionName: \"Data Operator for Managed Disks\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testVaultDataContributorOnStorage = new azure.authorization.Assignment(\"test_vault_data_contributor_on_storage\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Storage Blob Data Contributor\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst testClusterMsiContributorOnSnapRg = new azure.authorization.Assignment(\"test_cluster_msi_contributor_on_snap_rg\", {\n scope: snap.id,\n roleDefinitionName: \"Contributor\",\n principalId: exampleKubernetesCluster.identity.apply(identity =\u003e identity?.principalId),\n});\nconst exampleBackupPolicyKubernetesCluster = new azure.dataprotection.BackupPolicyKubernetesCluster(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n vaultName: exampleBackupVault.name,\n backupRepeatingTimeIntervals: [\"R/2023-05-23T02:30:00+00:00/P1W\"],\n retentionRules: [{\n name: \"Daily\",\n priority: 25,\n lifeCycles: [{\n duration: \"P84D\",\n dataStoreType: \"OperationalStore\",\n }],\n criteria: {\n daysOfWeeks: [\"Thursday\"],\n monthsOfYears: [\"November\"],\n weeksOfMonths: [\"First\"],\n scheduledBackupTimes: [\"2023-05-23T02:30:00Z\"],\n },\n }],\n defaultRetentionRule: {\n lifeCycles: [{\n duration: \"P14D\",\n dataStoreType: \"OperationalStore\",\n }],\n },\n});\nconst exampleBackupInstanceKubernetesCluster = new azure.dataprotection.BackupInstanceKubernetesCluster(\"example\", {\n name: \"example\",\n location: example.location,\n vaultId: exampleBackupVault.id,\n kubernetesClusterId: exampleKubernetesCluster.id,\n snapshotResourceGroupName: snap.name,\n backupPolicyId: exampleBackupPolicyKubernetesCluster.id,\n backupDatasourceParameters: {\n excludedNamespaces: [\"test-excluded-namespaces\"],\n excludedResourceTypes: [\"exvolumesnapshotcontents.snapshot.storage.k8s.io\"],\n clusterScopedResourcesEnabled: true,\n includedNamespaces: [\"test-included-namespaces\"],\n includedResourceTypes: [\"involumesnapshotcontents.snapshot.storage.k8s.io\"],\n labelSelectors: [\"kubernetes.io/metadata.name:test\"],\n volumeSnapshotEnabled: true,\n },\n}, {\n dependsOn: [\n testExtensionAndStorageAccountPermission,\n testVaultMsiReadOnCluster,\n testVaultMsiReadOnSnapRg,\n testClusterMsiContributorOnSnapRg,\n testVaultMsiSnapshotContributorOnSnapRg,\n testVaultDataOperatorOnSnapRg,\n testVaultDataContributorOnStorage,\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\nsnap = azure.core.ResourceGroup(\"snap\",\n name=\"example-snap\",\n location=\"West Europe\")\nexample_backup_vault = azure.dataprotection.BackupVault(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n datastore_type=\"VaultStore\",\n redundancy=\"LocallyRedundant\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_kubernetes_cluster = azure.containerservice.KubernetesCluster(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n dns_prefix=\"dns\",\n default_node_pool={\n \"name\": \"default\",\n \"node_count\": 1,\n \"vm_size\": \"Standard_DS2_v2\",\n \"host_encryption_enabled\": True,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\naks_cluster_trusted_access = azure.containerservice.ClusterTrustedAccessRoleBinding(\"aks_cluster_trusted_access\",\n kubernetes_cluster_id=example_kubernetes_cluster.id,\n name=\"example\",\n roles=[\"Microsoft.DataProtection/backupVaults/backup-operator\"],\n source_resource_id=example_backup_vault.id)\nexample_account = azure.storage.Account(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_container = azure.storage.Container(\"example\",\n name=\"example\",\n storage_account_name=example_account.name,\n container_access_type=\"private\")\nexample_kubernetes_cluster_extension = azure.containerservice.KubernetesClusterExtension(\"example\",\n name=\"example\",\n cluster_id=example_kubernetes_cluster.id,\n extension_type=\"Microsoft.DataProtection.Kubernetes\",\n release_train=\"stable\",\n release_namespace=\"dataprotection-microsoft\",\n configuration_settings={\n \"configuration.backupStorageLocation.bucket\": example_container.name,\n \"configuration.backupStorageLocation.config.resourceGroup\": example.name,\n \"configuration.backupStorageLocation.config.storageAccount\": example_account.name,\n \"configuration.backupStorageLocation.config.subscriptionId\": current.subscription_id,\n \"credentials.tenantId\": current.tenant_id,\n })\ntest_extension_and_storage_account_permission = azure.authorization.Assignment(\"test_extension_and_storage_account_permission\",\n scope=example_account.id,\n role_definition_name=\"Storage Account Contributor\",\n principal_id=example_kubernetes_cluster_extension.aks_assigned_identities[0].principal_id)\ntest_vault_msi_read_on_cluster = azure.authorization.Assignment(\"test_vault_msi_read_on_cluster\",\n scope=example_kubernetes_cluster.id,\n role_definition_name=\"Reader\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_vault_msi_read_on_snap_rg = azure.authorization.Assignment(\"test_vault_msi_read_on_snap_rg\",\n scope=snap.id,\n role_definition_name=\"Reader\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_vault_msi_snapshot_contributor_on_snap_rg = azure.authorization.Assignment(\"test_vault_msi_snapshot_contributor_on_snap_rg\",\n scope=snap.id,\n role_definition_name=\"Disk Snapshot Contributor\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_vault_data_operator_on_snap_rg = azure.authorization.Assignment(\"test_vault_data_operator_on_snap_rg\",\n scope=snap.id,\n role_definition_name=\"Data Operator for Managed Disks\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_vault_data_contributor_on_storage = azure.authorization.Assignment(\"test_vault_data_contributor_on_storage\",\n scope=example_account.id,\n role_definition_name=\"Storage Blob Data Contributor\",\n principal_id=example_backup_vault.identity.principal_id)\ntest_cluster_msi_contributor_on_snap_rg = azure.authorization.Assignment(\"test_cluster_msi_contributor_on_snap_rg\",\n scope=snap.id,\n role_definition_name=\"Contributor\",\n principal_id=example_kubernetes_cluster.identity.principal_id)\nexample_backup_policy_kubernetes_cluster = azure.dataprotection.BackupPolicyKubernetesCluster(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n vault_name=example_backup_vault.name,\n backup_repeating_time_intervals=[\"R/2023-05-23T02:30:00+00:00/P1W\"],\n retention_rules=[{\n \"name\": \"Daily\",\n \"priority\": 25,\n \"life_cycles\": [{\n \"duration\": \"P84D\",\n \"data_store_type\": \"OperationalStore\",\n }],\n \"criteria\": {\n \"days_of_weeks\": [\"Thursday\"],\n \"months_of_years\": [\"November\"],\n \"weeks_of_months\": [\"First\"],\n \"scheduled_backup_times\": [\"2023-05-23T02:30:00Z\"],\n },\n }],\n default_retention_rule={\n \"life_cycles\": [{\n \"duration\": \"P14D\",\n \"data_store_type\": \"OperationalStore\",\n }],\n })\nexample_backup_instance_kubernetes_cluster = azure.dataprotection.BackupInstanceKubernetesCluster(\"example\",\n name=\"example\",\n location=example.location,\n vault_id=example_backup_vault.id,\n kubernetes_cluster_id=example_kubernetes_cluster.id,\n snapshot_resource_group_name=snap.name,\n backup_policy_id=example_backup_policy_kubernetes_cluster.id,\n backup_datasource_parameters={\n \"excluded_namespaces\": [\"test-excluded-namespaces\"],\n \"excluded_resource_types\": [\"exvolumesnapshotcontents.snapshot.storage.k8s.io\"],\n \"cluster_scoped_resources_enabled\": True,\n \"included_namespaces\": [\"test-included-namespaces\"],\n \"included_resource_types\": [\"involumesnapshotcontents.snapshot.storage.k8s.io\"],\n \"label_selectors\": [\"kubernetes.io/metadata.name:test\"],\n \"volume_snapshot_enabled\": True,\n },\n opts = pulumi.ResourceOptions(depends_on=[\n test_extension_and_storage_account_permission,\n test_vault_msi_read_on_cluster,\n test_vault_msi_read_on_snap_rg,\n test_cluster_msi_contributor_on_snap_rg,\n test_vault_msi_snapshot_contributor_on_snap_rg,\n test_vault_data_operator_on_snap_rg,\n test_vault_data_contributor_on_storage,\n ]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var snap = new Azure.Core.ResourceGroup(\"snap\", new()\n {\n Name = \"example-snap\",\n Location = \"West Europe\",\n });\n\n var exampleBackupVault = new Azure.DataProtection.BackupVault(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n DatastoreType = \"VaultStore\",\n Redundancy = \"LocallyRedundant\",\n Identity = new Azure.DataProtection.Inputs.BackupVaultIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKubernetesCluster = new Azure.ContainerService.KubernetesCluster(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n DnsPrefix = \"dns\",\n DefaultNodePool = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolArgs\n {\n Name = \"default\",\n NodeCount = 1,\n VmSize = \"Standard_DS2_v2\",\n HostEncryptionEnabled = true,\n },\n Identity = new Azure.ContainerService.Inputs.KubernetesClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var aksClusterTrustedAccess = new Azure.ContainerService.ClusterTrustedAccessRoleBinding(\"aks_cluster_trusted_access\", new()\n {\n KubernetesClusterId = exampleKubernetesCluster.Id,\n Name = \"example\",\n Roles = new[]\n {\n \"Microsoft.DataProtection/backupVaults/backup-operator\",\n },\n SourceResourceId = exampleBackupVault.Id,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleContainer = new Azure.Storage.Container(\"example\", new()\n {\n Name = \"example\",\n StorageAccountName = exampleAccount.Name,\n ContainerAccessType = \"private\",\n });\n\n var exampleKubernetesClusterExtension = new Azure.ContainerService.KubernetesClusterExtension(\"example\", new()\n {\n Name = \"example\",\n ClusterId = exampleKubernetesCluster.Id,\n ExtensionType = \"Microsoft.DataProtection.Kubernetes\",\n ReleaseTrain = \"stable\",\n ReleaseNamespace = \"dataprotection-microsoft\",\n ConfigurationSettings = \n {\n { \"configuration.backupStorageLocation.bucket\", exampleContainer.Name },\n { \"configuration.backupStorageLocation.config.resourceGroup\", example.Name },\n { \"configuration.backupStorageLocation.config.storageAccount\", exampleAccount.Name },\n { \"configuration.backupStorageLocation.config.subscriptionId\", current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId) },\n { \"credentials.tenantId\", current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId) },\n },\n });\n\n var testExtensionAndStorageAccountPermission = new Azure.Authorization.Assignment(\"test_extension_and_storage_account_permission\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Storage Account Contributor\",\n PrincipalId = exampleKubernetesClusterExtension.AksAssignedIdentities.Apply(aksAssignedIdentities =\u003e aksAssignedIdentities[0].PrincipalId),\n });\n\n var testVaultMsiReadOnCluster = new Azure.Authorization.Assignment(\"test_vault_msi_read_on_cluster\", new()\n {\n Scope = exampleKubernetesCluster.Id,\n RoleDefinitionName = \"Reader\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testVaultMsiReadOnSnapRg = new Azure.Authorization.Assignment(\"test_vault_msi_read_on_snap_rg\", new()\n {\n Scope = snap.Id,\n RoleDefinitionName = \"Reader\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testVaultMsiSnapshotContributorOnSnapRg = new Azure.Authorization.Assignment(\"test_vault_msi_snapshot_contributor_on_snap_rg\", new()\n {\n Scope = snap.Id,\n RoleDefinitionName = \"Disk Snapshot Contributor\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testVaultDataOperatorOnSnapRg = new Azure.Authorization.Assignment(\"test_vault_data_operator_on_snap_rg\", new()\n {\n Scope = snap.Id,\n RoleDefinitionName = \"Data Operator for Managed Disks\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testVaultDataContributorOnStorage = new Azure.Authorization.Assignment(\"test_vault_data_contributor_on_storage\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Storage Blob Data Contributor\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var testClusterMsiContributorOnSnapRg = new Azure.Authorization.Assignment(\"test_cluster_msi_contributor_on_snap_rg\", new()\n {\n Scope = snap.Id,\n RoleDefinitionName = \"Contributor\",\n PrincipalId = exampleKubernetesCluster.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var exampleBackupPolicyKubernetesCluster = new Azure.DataProtection.BackupPolicyKubernetesCluster(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n VaultName = exampleBackupVault.Name,\n BackupRepeatingTimeIntervals = new[]\n {\n \"R/2023-05-23T02:30:00+00:00/P1W\",\n },\n RetentionRules = new[]\n {\n new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterRetentionRuleArgs\n {\n Name = \"Daily\",\n Priority = 25,\n LifeCycles = new[]\n {\n new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterRetentionRuleLifeCycleArgs\n {\n Duration = \"P84D\",\n DataStoreType = \"OperationalStore\",\n },\n },\n Criteria = new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterRetentionRuleCriteriaArgs\n {\n DaysOfWeeks = new[]\n {\n \"Thursday\",\n },\n MonthsOfYears = new[]\n {\n \"November\",\n },\n WeeksOfMonths = new[]\n {\n \"First\",\n },\n ScheduledBackupTimes = new[]\n {\n \"2023-05-23T02:30:00Z\",\n },\n },\n },\n },\n DefaultRetentionRule = new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterDefaultRetentionRuleArgs\n {\n LifeCycles = new[]\n {\n new Azure.DataProtection.Inputs.BackupPolicyKubernetesClusterDefaultRetentionRuleLifeCycleArgs\n {\n Duration = \"P14D\",\n DataStoreType = \"OperationalStore\",\n },\n },\n },\n });\n\n var exampleBackupInstanceKubernetesCluster = new Azure.DataProtection.BackupInstanceKubernetesCluster(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n VaultId = exampleBackupVault.Id,\n KubernetesClusterId = exampleKubernetesCluster.Id,\n SnapshotResourceGroupName = snap.Name,\n BackupPolicyId = exampleBackupPolicyKubernetesCluster.Id,\n BackupDatasourceParameters = new Azure.DataProtection.Inputs.BackupInstanceKubernetesClusterBackupDatasourceParametersArgs\n {\n ExcludedNamespaces = new[]\n {\n \"test-excluded-namespaces\",\n },\n ExcludedResourceTypes = new[]\n {\n \"exvolumesnapshotcontents.snapshot.storage.k8s.io\",\n },\n ClusterScopedResourcesEnabled = true,\n IncludedNamespaces = new[]\n {\n \"test-included-namespaces\",\n },\n IncludedResourceTypes = new[]\n {\n \"involumesnapshotcontents.snapshot.storage.k8s.io\",\n },\n LabelSelectors = new[]\n {\n \"kubernetes.io/metadata.name:test\",\n },\n VolumeSnapshotEnabled = true,\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n testExtensionAndStorageAccountPermission,\n testVaultMsiReadOnCluster,\n testVaultMsiReadOnSnapRg,\n testClusterMsiContributorOnSnapRg,\n testVaultMsiSnapshotContributorOnSnapRg,\n testVaultDataOperatorOnSnapRg,\n testVaultDataContributorOnStorage,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/dataprotection\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsnap, err := core.NewResourceGroup(ctx, \"snap\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-snap\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleBackupVault, err := dataprotection.NewBackupVault(ctx, \"example\", \u0026dataprotection.BackupVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tDatastoreType: pulumi.String(\"VaultStore\"),\n\t\t\tRedundancy: pulumi.String(\"LocallyRedundant\"),\n\t\t\tIdentity: \u0026dataprotection.BackupVaultIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesCluster, err := containerservice.NewKubernetesCluster(ctx, \"example\", \u0026containerservice.KubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tDnsPrefix: pulumi.String(\"dns\"),\n\t\t\tDefaultNodePool: \u0026containerservice.KubernetesClusterDefaultNodePoolArgs{\n\t\t\t\tName: pulumi.String(\"default\"),\n\t\t\t\tNodeCount: pulumi.Int(1),\n\t\t\t\tVmSize: pulumi.String(\"Standard_DS2_v2\"),\n\t\t\t\tHostEncryptionEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t\tIdentity: \u0026containerservice.KubernetesClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = containerservice.NewClusterTrustedAccessRoleBinding(ctx, \"aks_cluster_trusted_access\", \u0026containerservice.ClusterTrustedAccessRoleBindingArgs{\n\t\t\tKubernetesClusterId: exampleKubernetesCluster.ID(),\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tRoles: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Microsoft.DataProtection/backupVaults/backup-operator\"),\n\t\t\t},\n\t\t\tSourceResourceId: exampleBackupVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleContainer, err := storage.NewContainer(ctx, \"example\", \u0026storage.ContainerArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tContainerAccessType: pulumi.String(\"private\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesClusterExtension, err := containerservice.NewKubernetesClusterExtension(ctx, \"example\", \u0026containerservice.KubernetesClusterExtensionArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tClusterId: exampleKubernetesCluster.ID(),\n\t\t\tExtensionType: pulumi.String(\"Microsoft.DataProtection.Kubernetes\"),\n\t\t\tReleaseTrain: pulumi.String(\"stable\"),\n\t\t\tReleaseNamespace: pulumi.String(\"dataprotection-microsoft\"),\n\t\t\tConfigurationSettings: pulumi.StringMap{\n\t\t\t\t\"configuration.backupStorageLocation.bucket\": exampleContainer.Name,\n\t\t\t\t\"configuration.backupStorageLocation.config.resourceGroup\": example.Name,\n\t\t\t\t\"configuration.backupStorageLocation.config.storageAccount\": exampleAccount.Name,\n\t\t\t\t\"configuration.backupStorageLocation.config.subscriptionId\": pulumi.String(current.SubscriptionId),\n\t\t\t\t\"credentials.tenantId\": pulumi.String(current.TenantId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestExtensionAndStorageAccountPermission, err := authorization.NewAssignment(ctx, \"test_extension_and_storage_account_permission\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Storage Account Contributor\"),\n\t\t\tPrincipalId: pulumi.String(exampleKubernetesClusterExtension.AksAssignedIdentities.ApplyT(func(aksAssignedIdentities []containerservice.KubernetesClusterExtensionAksAssignedIdentity) (*string, error) {\n\t\t\t\treturn \u0026aksAssignedIdentities[0].PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultMsiReadOnCluster, err := authorization.NewAssignment(ctx, \"test_vault_msi_read_on_cluster\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleKubernetesCluster.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultMsiReadOnSnapRg, err := authorization.NewAssignment(ctx, \"test_vault_msi_read_on_snap_rg\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: snap.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultMsiSnapshotContributorOnSnapRg, err := authorization.NewAssignment(ctx, \"test_vault_msi_snapshot_contributor_on_snap_rg\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: snap.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Disk Snapshot Contributor\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultDataOperatorOnSnapRg, err := authorization.NewAssignment(ctx, \"test_vault_data_operator_on_snap_rg\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: snap.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Data Operator for Managed Disks\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestVaultDataContributorOnStorage, err := authorization.NewAssignment(ctx, \"test_vault_data_contributor_on_storage\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Storage Blob Data Contributor\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttestClusterMsiContributorOnSnapRg, err := authorization.NewAssignment(ctx, \"test_cluster_msi_contributor_on_snap_rg\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: snap.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Contributor\"),\n\t\t\tPrincipalId: pulumi.String(exampleKubernetesCluster.Identity.ApplyT(func(identity containerservice.KubernetesClusterIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleBackupPolicyKubernetesCluster, err := dataprotection.NewBackupPolicyKubernetesCluster(ctx, \"example\", \u0026dataprotection.BackupPolicyKubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVaultName: exampleBackupVault.Name,\n\t\t\tBackupRepeatingTimeIntervals: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"R/2023-05-23T02:30:00+00:00/P1W\"),\n\t\t\t},\n\t\t\tRetentionRules: dataprotection.BackupPolicyKubernetesClusterRetentionRuleArray{\n\t\t\t\t\u0026dataprotection.BackupPolicyKubernetesClusterRetentionRuleArgs{\n\t\t\t\t\tName: pulumi.String(\"Daily\"),\n\t\t\t\t\tPriority: pulumi.Int(25),\n\t\t\t\t\tLifeCycles: dataprotection.BackupPolicyKubernetesClusterRetentionRuleLifeCycleArray{\n\t\t\t\t\t\t\u0026dataprotection.BackupPolicyKubernetesClusterRetentionRuleLifeCycleArgs{\n\t\t\t\t\t\t\tDuration: pulumi.String(\"P84D\"),\n\t\t\t\t\t\t\tDataStoreType: pulumi.String(\"OperationalStore\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tCriteria: \u0026dataprotection.BackupPolicyKubernetesClusterRetentionRuleCriteriaArgs{\n\t\t\t\t\t\tDaysOfWeeks: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"Thursday\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tMonthsOfYears: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"November\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tWeeksOfMonths: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"First\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tScheduledBackupTimes: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"2023-05-23T02:30:00Z\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tDefaultRetentionRule: \u0026dataprotection.BackupPolicyKubernetesClusterDefaultRetentionRuleArgs{\n\t\t\t\tLifeCycles: dataprotection.BackupPolicyKubernetesClusterDefaultRetentionRuleLifeCycleArray{\n\t\t\t\t\t\u0026dataprotection.BackupPolicyKubernetesClusterDefaultRetentionRuleLifeCycleArgs{\n\t\t\t\t\t\tDuration: pulumi.String(\"P14D\"),\n\t\t\t\t\t\tDataStoreType: pulumi.String(\"OperationalStore\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = dataprotection.NewBackupInstanceKubernetesCluster(ctx, \"example\", \u0026dataprotection.BackupInstanceKubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tVaultId: exampleBackupVault.ID(),\n\t\t\tKubernetesClusterId: exampleKubernetesCluster.ID(),\n\t\t\tSnapshotResourceGroupName: snap.Name,\n\t\t\tBackupPolicyId: exampleBackupPolicyKubernetesCluster.ID(),\n\t\t\tBackupDatasourceParameters: \u0026dataprotection.BackupInstanceKubernetesClusterBackupDatasourceParametersArgs{\n\t\t\t\tExcludedNamespaces: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"test-excluded-namespaces\"),\n\t\t\t\t},\n\t\t\t\tExcludedResourceTypes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"exvolumesnapshotcontents.snapshot.storage.k8s.io\"),\n\t\t\t\t},\n\t\t\t\tClusterScopedResourcesEnabled: pulumi.Bool(true),\n\t\t\t\tIncludedNamespaces: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"test-included-namespaces\"),\n\t\t\t\t},\n\t\t\t\tIncludedResourceTypes: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"involumesnapshotcontents.snapshot.storage.k8s.io\"),\n\t\t\t\t},\n\t\t\t\tLabelSelectors: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"kubernetes.io/metadata.name:test\"),\n\t\t\t\t},\n\t\t\t\tVolumeSnapshotEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\ttestExtensionAndStorageAccountPermission,\n\t\t\ttestVaultMsiReadOnCluster,\n\t\t\ttestVaultMsiReadOnSnapRg,\n\t\t\ttestClusterMsiContributorOnSnapRg,\n\t\t\ttestVaultMsiSnapshotContributorOnSnapRg,\n\t\t\ttestVaultDataOperatorOnSnapRg,\n\t\t\ttestVaultDataContributorOnStorage,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.dataprotection.BackupVault;\nimport com.pulumi.azure.dataprotection.BackupVaultArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupVaultIdentityArgs;\nimport com.pulumi.azure.containerservice.KubernetesCluster;\nimport com.pulumi.azure.containerservice.KubernetesClusterArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;\nimport com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBinding;\nimport com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBindingArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.Container;\nimport com.pulumi.azure.storage.ContainerArgs;\nimport com.pulumi.azure.containerservice.KubernetesClusterExtension;\nimport com.pulumi.azure.containerservice.KubernetesClusterExtensionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.dataprotection.BackupPolicyKubernetesCluster;\nimport com.pulumi.azure.dataprotection.BackupPolicyKubernetesClusterArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupPolicyKubernetesClusterRetentionRuleArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupPolicyKubernetesClusterRetentionRuleCriteriaArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupPolicyKubernetesClusterDefaultRetentionRuleArgs;\nimport com.pulumi.azure.dataprotection.BackupInstanceKubernetesCluster;\nimport com.pulumi.azure.dataprotection.BackupInstanceKubernetesClusterArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupInstanceKubernetesClusterBackupDatasourceParametersArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n var snap = new ResourceGroup(\"snap\", ResourceGroupArgs.builder()\n .name(\"example-snap\")\n .location(\"West Europe\")\n .build());\n\n var exampleBackupVault = new BackupVault(\"exampleBackupVault\", BackupVaultArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .datastoreType(\"VaultStore\")\n .redundancy(\"LocallyRedundant\")\n .identity(BackupVaultIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKubernetesCluster = new KubernetesCluster(\"exampleKubernetesCluster\", KubernetesClusterArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .dnsPrefix(\"dns\")\n .defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()\n .name(\"default\")\n .nodeCount(1)\n .vmSize(\"Standard_DS2_v2\")\n .hostEncryptionEnabled(true)\n .build())\n .identity(KubernetesClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var aksClusterTrustedAccess = new ClusterTrustedAccessRoleBinding(\"aksClusterTrustedAccess\", ClusterTrustedAccessRoleBindingArgs.builder()\n .kubernetesClusterId(exampleKubernetesCluster.id())\n .name(\"example\")\n .roles(\"Microsoft.DataProtection/backupVaults/backup-operator\")\n .sourceResourceId(exampleBackupVault.id())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleContainer = new Container(\"exampleContainer\", ContainerArgs.builder()\n .name(\"example\")\n .storageAccountName(exampleAccount.name())\n .containerAccessType(\"private\")\n .build());\n\n var exampleKubernetesClusterExtension = new KubernetesClusterExtension(\"exampleKubernetesClusterExtension\", KubernetesClusterExtensionArgs.builder()\n .name(\"example\")\n .clusterId(exampleKubernetesCluster.id())\n .extensionType(\"Microsoft.DataProtection.Kubernetes\")\n .releaseTrain(\"stable\")\n .releaseNamespace(\"dataprotection-microsoft\")\n .configurationSettings(Map.ofEntries(\n Map.entry(\"configuration.backupStorageLocation.bucket\", exampleContainer.name()),\n Map.entry(\"configuration.backupStorageLocation.config.resourceGroup\", example.name()),\n Map.entry(\"configuration.backupStorageLocation.config.storageAccount\", exampleAccount.name()),\n Map.entry(\"configuration.backupStorageLocation.config.subscriptionId\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())),\n Map.entry(\"credentials.tenantId\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n ))\n .build());\n\n var testExtensionAndStorageAccountPermission = new Assignment(\"testExtensionAndStorageAccountPermission\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Storage Account Contributor\")\n .principalId(exampleKubernetesClusterExtension.aksAssignedIdentities().applyValue(aksAssignedIdentities -\u003e aksAssignedIdentities[0].principalId()))\n .build());\n\n var testVaultMsiReadOnCluster = new Assignment(\"testVaultMsiReadOnCluster\", AssignmentArgs.builder()\n .scope(exampleKubernetesCluster.id())\n .roleDefinitionName(\"Reader\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testVaultMsiReadOnSnapRg = new Assignment(\"testVaultMsiReadOnSnapRg\", AssignmentArgs.builder()\n .scope(snap.id())\n .roleDefinitionName(\"Reader\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testVaultMsiSnapshotContributorOnSnapRg = new Assignment(\"testVaultMsiSnapshotContributorOnSnapRg\", AssignmentArgs.builder()\n .scope(snap.id())\n .roleDefinitionName(\"Disk Snapshot Contributor\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testVaultDataOperatorOnSnapRg = new Assignment(\"testVaultDataOperatorOnSnapRg\", AssignmentArgs.builder()\n .scope(snap.id())\n .roleDefinitionName(\"Data Operator for Managed Disks\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testVaultDataContributorOnStorage = new Assignment(\"testVaultDataContributorOnStorage\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Storage Blob Data Contributor\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var testClusterMsiContributorOnSnapRg = new Assignment(\"testClusterMsiContributorOnSnapRg\", AssignmentArgs.builder()\n .scope(snap.id())\n .roleDefinitionName(\"Contributor\")\n .principalId(exampleKubernetesCluster.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var exampleBackupPolicyKubernetesCluster = new BackupPolicyKubernetesCluster(\"exampleBackupPolicyKubernetesCluster\", BackupPolicyKubernetesClusterArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .vaultName(exampleBackupVault.name())\n .backupRepeatingTimeIntervals(\"R/2023-05-23T02:30:00+00:00/P1W\")\n .retentionRules(BackupPolicyKubernetesClusterRetentionRuleArgs.builder()\n .name(\"Daily\")\n .priority(25)\n .lifeCycles(BackupPolicyKubernetesClusterRetentionRuleLifeCycleArgs.builder()\n .duration(\"P84D\")\n .dataStoreType(\"OperationalStore\")\n .build())\n .criteria(BackupPolicyKubernetesClusterRetentionRuleCriteriaArgs.builder()\n .daysOfWeeks(\"Thursday\")\n .monthsOfYears(\"November\")\n .weeksOfMonths(\"First\")\n .scheduledBackupTimes(\"2023-05-23T02:30:00Z\")\n .build())\n .build())\n .defaultRetentionRule(BackupPolicyKubernetesClusterDefaultRetentionRuleArgs.builder()\n .lifeCycles(BackupPolicyKubernetesClusterDefaultRetentionRuleLifeCycleArgs.builder()\n .duration(\"P14D\")\n .dataStoreType(\"OperationalStore\")\n .build())\n .build())\n .build());\n\n var exampleBackupInstanceKubernetesCluster = new BackupInstanceKubernetesCluster(\"exampleBackupInstanceKubernetesCluster\", BackupInstanceKubernetesClusterArgs.builder()\n .name(\"example\")\n .location(example.location())\n .vaultId(exampleBackupVault.id())\n .kubernetesClusterId(exampleKubernetesCluster.id())\n .snapshotResourceGroupName(snap.name())\n .backupPolicyId(exampleBackupPolicyKubernetesCluster.id())\n .backupDatasourceParameters(BackupInstanceKubernetesClusterBackupDatasourceParametersArgs.builder()\n .excludedNamespaces(\"test-excluded-namespaces\")\n .excludedResourceTypes(\"exvolumesnapshotcontents.snapshot.storage.k8s.io\")\n .clusterScopedResourcesEnabled(true)\n .includedNamespaces(\"test-included-namespaces\")\n .includedResourceTypes(\"involumesnapshotcontents.snapshot.storage.k8s.io\")\n .labelSelectors(\"kubernetes.io/metadata.name:test\")\n .volumeSnapshotEnabled(true)\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n testExtensionAndStorageAccountPermission,\n testVaultMsiReadOnCluster,\n testVaultMsiReadOnSnapRg,\n testClusterMsiContributorOnSnapRg,\n testVaultMsiSnapshotContributorOnSnapRg,\n testVaultDataOperatorOnSnapRg,\n testVaultDataContributorOnStorage)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: West Europe\n snap:\n type: azure:core:ResourceGroup\n properties:\n name: example-snap\n location: West Europe\n exampleBackupVault:\n type: azure:dataprotection:BackupVault\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n datastoreType: VaultStore\n redundancy: LocallyRedundant\n identity:\n type: SystemAssigned\n exampleKubernetesCluster:\n type: azure:containerservice:KubernetesCluster\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n dnsPrefix: dns\n defaultNodePool:\n name: default\n nodeCount: 1\n vmSize: Standard_DS2_v2\n hostEncryptionEnabled: true\n identity:\n type: SystemAssigned\n aksClusterTrustedAccess:\n type: azure:containerservice:ClusterTrustedAccessRoleBinding\n name: aks_cluster_trusted_access\n properties:\n kubernetesClusterId: ${exampleKubernetesCluster.id}\n name: example\n roles:\n - Microsoft.DataProtection/backupVaults/backup-operator\n sourceResourceId: ${exampleBackupVault.id}\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleContainer:\n type: azure:storage:Container\n name: example\n properties:\n name: example\n storageAccountName: ${exampleAccount.name}\n containerAccessType: private\n exampleKubernetesClusterExtension:\n type: azure:containerservice:KubernetesClusterExtension\n name: example\n properties:\n name: example\n clusterId: ${exampleKubernetesCluster.id}\n extensionType: Microsoft.DataProtection.Kubernetes\n releaseTrain: stable\n releaseNamespace: dataprotection-microsoft\n configurationSettings:\n configuration.backupStorageLocation.bucket: ${exampleContainer.name}\n configuration.backupStorageLocation.config.resourceGroup: ${example.name}\n configuration.backupStorageLocation.config.storageAccount: ${exampleAccount.name}\n configuration.backupStorageLocation.config.subscriptionId: ${current.subscriptionId}\n credentials.tenantId: ${current.tenantId}\n testExtensionAndStorageAccountPermission:\n type: azure:authorization:Assignment\n name: test_extension_and_storage_account_permission\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Storage Account Contributor\n principalId: ${exampleKubernetesClusterExtension.aksAssignedIdentities[0].principalId}\n testVaultMsiReadOnCluster:\n type: azure:authorization:Assignment\n name: test_vault_msi_read_on_cluster\n properties:\n scope: ${exampleKubernetesCluster.id}\n roleDefinitionName: Reader\n principalId: ${exampleBackupVault.identity.principalId}\n testVaultMsiReadOnSnapRg:\n type: azure:authorization:Assignment\n name: test_vault_msi_read_on_snap_rg\n properties:\n scope: ${snap.id}\n roleDefinitionName: Reader\n principalId: ${exampleBackupVault.identity.principalId}\n testVaultMsiSnapshotContributorOnSnapRg:\n type: azure:authorization:Assignment\n name: test_vault_msi_snapshot_contributor_on_snap_rg\n properties:\n scope: ${snap.id}\n roleDefinitionName: Disk Snapshot Contributor\n principalId: ${exampleBackupVault.identity.principalId}\n testVaultDataOperatorOnSnapRg:\n type: azure:authorization:Assignment\n name: test_vault_data_operator_on_snap_rg\n properties:\n scope: ${snap.id}\n roleDefinitionName: Data Operator for Managed Disks\n principalId: ${exampleBackupVault.identity.principalId}\n testVaultDataContributorOnStorage:\n type: azure:authorization:Assignment\n name: test_vault_data_contributor_on_storage\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Storage Blob Data Contributor\n principalId: ${exampleBackupVault.identity.principalId}\n testClusterMsiContributorOnSnapRg:\n type: azure:authorization:Assignment\n name: test_cluster_msi_contributor_on_snap_rg\n properties:\n scope: ${snap.id}\n roleDefinitionName: Contributor\n principalId: ${exampleKubernetesCluster.identity.principalId}\n exampleBackupPolicyKubernetesCluster:\n type: azure:dataprotection:BackupPolicyKubernetesCluster\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n vaultName: ${exampleBackupVault.name}\n backupRepeatingTimeIntervals:\n - R/2023-05-23T02:30:00+00:00/P1W\n retentionRules:\n - name: Daily\n priority: 25\n lifeCycles:\n - duration: P84D\n dataStoreType: OperationalStore\n criteria:\n daysOfWeeks:\n - Thursday\n monthsOfYears:\n - November\n weeksOfMonths:\n - First\n scheduledBackupTimes:\n - 2023-05-23T02:30:00Z\n defaultRetentionRule:\n lifeCycles:\n - duration: P14D\n dataStoreType: OperationalStore\n exampleBackupInstanceKubernetesCluster:\n type: azure:dataprotection:BackupInstanceKubernetesCluster\n name: example\n properties:\n name: example\n location: ${example.location}\n vaultId: ${exampleBackupVault.id}\n kubernetesClusterId: ${exampleKubernetesCluster.id}\n snapshotResourceGroupName: ${snap.name}\n backupPolicyId: ${exampleBackupPolicyKubernetesCluster.id}\n backupDatasourceParameters:\n excludedNamespaces:\n - test-excluded-namespaces\n excludedResourceTypes:\n - exvolumesnapshotcontents.snapshot.storage.k8s.io\n clusterScopedResourcesEnabled: true\n includedNamespaces:\n - test-included-namespaces\n includedResourceTypes:\n - involumesnapshotcontents.snapshot.storage.k8s.io\n labelSelectors:\n - kubernetes.io/metadata.name:test\n volumeSnapshotEnabled: true\n options:\n dependson:\n - ${testExtensionAndStorageAccountPermission}\n - ${testVaultMsiReadOnCluster}\n - ${testVaultMsiReadOnSnapRg}\n - ${testClusterMsiContributorOnSnapRg}\n - ${testVaultMsiSnapshotContributorOnSnapRg}\n - ${testVaultDataOperatorOnSnapRg}\n - ${testVaultDataContributorOnStorage}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBackup Instance Kubernetes Cluster can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:dataprotection/backupInstanceKubernetesCluster:BackupInstanceKubernetesCluster example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DataProtection/backupVaults/vault1/backupInstances/backupInstance1\n```\n\n", "properties": { "backupDatasourceParameters": { "$ref": "#/types/azure:dataprotection/BackupInstanceKubernetesClusterBackupDatasourceParameters:BackupInstanceKubernetesClusterBackupDatasourceParameters", @@ -172536,7 +172536,7 @@ } }, "azure:dataprotection/backupInstancePostgresql:BackupInstancePostgresql": { - "description": "Manages a Backup Instance to back up PostgreSQL.\n\n\u003e **Note:** Before using this resource, there are some prerequisite permissions for configure backup and restore. See more details from \u003chttps://docs.microsoft.com/azure/backup/backup-azure-database-postgresql#prerequisite-permissions-for-configure-backup-and-restore\u003e.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst exampleServer = new azure.postgresql.Server(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"B_Gen5_2\",\n storageMb: 5120,\n backupRetentionDays: 7,\n geoRedundantBackupEnabled: false,\n autoGrowEnabled: true,\n administratorLogin: \"psqladmin\",\n administratorLoginPassword: \"H@Sh1CoR3!\",\n version: \"9.5\",\n sslEnforcementEnabled: true,\n});\nconst exampleFirewallRule = new azure.postgresql.FirewallRule(\"example\", {\n name: \"AllowAllWindowsAzureIps\",\n resourceGroupName: example.name,\n serverName: exampleServer.name,\n startIpAddress: \"0.0.0.0\",\n endIpAddress: \"0.0.0.0\",\n});\nconst exampleDatabase = new azure.postgresql.Database(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n serverName: exampleServer.name,\n charset: \"UTF8\",\n collation: \"English_United States.1252\",\n});\nconst exampleBackupVault = new azure.dataprotection.BackupVault(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n datastoreType: \"VaultStore\",\n redundancy: \"LocallyRedundant\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n },\n {\n tenantId: exampleBackupVault.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n },\n ],\n});\nconst exampleSecret = new azure.keyvault.Secret(\"example\", {\n name: \"example\",\n value: pulumi.interpolate`Server=${exampleServer.name}.postgres.database.azure.com;Database=${exampleDatabase.name};Port=5432;User Id=psqladmin@${exampleServer.name};Password=H@Sh1CoR3!;Ssl Mode=Require;`,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleBackupPolicyPostgresql = new azure.dataprotection.BackupPolicyPostgresql(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n vaultName: exampleBackupVault.name,\n backupRepeatingTimeIntervals: [\"R/2021-05-23T02:30:00+00:00/P1W\"],\n defaultRetentionDuration: \"P4M\",\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n scope: exampleServer.id,\n roleDefinitionName: \"Reader\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst exampleBackupInstancePostgresql = new azure.dataprotection.BackupInstancePostgresql(\"example\", {\n name: \"example\",\n location: example.location,\n vaultId: exampleBackupVault.id,\n databaseId: exampleDatabase.id,\n backupPolicyId: exampleBackupPolicyPostgresql.id,\n databaseCredentialKeyVaultSecretId: exampleSecret.versionlessId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\nexample_server = azure.postgresql.Server(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"B_Gen5_2\",\n storage_mb=5120,\n backup_retention_days=7,\n geo_redundant_backup_enabled=False,\n auto_grow_enabled=True,\n administrator_login=\"psqladmin\",\n administrator_login_password=\"H@Sh1CoR3!\",\n version=\"9.5\",\n ssl_enforcement_enabled=True)\nexample_firewall_rule = azure.postgresql.FirewallRule(\"example\",\n name=\"AllowAllWindowsAzureIps\",\n resource_group_name=example.name,\n server_name=example_server.name,\n start_ip_address=\"0.0.0.0\",\n end_ip_address=\"0.0.0.0\")\nexample_database = azure.postgresql.Database(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n server_name=example_server.name,\n charset=\"UTF8\",\n collation=\"English_United States.1252\")\nexample_backup_vault = azure.dataprotection.BackupVault(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n datastore_type=\"VaultStore\",\n redundancy=\"LocallyRedundant\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n },\n {\n \"tenant_id\": example_backup_vault.identity.tenant_id,\n \"object_id\": example_backup_vault.identity.principal_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n },\n ])\nexample_secret = azure.keyvault.Secret(\"example\",\n name=\"example\",\n value=pulumi.Output.all(\n exampleServerName=example_server.name,\n exampleDatabaseName=example_database.name,\n exampleServerName1=example_server.name\n).apply(lambda resolved_outputs: f\"Server={resolved_outputs['exampleServerName']}.postgres.database.azure.com;Database={resolved_outputs['exampleDatabaseName']};Port=5432;User Id=psqladmin@{resolved_outputs['exampleServerName1']};Password=H@Sh1CoR3!;Ssl Mode=Require;\")\n,\n key_vault_id=example_key_vault.id)\nexample_backup_policy_postgresql = azure.dataprotection.BackupPolicyPostgresql(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n vault_name=example_backup_vault.name,\n backup_repeating_time_intervals=[\"R/2021-05-23T02:30:00+00:00/P1W\"],\n default_retention_duration=\"P4M\")\nexample_assignment = azure.authorization.Assignment(\"example\",\n scope=example_server.id,\n role_definition_name=\"Reader\",\n principal_id=example_backup_vault.identity.principal_id)\nexample_backup_instance_postgresql = azure.dataprotection.BackupInstancePostgresql(\"example\",\n name=\"example\",\n location=example.location,\n vault_id=example_backup_vault.id,\n database_id=example_database.id,\n backup_policy_id=example_backup_policy_postgresql.id,\n database_credential_key_vault_secret_id=example_secret.versionless_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var exampleServer = new Azure.PostgreSql.Server(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"B_Gen5_2\",\n StorageMb = 5120,\n BackupRetentionDays = 7,\n GeoRedundantBackupEnabled = false,\n AutoGrowEnabled = true,\n AdministratorLogin = \"psqladmin\",\n AdministratorLoginPassword = \"H@Sh1CoR3!\",\n Version = \"9.5\",\n SslEnforcementEnabled = true,\n });\n\n var exampleFirewallRule = new Azure.PostgreSql.FirewallRule(\"example\", new()\n {\n Name = \"AllowAllWindowsAzureIps\",\n ResourceGroupName = example.Name,\n ServerName = exampleServer.Name,\n StartIpAddress = \"0.0.0.0\",\n EndIpAddress = \"0.0.0.0\",\n });\n\n var exampleDatabase = new Azure.PostgreSql.Database(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n ServerName = exampleServer.Name,\n Charset = \"UTF8\",\n Collation = \"English_United States.1252\",\n });\n\n var exampleBackupVault = new Azure.DataProtection.BackupVault(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n DatastoreType = \"VaultStore\",\n Redundancy = \"LocallyRedundant\",\n Identity = new Azure.DataProtection.Inputs.BackupVaultIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n },\n });\n\n var exampleSecret = new Azure.KeyVault.Secret(\"example\", new()\n {\n Name = \"example\",\n Value = Output.Tuple(exampleServer.Name, exampleDatabase.Name, exampleServer.Name).Apply(values =\u003e\n {\n var exampleServerName = values.Item1;\n var exampleDatabaseName = values.Item2;\n var exampleServerName1 = values.Item3;\n return $\"Server={exampleServerName}.postgres.database.azure.com;Database={exampleDatabaseName};Port=5432;User Id=psqladmin@{exampleServerName1};Password=H@Sh1CoR3!;Ssl Mode=Require;\";\n }),\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleBackupPolicyPostgresql = new Azure.DataProtection.BackupPolicyPostgresql(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n VaultName = exampleBackupVault.Name,\n BackupRepeatingTimeIntervals = new[]\n {\n \"R/2021-05-23T02:30:00+00:00/P1W\",\n },\n DefaultRetentionDuration = \"P4M\",\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = exampleServer.Id,\n RoleDefinitionName = \"Reader\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var exampleBackupInstancePostgresql = new Azure.DataProtection.BackupInstancePostgresql(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n VaultId = exampleBackupVault.Id,\n DatabaseId = exampleDatabase.Id,\n BackupPolicyId = exampleBackupPolicyPostgresql.Id,\n DatabaseCredentialKeyVaultSecretId = exampleSecret.VersionlessId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/dataprotection\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/postgresql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := postgresql.NewServer(ctx, \"example\", \u0026postgresql.ServerArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"B_Gen5_2\"),\n\t\t\tStorageMb: pulumi.Int(5120),\n\t\t\tBackupRetentionDays: pulumi.Int(7),\n\t\t\tGeoRedundantBackupEnabled: pulumi.Bool(false),\n\t\t\tAutoGrowEnabled: pulumi.Bool(true),\n\t\t\tAdministratorLogin: pulumi.String(\"psqladmin\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tVersion: pulumi.String(\"9.5\"),\n\t\t\tSslEnforcementEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = postgresql.NewFirewallRule(ctx, \"example\", \u0026postgresql.FirewallRuleArgs{\n\t\t\tName: pulumi.String(\"AllowAllWindowsAzureIps\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServerName: exampleServer.Name,\n\t\t\tStartIpAddress: pulumi.String(\"0.0.0.0\"),\n\t\t\tEndIpAddress: pulumi.String(\"0.0.0.0\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDatabase, err := postgresql.NewDatabase(ctx, \"example\", \u0026postgresql.DatabaseArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServerName: exampleServer.Name,\n\t\t\tCharset: pulumi.String(\"UTF8\"),\n\t\t\tCollation: pulumi.String(\"English_United States.1252\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleBackupVault, err := dataprotection.NewBackupVault(ctx, \"example\", \u0026dataprotection.BackupVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tDatastoreType: pulumi.String(\"VaultStore\"),\n\t\t\tRedundancy: pulumi.String(\"LocallyRedundant\"),\n\t\t\tIdentity: \u0026dataprotection.BackupVaultIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSecret, err := keyvault.NewSecret(ctx, \"example\", \u0026keyvault.SecretArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tValue: pulumi.All(exampleServer.Name, exampleDatabase.Name, exampleServer.Name).ApplyT(func(_args []interface{}) (string, error) {\n\t\t\t\texampleServerName := _args[0].(string)\n\t\t\t\texampleDatabaseName := _args[1].(string)\n\t\t\t\texampleServerName1 := _args[2].(string)\n\t\t\t\treturn fmt.Sprintf(\"Server=%v.postgres.database.azure.com;Database=%v;Port=5432;User Id=psqladmin@%v;Password=H@Sh1CoR3!;Ssl Mode=Require;\", exampleServerName, exampleDatabaseName, exampleServerName1), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleBackupPolicyPostgresql, err := dataprotection.NewBackupPolicyPostgresql(ctx, \"example\", \u0026dataprotection.BackupPolicyPostgresqlArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVaultName: exampleBackupVault.Name,\n\t\t\tBackupRepeatingTimeIntervals: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"R/2021-05-23T02:30:00+00:00/P1W\"),\n\t\t\t},\n\t\t\tDefaultRetentionDuration: pulumi.String(\"P4M\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleServer.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = dataprotection.NewBackupInstancePostgresql(ctx, \"example\", \u0026dataprotection.BackupInstancePostgresqlArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tVaultId: exampleBackupVault.ID(),\n\t\t\tDatabaseId: exampleDatabase.ID(),\n\t\t\tBackupPolicyId: exampleBackupPolicyPostgresql.ID(),\n\t\t\tDatabaseCredentialKeyVaultSecretId: exampleSecret.VersionlessId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.postgresql.Server;\nimport com.pulumi.azure.postgresql.ServerArgs;\nimport com.pulumi.azure.postgresql.FirewallRule;\nimport com.pulumi.azure.postgresql.FirewallRuleArgs;\nimport com.pulumi.azure.postgresql.Database;\nimport com.pulumi.azure.postgresql.DatabaseArgs;\nimport com.pulumi.azure.dataprotection.BackupVault;\nimport com.pulumi.azure.dataprotection.BackupVaultArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupVaultIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Secret;\nimport com.pulumi.azure.keyvault.SecretArgs;\nimport com.pulumi.azure.dataprotection.BackupPolicyPostgresql;\nimport com.pulumi.azure.dataprotection.BackupPolicyPostgresqlArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.dataprotection.BackupInstancePostgresql;\nimport com.pulumi.azure.dataprotection.BackupInstancePostgresqlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"B_Gen5_2\")\n .storageMb(5120)\n .backupRetentionDays(7)\n .geoRedundantBackupEnabled(false)\n .autoGrowEnabled(true)\n .administratorLogin(\"psqladmin\")\n .administratorLoginPassword(\"H@Sh1CoR3!\")\n .version(\"9.5\")\n .sslEnforcementEnabled(true)\n .build());\n\n var exampleFirewallRule = new FirewallRule(\"exampleFirewallRule\", FirewallRuleArgs.builder()\n .name(\"AllowAllWindowsAzureIps\")\n .resourceGroupName(example.name())\n .serverName(exampleServer.name())\n .startIpAddress(\"0.0.0.0\")\n .endIpAddress(\"0.0.0.0\")\n .build());\n\n var exampleDatabase = new Database(\"exampleDatabase\", DatabaseArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .serverName(exampleServer.name())\n .charset(\"UTF8\")\n .collation(\"English_United States.1252\")\n .build());\n\n var exampleBackupVault = new BackupVault(\"exampleBackupVault\", BackupVaultArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .datastoreType(\"VaultStore\")\n .redundancy(\"LocallyRedundant\")\n .identity(BackupVaultIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleBackupVault.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build())\n .build());\n\n var exampleSecret = new Secret(\"exampleSecret\", SecretArgs.builder()\n .name(\"example\")\n .value(Output.tuple(exampleServer.name(), exampleDatabase.name(), exampleServer.name()).applyValue(values -\u003e {\n var exampleServerName = values.t1;\n var exampleDatabaseName = values.t2;\n var exampleServerName1 = values.t3;\n return String.format(\"Server=%s.postgres.database.azure.com;Database=%s;Port=5432;User Id=psqladmin@%s;Password=H@Sh1CoR3!;Ssl Mode=Require;\", exampleServerName,exampleDatabaseName,exampleServerName1);\n }))\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleBackupPolicyPostgresql = new BackupPolicyPostgresql(\"exampleBackupPolicyPostgresql\", BackupPolicyPostgresqlArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .vaultName(exampleBackupVault.name())\n .backupRepeatingTimeIntervals(\"R/2021-05-23T02:30:00+00:00/P1W\")\n .defaultRetentionDuration(\"P4M\")\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .scope(exampleServer.id())\n .roleDefinitionName(\"Reader\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var exampleBackupInstancePostgresql = new BackupInstancePostgresql(\"exampleBackupInstancePostgresql\", BackupInstancePostgresqlArgs.builder()\n .name(\"example\")\n .location(example.location())\n .vaultId(exampleBackupVault.id())\n .databaseId(exampleDatabase.id())\n .backupPolicyId(exampleBackupPolicyPostgresql.id())\n .databaseCredentialKeyVaultSecretId(exampleSecret.versionlessId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: West Europe\n exampleServer:\n type: azure:postgresql:Server\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: B_Gen5_2\n storageMb: 5120\n backupRetentionDays: 7\n geoRedundantBackupEnabled: false\n autoGrowEnabled: true\n administratorLogin: psqladmin\n administratorLoginPassword: H@Sh1CoR3!\n version: '9.5'\n sslEnforcementEnabled: true\n exampleFirewallRule:\n type: azure:postgresql:FirewallRule\n name: example\n properties:\n name: AllowAllWindowsAzureIps\n resourceGroupName: ${example.name}\n serverName: ${exampleServer.name}\n startIpAddress: 0.0.0.0\n endIpAddress: 0.0.0.0\n exampleDatabase:\n type: azure:postgresql:Database\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n serverName: ${exampleServer.name}\n charset: UTF8\n collation: English_United States.1252\n exampleBackupVault:\n type: azure:dataprotection:BackupVault\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n datastoreType: VaultStore\n redundancy: LocallyRedundant\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n - tenantId: ${exampleBackupVault.identity.tenantId}\n objectId: ${exampleBackupVault.identity.principalId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n exampleSecret:\n type: azure:keyvault:Secret\n name: example\n properties:\n name: example\n value: Server=${exampleServer.name}.postgres.database.azure.com;Database=${exampleDatabase.name};Port=5432;User Id=psqladmin@${exampleServer.name};Password=H@Sh1CoR3!;Ssl Mode=Require;\n keyVaultId: ${exampleKeyVault.id}\n exampleBackupPolicyPostgresql:\n type: azure:dataprotection:BackupPolicyPostgresql\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n vaultName: ${exampleBackupVault.name}\n backupRepeatingTimeIntervals:\n - R/2021-05-23T02:30:00+00:00/P1W\n defaultRetentionDuration: P4M\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n scope: ${exampleServer.id}\n roleDefinitionName: Reader\n principalId: ${exampleBackupVault.identity.principalId}\n exampleBackupInstancePostgresql:\n type: azure:dataprotection:BackupInstancePostgresql\n name: example\n properties:\n name: example\n location: ${example.location}\n vaultId: ${exampleBackupVault.id}\n databaseId: ${exampleDatabase.id}\n backupPolicyId: ${exampleBackupPolicyPostgresql.id}\n databaseCredentialKeyVaultSecretId: ${exampleSecret.versionlessId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBackup Instance PostgreSQL can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:dataprotection/backupInstancePostgresql:BackupInstancePostgresql example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DataProtection/backupVaults/vault1/backupInstances/backupInstance1\n```\n\n", + "description": "Manages a Backup Instance to back up PostgreSQL.\n\n\u003e **Note:** Before using this resource, there are some prerequisite permissions for configure backup and restore. See more details from \u003chttps://docs.microsoft.com/azure/backup/backup-azure-database-postgresql#prerequisite-permissions-for-configure-backup-and-restore\u003e.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst exampleServer = new azure.postgresql.Server(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"B_Gen5_2\",\n storageMb: 5120,\n backupRetentionDays: 7,\n geoRedundantBackupEnabled: false,\n autoGrowEnabled: true,\n administratorLogin: \"psqladmin\",\n administratorLoginPassword: \"H@Sh1CoR3!\",\n version: \"9.5\",\n sslEnforcementEnabled: true,\n});\nconst exampleFirewallRule = new azure.postgresql.FirewallRule(\"example\", {\n name: \"AllowAllWindowsAzureIps\",\n resourceGroupName: example.name,\n serverName: exampleServer.name,\n startIpAddress: \"0.0.0.0\",\n endIpAddress: \"0.0.0.0\",\n});\nconst exampleDatabase = new azure.postgresql.Database(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n serverName: exampleServer.name,\n charset: \"UTF8\",\n collation: \"English_United States.1252\",\n});\nconst exampleBackupVault = new azure.dataprotection.BackupVault(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n datastoreType: \"VaultStore\",\n redundancy: \"LocallyRedundant\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n },\n {\n tenantId: exampleBackupVault.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n },\n ],\n});\nconst exampleSecret = new azure.keyvault.Secret(\"example\", {\n name: \"example\",\n value: pulumi.interpolate`Server=${exampleServer.name}.postgres.database.azure.com;Database=${exampleDatabase.name};Port=5432;User Id=psqladmin@${exampleServer.name};Password=H@Sh1CoR3!;Ssl Mode=Require;`,\n keyVaultId: exampleKeyVault.id,\n});\nconst exampleBackupPolicyPostgresql = new azure.dataprotection.BackupPolicyPostgresql(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n vaultName: exampleBackupVault.name,\n backupRepeatingTimeIntervals: [\"R/2021-05-23T02:30:00+00:00/P1W\"],\n defaultRetentionDuration: \"P4M\",\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n scope: exampleServer.id,\n roleDefinitionName: \"Reader\",\n principalId: exampleBackupVault.identity.apply(identity =\u003e identity?.principalId),\n});\nconst exampleBackupInstancePostgresql = new azure.dataprotection.BackupInstancePostgresql(\"example\", {\n name: \"example\",\n location: example.location,\n vaultId: exampleBackupVault.id,\n databaseId: exampleDatabase.id,\n backupPolicyId: exampleBackupPolicyPostgresql.id,\n databaseCredentialKeyVaultSecretId: exampleSecret.versionlessId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\nexample_server = azure.postgresql.Server(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"B_Gen5_2\",\n storage_mb=5120,\n backup_retention_days=7,\n geo_redundant_backup_enabled=False,\n auto_grow_enabled=True,\n administrator_login=\"psqladmin\",\n administrator_login_password=\"H@Sh1CoR3!\",\n version=\"9.5\",\n ssl_enforcement_enabled=True)\nexample_firewall_rule = azure.postgresql.FirewallRule(\"example\",\n name=\"AllowAllWindowsAzureIps\",\n resource_group_name=example.name,\n server_name=example_server.name,\n start_ip_address=\"0.0.0.0\",\n end_ip_address=\"0.0.0.0\")\nexample_database = azure.postgresql.Database(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n server_name=example_server.name,\n charset=\"UTF8\",\n collation=\"English_United States.1252\")\nexample_backup_vault = azure.dataprotection.BackupVault(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n datastore_type=\"VaultStore\",\n redundancy=\"LocallyRedundant\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n },\n {\n \"tenant_id\": example_backup_vault.identity.tenant_id,\n \"object_id\": example_backup_vault.identity.principal_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n },\n ])\nexample_secret = azure.keyvault.Secret(\"example\",\n name=\"example\",\n value=pulumi.Output.all(\n exampleServerName=example_server.name,\n exampleDatabaseName=example_database.name,\n exampleServerName1=example_server.name\n).apply(lambda resolved_outputs: f\"Server={resolved_outputs['exampleServerName']}.postgres.database.azure.com;Database={resolved_outputs['exampleDatabaseName']};Port=5432;User Id=psqladmin@{resolved_outputs['exampleServerName1']};Password=H@Sh1CoR3!;Ssl Mode=Require;\")\n,\n key_vault_id=example_key_vault.id)\nexample_backup_policy_postgresql = azure.dataprotection.BackupPolicyPostgresql(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n vault_name=example_backup_vault.name,\n backup_repeating_time_intervals=[\"R/2021-05-23T02:30:00+00:00/P1W\"],\n default_retention_duration=\"P4M\")\nexample_assignment = azure.authorization.Assignment(\"example\",\n scope=example_server.id,\n role_definition_name=\"Reader\",\n principal_id=example_backup_vault.identity.principal_id)\nexample_backup_instance_postgresql = azure.dataprotection.BackupInstancePostgresql(\"example\",\n name=\"example\",\n location=example.location,\n vault_id=example_backup_vault.id,\n database_id=example_database.id,\n backup_policy_id=example_backup_policy_postgresql.id,\n database_credential_key_vault_secret_id=example_secret.versionless_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var exampleServer = new Azure.PostgreSql.Server(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"B_Gen5_2\",\n StorageMb = 5120,\n BackupRetentionDays = 7,\n GeoRedundantBackupEnabled = false,\n AutoGrowEnabled = true,\n AdministratorLogin = \"psqladmin\",\n AdministratorLoginPassword = \"H@Sh1CoR3!\",\n Version = \"9.5\",\n SslEnforcementEnabled = true,\n });\n\n var exampleFirewallRule = new Azure.PostgreSql.FirewallRule(\"example\", new()\n {\n Name = \"AllowAllWindowsAzureIps\",\n ResourceGroupName = example.Name,\n ServerName = exampleServer.Name,\n StartIpAddress = \"0.0.0.0\",\n EndIpAddress = \"0.0.0.0\",\n });\n\n var exampleDatabase = new Azure.PostgreSql.Database(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n ServerName = exampleServer.Name,\n Charset = \"UTF8\",\n Collation = \"English_United States.1252\",\n });\n\n var exampleBackupVault = new Azure.DataProtection.BackupVault(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n DatastoreType = \"VaultStore\",\n Redundancy = \"LocallyRedundant\",\n Identity = new Azure.DataProtection.Inputs.BackupVaultIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n },\n });\n\n var exampleSecret = new Azure.KeyVault.Secret(\"example\", new()\n {\n Name = \"example\",\n Value = Output.Tuple(exampleServer.Name, exampleDatabase.Name, exampleServer.Name).Apply(values =\u003e\n {\n var exampleServerName = values.Item1;\n var exampleDatabaseName = values.Item2;\n var exampleServerName1 = values.Item3;\n return $\"Server={exampleServerName}.postgres.database.azure.com;Database={exampleDatabaseName};Port=5432;User Id=psqladmin@{exampleServerName1};Password=H@Sh1CoR3!;Ssl Mode=Require;\";\n }),\n KeyVaultId = exampleKeyVault.Id,\n });\n\n var exampleBackupPolicyPostgresql = new Azure.DataProtection.BackupPolicyPostgresql(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n VaultName = exampleBackupVault.Name,\n BackupRepeatingTimeIntervals = new[]\n {\n \"R/2021-05-23T02:30:00+00:00/P1W\",\n },\n DefaultRetentionDuration = \"P4M\",\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = exampleServer.Id,\n RoleDefinitionName = \"Reader\",\n PrincipalId = exampleBackupVault.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var exampleBackupInstancePostgresql = new Azure.DataProtection.BackupInstancePostgresql(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n VaultId = exampleBackupVault.Id,\n DatabaseId = exampleDatabase.Id,\n BackupPolicyId = exampleBackupPolicyPostgresql.Id,\n DatabaseCredentialKeyVaultSecretId = exampleSecret.VersionlessId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/dataprotection\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/postgresql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := postgresql.NewServer(ctx, \"example\", \u0026postgresql.ServerArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"B_Gen5_2\"),\n\t\t\tStorageMb: pulumi.Int(5120),\n\t\t\tBackupRetentionDays: pulumi.Int(7),\n\t\t\tGeoRedundantBackupEnabled: pulumi.Bool(false),\n\t\t\tAutoGrowEnabled: pulumi.Bool(true),\n\t\t\tAdministratorLogin: pulumi.String(\"psqladmin\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tVersion: pulumi.String(\"9.5\"),\n\t\t\tSslEnforcementEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = postgresql.NewFirewallRule(ctx, \"example\", \u0026postgresql.FirewallRuleArgs{\n\t\t\tName: pulumi.String(\"AllowAllWindowsAzureIps\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServerName: exampleServer.Name,\n\t\t\tStartIpAddress: pulumi.String(\"0.0.0.0\"),\n\t\t\tEndIpAddress: pulumi.String(\"0.0.0.0\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDatabase, err := postgresql.NewDatabase(ctx, \"example\", \u0026postgresql.DatabaseArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tServerName: exampleServer.Name,\n\t\t\tCharset: pulumi.String(\"UTF8\"),\n\t\t\tCollation: pulumi.String(\"English_United States.1252\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleBackupVault, err := dataprotection.NewBackupVault(ctx, \"example\", \u0026dataprotection.BackupVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tDatastoreType: pulumi.String(\"VaultStore\"),\n\t\t\tRedundancy: pulumi.String(\"LocallyRedundant\"),\n\t\t\tIdentity: \u0026dataprotection.BackupVaultIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSecret, err := keyvault.NewSecret(ctx, \"example\", \u0026keyvault.SecretArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tValue: pulumi.All(exampleServer.Name, exampleDatabase.Name, exampleServer.Name).ApplyT(func(_args []interface{}) (string, error) {\n\t\t\t\texampleServerName := _args[0].(string)\n\t\t\t\texampleDatabaseName := _args[1].(string)\n\t\t\t\texampleServerName1 := _args[2].(string)\n\t\t\t\treturn fmt.Sprintf(\"Server=%v.postgres.database.azure.com;Database=%v;Port=5432;User Id=psqladmin@%v;Password=H@Sh1CoR3!;Ssl Mode=Require;\", exampleServerName, exampleDatabaseName, exampleServerName1), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleBackupPolicyPostgresql, err := dataprotection.NewBackupPolicyPostgresql(ctx, \"example\", \u0026dataprotection.BackupPolicyPostgresqlArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVaultName: exampleBackupVault.Name,\n\t\t\tBackupRepeatingTimeIntervals: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"R/2021-05-23T02:30:00+00:00/P1W\"),\n\t\t\t},\n\t\t\tDefaultRetentionDuration: pulumi.String(\"P4M\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleServer.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(exampleBackupVault.Identity.ApplyT(func(identity dataprotection.BackupVaultIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = dataprotection.NewBackupInstancePostgresql(ctx, \"example\", \u0026dataprotection.BackupInstancePostgresqlArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tVaultId: exampleBackupVault.ID(),\n\t\t\tDatabaseId: exampleDatabase.ID(),\n\t\t\tBackupPolicyId: exampleBackupPolicyPostgresql.ID(),\n\t\t\tDatabaseCredentialKeyVaultSecretId: exampleSecret.VersionlessId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.postgresql.Server;\nimport com.pulumi.azure.postgresql.ServerArgs;\nimport com.pulumi.azure.postgresql.FirewallRule;\nimport com.pulumi.azure.postgresql.FirewallRuleArgs;\nimport com.pulumi.azure.postgresql.Database;\nimport com.pulumi.azure.postgresql.DatabaseArgs;\nimport com.pulumi.azure.dataprotection.BackupVault;\nimport com.pulumi.azure.dataprotection.BackupVaultArgs;\nimport com.pulumi.azure.dataprotection.inputs.BackupVaultIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Secret;\nimport com.pulumi.azure.keyvault.SecretArgs;\nimport com.pulumi.azure.dataprotection.BackupPolicyPostgresql;\nimport com.pulumi.azure.dataprotection.BackupPolicyPostgresqlArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.dataprotection.BackupInstancePostgresql;\nimport com.pulumi.azure.dataprotection.BackupInstancePostgresqlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"B_Gen5_2\")\n .storageMb(5120)\n .backupRetentionDays(7)\n .geoRedundantBackupEnabled(false)\n .autoGrowEnabled(true)\n .administratorLogin(\"psqladmin\")\n .administratorLoginPassword(\"H@Sh1CoR3!\")\n .version(\"9.5\")\n .sslEnforcementEnabled(true)\n .build());\n\n var exampleFirewallRule = new FirewallRule(\"exampleFirewallRule\", FirewallRuleArgs.builder()\n .name(\"AllowAllWindowsAzureIps\")\n .resourceGroupName(example.name())\n .serverName(exampleServer.name())\n .startIpAddress(\"0.0.0.0\")\n .endIpAddress(\"0.0.0.0\")\n .build());\n\n var exampleDatabase = new Database(\"exampleDatabase\", DatabaseArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .serverName(exampleServer.name())\n .charset(\"UTF8\")\n .collation(\"English_United States.1252\")\n .build());\n\n var exampleBackupVault = new BackupVault(\"exampleBackupVault\", BackupVaultArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .datastoreType(\"VaultStore\")\n .redundancy(\"LocallyRedundant\")\n .identity(BackupVaultIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleBackupVault.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build())\n .build());\n\n var exampleSecret = new Secret(\"exampleSecret\", SecretArgs.builder()\n .name(\"example\")\n .value(Output.tuple(exampleServer.name(), exampleDatabase.name(), exampleServer.name()).applyValue(values -\u003e {\n var exampleServerName = values.t1;\n var exampleDatabaseName = values.t2;\n var exampleServerName1 = values.t3;\n return String.format(\"Server=%s.postgres.database.azure.com;Database=%s;Port=5432;User Id=psqladmin@%s;Password=H@Sh1CoR3!;Ssl Mode=Require;\", exampleServerName,exampleDatabaseName,exampleServerName1);\n }))\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n var exampleBackupPolicyPostgresql = new BackupPolicyPostgresql(\"exampleBackupPolicyPostgresql\", BackupPolicyPostgresqlArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .vaultName(exampleBackupVault.name())\n .backupRepeatingTimeIntervals(\"R/2021-05-23T02:30:00+00:00/P1W\")\n .defaultRetentionDuration(\"P4M\")\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .scope(exampleServer.id())\n .roleDefinitionName(\"Reader\")\n .principalId(exampleBackupVault.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var exampleBackupInstancePostgresql = new BackupInstancePostgresql(\"exampleBackupInstancePostgresql\", BackupInstancePostgresqlArgs.builder()\n .name(\"example\")\n .location(example.location())\n .vaultId(exampleBackupVault.id())\n .databaseId(exampleDatabase.id())\n .backupPolicyId(exampleBackupPolicyPostgresql.id())\n .databaseCredentialKeyVaultSecretId(exampleSecret.versionlessId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: West Europe\n exampleServer:\n type: azure:postgresql:Server\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: B_Gen5_2\n storageMb: 5120\n backupRetentionDays: 7\n geoRedundantBackupEnabled: false\n autoGrowEnabled: true\n administratorLogin: psqladmin\n administratorLoginPassword: H@Sh1CoR3!\n version: '9.5'\n sslEnforcementEnabled: true\n exampleFirewallRule:\n type: azure:postgresql:FirewallRule\n name: example\n properties:\n name: AllowAllWindowsAzureIps\n resourceGroupName: ${example.name}\n serverName: ${exampleServer.name}\n startIpAddress: 0.0.0.0\n endIpAddress: 0.0.0.0\n exampleDatabase:\n type: azure:postgresql:Database\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n serverName: ${exampleServer.name}\n charset: UTF8\n collation: English_United States.1252\n exampleBackupVault:\n type: azure:dataprotection:BackupVault\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n datastoreType: VaultStore\n redundancy: LocallyRedundant\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n - tenantId: ${exampleBackupVault.identity.tenantId}\n objectId: ${exampleBackupVault.identity.principalId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n exampleSecret:\n type: azure:keyvault:Secret\n name: example\n properties:\n name: example\n value: Server=${exampleServer.name}.postgres.database.azure.com;Database=${exampleDatabase.name};Port=5432;User Id=psqladmin@${exampleServer.name};Password=H@Sh1CoR3!;Ssl Mode=Require;\n keyVaultId: ${exampleKeyVault.id}\n exampleBackupPolicyPostgresql:\n type: azure:dataprotection:BackupPolicyPostgresql\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n vaultName: ${exampleBackupVault.name}\n backupRepeatingTimeIntervals:\n - R/2021-05-23T02:30:00+00:00/P1W\n defaultRetentionDuration: P4M\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n scope: ${exampleServer.id}\n roleDefinitionName: Reader\n principalId: ${exampleBackupVault.identity.principalId}\n exampleBackupInstancePostgresql:\n type: azure:dataprotection:BackupInstancePostgresql\n name: example\n properties:\n name: example\n location: ${example.location}\n vaultId: ${exampleBackupVault.id}\n databaseId: ${exampleDatabase.id}\n backupPolicyId: ${exampleBackupPolicyPostgresql.id}\n databaseCredentialKeyVaultSecretId: ${exampleSecret.versionlessId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nBackup Instance PostgreSQL can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:dataprotection/backupInstancePostgresql:BackupInstancePostgresql example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DataProtection/backupVaults/vault1/backupInstances/backupInstance1\n```\n\n", "properties": { "backupPolicyId": { "type": "string", @@ -176140,7 +176140,7 @@ } }, "azure:devcenter/projectEnvironmentType:ProjectEnvironmentType": { - "description": "Manages a Dev Center Project Environment Type.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleDevCenter = new azure.devcenter.DevCenter(\"example\", {\n name: \"example-dc\",\n resourceGroupName: example.name,\n location: example.location,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleEnvironmentType = new azure.devcenter.EnvironmentType(\"example\", {\n name: \"example-et\",\n devCenterId: exampleDevCenter.id,\n});\nconst exampleProject = new azure.devcenter.Project(\"example\", {\n name: \"example-dcp\",\n resourceGroupName: example.name,\n location: example.location,\n devCenterId: exampleDevCenter.id,\n}, {\n dependsOn: [exampleEnvironmentType],\n});\nconst exampleProjectEnvironmentType = new azure.devcenter.ProjectEnvironmentType(\"example\", {\n name: \"example-et\",\n location: example.location,\n devCenterProjectId: exampleProject.id,\n deploymentTargetId: current.then(current =\u003e `/subscriptions/${current.subscriptionId}`),\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_dev_center = azure.devcenter.DevCenter(\"example\",\n name=\"example-dc\",\n resource_group_name=example.name,\n location=example.location,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_environment_type = azure.devcenter.EnvironmentType(\"example\",\n name=\"example-et\",\n dev_center_id=example_dev_center.id)\nexample_project = azure.devcenter.Project(\"example\",\n name=\"example-dcp\",\n resource_group_name=example.name,\n location=example.location,\n dev_center_id=example_dev_center.id,\n opts = pulumi.ResourceOptions(depends_on=[example_environment_type]))\nexample_project_environment_type = azure.devcenter.ProjectEnvironmentType(\"example\",\n name=\"example-et\",\n location=example.location,\n dev_center_project_id=example_project.id,\n deployment_target_id=f\"/subscriptions/{current.subscription_id}\",\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleDevCenter = new Azure.DevCenter.DevCenter(\"example\", new()\n {\n Name = \"example-dc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Identity = new Azure.DevCenter.Inputs.DevCenterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleEnvironmentType = new Azure.DevCenter.EnvironmentType(\"example\", new()\n {\n Name = \"example-et\",\n DevCenterId = exampleDevCenter.Id,\n });\n\n var exampleProject = new Azure.DevCenter.Project(\"example\", new()\n {\n Name = \"example-dcp\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n DevCenterId = exampleDevCenter.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleEnvironmentType,\n },\n });\n\n var exampleProjectEnvironmentType = new Azure.DevCenter.ProjectEnvironmentType(\"example\", new()\n {\n Name = \"example-et\",\n Location = example.Location,\n DevCenterProjectId = exampleProject.Id,\n DeploymentTargetId = $\"/subscriptions/{current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId)}\",\n Identity = new Azure.DevCenter.Inputs.ProjectEnvironmentTypeIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/devcenter\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDevCenter, err := devcenter.NewDevCenter(ctx, \"example\", \u0026devcenter.DevCenterArgs{\n\t\t\tName: pulumi.String(\"example-dc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tIdentity: \u0026devcenter.DevCenterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEnvironmentType, err := devcenter.NewEnvironmentType(ctx, \"example\", \u0026devcenter.EnvironmentTypeArgs{\n\t\t\tName: pulumi.String(\"example-et\"),\n\t\t\tDevCenterId: exampleDevCenter.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleProject, err := devcenter.NewProject(ctx, \"example\", \u0026devcenter.ProjectArgs{\n\t\t\tName: pulumi.String(\"example-dcp\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tDevCenterId: exampleDevCenter.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleEnvironmentType,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = devcenter.NewProjectEnvironmentType(ctx, \"example\", \u0026devcenter.ProjectEnvironmentTypeArgs{\n\t\t\tName: pulumi.String(\"example-et\"),\n\t\t\tLocation: example.Location,\n\t\t\tDevCenterProjectId: exampleProject.ID(),\n\t\t\tDeploymentTargetId: pulumi.Sprintf(\"/subscriptions/%v\", current.SubscriptionId),\n\t\t\tIdentity: \u0026devcenter.ProjectEnvironmentTypeIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.devcenter.DevCenter;\nimport com.pulumi.azure.devcenter.DevCenterArgs;\nimport com.pulumi.azure.devcenter.inputs.DevCenterIdentityArgs;\nimport com.pulumi.azure.devcenter.EnvironmentType;\nimport com.pulumi.azure.devcenter.EnvironmentTypeArgs;\nimport com.pulumi.azure.devcenter.Project;\nimport com.pulumi.azure.devcenter.ProjectArgs;\nimport com.pulumi.azure.devcenter.ProjectEnvironmentType;\nimport com.pulumi.azure.devcenter.ProjectEnvironmentTypeArgs;\nimport com.pulumi.azure.devcenter.inputs.ProjectEnvironmentTypeIdentityArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleDevCenter = new DevCenter(\"exampleDevCenter\", DevCenterArgs.builder()\n .name(\"example-dc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .identity(DevCenterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleEnvironmentType = new EnvironmentType(\"exampleEnvironmentType\", EnvironmentTypeArgs.builder()\n .name(\"example-et\")\n .devCenterId(exampleDevCenter.id())\n .build());\n\n var exampleProject = new Project(\"exampleProject\", ProjectArgs.builder()\n .name(\"example-dcp\")\n .resourceGroupName(example.name())\n .location(example.location())\n .devCenterId(exampleDevCenter.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleEnvironmentType)\n .build());\n\n var exampleProjectEnvironmentType = new ProjectEnvironmentType(\"exampleProjectEnvironmentType\", ProjectEnvironmentTypeArgs.builder()\n .name(\"example-et\")\n .location(example.location())\n .devCenterProjectId(exampleProject.id())\n .deploymentTargetId(String.format(\"/subscriptions/%s\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())))\n .identity(ProjectEnvironmentTypeIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleDevCenter:\n type: azure:devcenter:DevCenter\n name: example\n properties:\n name: example-dc\n resourceGroupName: ${example.name}\n location: ${example.location}\n identity:\n type: SystemAssigned\n exampleEnvironmentType:\n type: azure:devcenter:EnvironmentType\n name: example\n properties:\n name: example-et\n devCenterId: ${exampleDevCenter.id}\n exampleProject:\n type: azure:devcenter:Project\n name: example\n properties:\n name: example-dcp\n resourceGroupName: ${example.name}\n location: ${example.location}\n devCenterId: ${exampleDevCenter.id}\n options:\n dependson:\n - ${exampleEnvironmentType}\n exampleProjectEnvironmentType:\n type: azure:devcenter:ProjectEnvironmentType\n name: example\n properties:\n name: example-et\n location: ${example.location}\n devCenterProjectId: ${exampleProject.id}\n deploymentTargetId: /subscriptions/${current.subscriptionId}\n identity:\n type: SystemAssigned\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn existing Dev Center Project Environment Type can be imported into Pulumi using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:devcenter/projectEnvironmentType:ProjectEnvironmentType example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DevCenter/projects/project1/environmentTypes/et1\n```\n\n", + "description": "Manages a Dev Center Project Environment Type.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleDevCenter = new azure.devcenter.DevCenter(\"example\", {\n name: \"example-dc\",\n resourceGroupName: example.name,\n location: example.location,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleEnvironmentType = new azure.devcenter.EnvironmentType(\"example\", {\n name: \"example-et\",\n devCenterId: exampleDevCenter.id,\n});\nconst exampleProject = new azure.devcenter.Project(\"example\", {\n name: \"example-dcp\",\n resourceGroupName: example.name,\n location: example.location,\n devCenterId: exampleDevCenter.id,\n}, {\n dependsOn: [exampleEnvironmentType],\n});\nconst exampleProjectEnvironmentType = new azure.devcenter.ProjectEnvironmentType(\"example\", {\n name: \"example-et\",\n location: example.location,\n devCenterProjectId: exampleProject.id,\n deploymentTargetId: current.then(current =\u003e `/subscriptions/${current.subscriptionId}`),\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_dev_center = azure.devcenter.DevCenter(\"example\",\n name=\"example-dc\",\n resource_group_name=example.name,\n location=example.location,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_environment_type = azure.devcenter.EnvironmentType(\"example\",\n name=\"example-et\",\n dev_center_id=example_dev_center.id)\nexample_project = azure.devcenter.Project(\"example\",\n name=\"example-dcp\",\n resource_group_name=example.name,\n location=example.location,\n dev_center_id=example_dev_center.id,\n opts = pulumi.ResourceOptions(depends_on=[example_environment_type]))\nexample_project_environment_type = azure.devcenter.ProjectEnvironmentType(\"example\",\n name=\"example-et\",\n location=example.location,\n dev_center_project_id=example_project.id,\n deployment_target_id=f\"/subscriptions/{current.subscription_id}\",\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleDevCenter = new Azure.DevCenter.DevCenter(\"example\", new()\n {\n Name = \"example-dc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Identity = new Azure.DevCenter.Inputs.DevCenterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleEnvironmentType = new Azure.DevCenter.EnvironmentType(\"example\", new()\n {\n Name = \"example-et\",\n DevCenterId = exampleDevCenter.Id,\n });\n\n var exampleProject = new Azure.DevCenter.Project(\"example\", new()\n {\n Name = \"example-dcp\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n DevCenterId = exampleDevCenter.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleEnvironmentType,\n },\n });\n\n var exampleProjectEnvironmentType = new Azure.DevCenter.ProjectEnvironmentType(\"example\", new()\n {\n Name = \"example-et\",\n Location = example.Location,\n DevCenterProjectId = exampleProject.Id,\n DeploymentTargetId = $\"/subscriptions/{current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId)}\",\n Identity = new Azure.DevCenter.Inputs.ProjectEnvironmentTypeIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/devcenter\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDevCenter, err := devcenter.NewDevCenter(ctx, \"example\", \u0026devcenter.DevCenterArgs{\n\t\t\tName: pulumi.String(\"example-dc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tIdentity: \u0026devcenter.DevCenterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEnvironmentType, err := devcenter.NewEnvironmentType(ctx, \"example\", \u0026devcenter.EnvironmentTypeArgs{\n\t\t\tName: pulumi.String(\"example-et\"),\n\t\t\tDevCenterId: exampleDevCenter.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleProject, err := devcenter.NewProject(ctx, \"example\", \u0026devcenter.ProjectArgs{\n\t\t\tName: pulumi.String(\"example-dcp\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tDevCenterId: exampleDevCenter.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleEnvironmentType,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = devcenter.NewProjectEnvironmentType(ctx, \"example\", \u0026devcenter.ProjectEnvironmentTypeArgs{\n\t\t\tName: pulumi.String(\"example-et\"),\n\t\t\tLocation: example.Location,\n\t\t\tDevCenterProjectId: exampleProject.ID(),\n\t\t\tDeploymentTargetId: pulumi.Sprintf(\"/subscriptions/%v\", current.SubscriptionId),\n\t\t\tIdentity: \u0026devcenter.ProjectEnvironmentTypeIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.devcenter.DevCenter;\nimport com.pulumi.azure.devcenter.DevCenterArgs;\nimport com.pulumi.azure.devcenter.inputs.DevCenterIdentityArgs;\nimport com.pulumi.azure.devcenter.EnvironmentType;\nimport com.pulumi.azure.devcenter.EnvironmentTypeArgs;\nimport com.pulumi.azure.devcenter.Project;\nimport com.pulumi.azure.devcenter.ProjectArgs;\nimport com.pulumi.azure.devcenter.ProjectEnvironmentType;\nimport com.pulumi.azure.devcenter.ProjectEnvironmentTypeArgs;\nimport com.pulumi.azure.devcenter.inputs.ProjectEnvironmentTypeIdentityArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleDevCenter = new DevCenter(\"exampleDevCenter\", DevCenterArgs.builder()\n .name(\"example-dc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .identity(DevCenterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleEnvironmentType = new EnvironmentType(\"exampleEnvironmentType\", EnvironmentTypeArgs.builder()\n .name(\"example-et\")\n .devCenterId(exampleDevCenter.id())\n .build());\n\n var exampleProject = new Project(\"exampleProject\", ProjectArgs.builder()\n .name(\"example-dcp\")\n .resourceGroupName(example.name())\n .location(example.location())\n .devCenterId(exampleDevCenter.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleEnvironmentType)\n .build());\n\n var exampleProjectEnvironmentType = new ProjectEnvironmentType(\"exampleProjectEnvironmentType\", ProjectEnvironmentTypeArgs.builder()\n .name(\"example-et\")\n .location(example.location())\n .devCenterProjectId(exampleProject.id())\n .deploymentTargetId(String.format(\"/subscriptions/%s\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())))\n .identity(ProjectEnvironmentTypeIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleDevCenter:\n type: azure:devcenter:DevCenter\n name: example\n properties:\n name: example-dc\n resourceGroupName: ${example.name}\n location: ${example.location}\n identity:\n type: SystemAssigned\n exampleEnvironmentType:\n type: azure:devcenter:EnvironmentType\n name: example\n properties:\n name: example-et\n devCenterId: ${exampleDevCenter.id}\n exampleProject:\n type: azure:devcenter:Project\n name: example\n properties:\n name: example-dcp\n resourceGroupName: ${example.name}\n location: ${example.location}\n devCenterId: ${exampleDevCenter.id}\n options:\n dependson:\n - ${exampleEnvironmentType}\n exampleProjectEnvironmentType:\n type: azure:devcenter:ProjectEnvironmentType\n name: example\n properties:\n name: example-et\n location: ${example.location}\n devCenterProjectId: ${exampleProject.id}\n deploymentTargetId: /subscriptions/${current.subscriptionId}\n identity:\n type: SystemAssigned\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn existing Dev Center Project Environment Type can be imported into Pulumi using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:devcenter/projectEnvironmentType:ProjectEnvironmentType example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DevCenter/projects/project1/environmentTypes/et1\n```\n\n", "properties": { "creatorRoleAssignmentRoles": { "type": "array", @@ -177014,7 +177014,7 @@ } }, "azure:devtest/schedule:Schedule": { - "description": "Manages automated startup and shutdown schedules for Azure Dev Test Lab.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleLab = new azure.devtest.Lab(\"example\", {\n name: \"YourDevTestLab\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSchedule = new azure.devtest.Schedule(\"example\", {\n name: \"LabVmAutoStart\",\n location: example.location,\n resourceGroupName: example.name,\n labName: exampleLab.name,\n status: \"Enabled\",\n weeklyRecurrence: {\n time: \"1100\",\n weekDays: [\n \"Monday\",\n \"Tuesday\",\n ],\n },\n timeZoneId: \"Pacific Standard Time\",\n taskType: \"LabVmsStartupTask\",\n notificationSettings: {},\n tags: {\n environment: \"Production\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_lab = azure.devtest.Lab(\"example\",\n name=\"YourDevTestLab\",\n location=example.location,\n resource_group_name=example.name)\nexample_schedule = azure.devtest.Schedule(\"example\",\n name=\"LabVmAutoStart\",\n location=example.location,\n resource_group_name=example.name,\n lab_name=example_lab.name,\n status=\"Enabled\",\n weekly_recurrence={\n \"time\": \"1100\",\n \"week_days\": [\n \"Monday\",\n \"Tuesday\",\n ],\n },\n time_zone_id=\"Pacific Standard Time\",\n task_type=\"LabVmsStartupTask\",\n notification_settings={},\n tags={\n \"environment\": \"Production\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleLab = new Azure.DevTest.Lab(\"example\", new()\n {\n Name = \"YourDevTestLab\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSchedule = new Azure.DevTest.Schedule(\"example\", new()\n {\n Name = \"LabVmAutoStart\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n LabName = exampleLab.Name,\n Status = \"Enabled\",\n WeeklyRecurrence = new Azure.DevTest.Inputs.ScheduleWeeklyRecurrenceArgs\n {\n Time = \"1100\",\n WeekDays = new[]\n {\n \"Monday\",\n \"Tuesday\",\n },\n },\n TimeZoneId = \"Pacific Standard Time\",\n TaskType = \"LabVmsStartupTask\",\n NotificationSettings = null,\n Tags = \n {\n { \"environment\", \"Production\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/devtest\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLab, err := devtest.NewLab(ctx, \"example\", \u0026devtest.LabArgs{\n\t\t\tName: pulumi.String(\"YourDevTestLab\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = devtest.NewSchedule(ctx, \"example\", \u0026devtest.ScheduleArgs{\n\t\t\tName: pulumi.String(\"LabVmAutoStart\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLabName: exampleLab.Name,\n\t\t\tStatus: pulumi.String(\"Enabled\"),\n\t\t\tWeeklyRecurrence: \u0026devtest.ScheduleWeeklyRecurrenceArgs{\n\t\t\t\tTime: pulumi.String(\"1100\"),\n\t\t\t\tWeekDays: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"Monday\"),\n\t\t\t\t\tpulumi.String(\"Tuesday\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tTimeZoneId: pulumi.String(\"Pacific Standard Time\"),\n\t\t\tTaskType: pulumi.String(\"LabVmsStartupTask\"),\n\t\t\tNotificationSettings: nil,\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.devtest.Lab;\nimport com.pulumi.azure.devtest.LabArgs;\nimport com.pulumi.azure.devtest.Schedule;\nimport com.pulumi.azure.devtest.ScheduleArgs;\nimport com.pulumi.azure.devtest.inputs.ScheduleWeeklyRecurrenceArgs;\nimport com.pulumi.azure.devtest.inputs.ScheduleNotificationSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleLab = new Lab(\"exampleLab\", LabArgs.builder()\n .name(\"YourDevTestLab\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSchedule = new Schedule(\"exampleSchedule\", ScheduleArgs.builder()\n .name(\"LabVmAutoStart\")\n .location(example.location())\n .resourceGroupName(example.name())\n .labName(exampleLab.name())\n .status(\"Enabled\")\n .weeklyRecurrence(ScheduleWeeklyRecurrenceArgs.builder()\n .time(\"1100\")\n .weekDays( \n \"Monday\",\n \"Tuesday\")\n .build())\n .timeZoneId(\"Pacific Standard Time\")\n .taskType(\"LabVmsStartupTask\")\n .notificationSettings()\n .tags(Map.of(\"environment\", \"Production\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleLab:\n type: azure:devtest:Lab\n name: example\n properties:\n name: YourDevTestLab\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSchedule:\n type: azure:devtest:Schedule\n name: example\n properties:\n name: LabVmAutoStart\n location: ${example.location}\n resourceGroupName: ${example.name}\n labName: ${exampleLab.name}\n status: Enabled\n weeklyRecurrence:\n time: '1100'\n weekDays:\n - Monday\n - Tuesday\n timeZoneId: Pacific Standard Time\n taskType: LabVmsStartupTask\n notificationSettings: {}\n tags:\n environment: Production\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDevTest Schedule's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:devtest/schedule:Schedule example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.DevTestLab/labs/myDevTestLab/schedules/labvmautostart\n```\n\n", + "description": "Manages automated startup and shutdown schedules for Azure Dev Test Lab.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleLab = new azure.devtest.Lab(\"example\", {\n name: \"YourDevTestLab\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSchedule = new azure.devtest.Schedule(\"example\", {\n name: \"LabVmAutoStart\",\n location: example.location,\n resourceGroupName: example.name,\n labName: exampleLab.name,\n status: \"Enabled\",\n weeklyRecurrence: {\n time: \"1100\",\n weekDays: [\n \"Monday\",\n \"Tuesday\",\n ],\n },\n timeZoneId: \"Pacific Standard Time\",\n taskType: \"LabVmsStartupTask\",\n notificationSettings: {},\n tags: {\n environment: \"Production\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_lab = azure.devtest.Lab(\"example\",\n name=\"YourDevTestLab\",\n location=example.location,\n resource_group_name=example.name)\nexample_schedule = azure.devtest.Schedule(\"example\",\n name=\"LabVmAutoStart\",\n location=example.location,\n resource_group_name=example.name,\n lab_name=example_lab.name,\n status=\"Enabled\",\n weekly_recurrence={\n \"time\": \"1100\",\n \"week_days\": [\n \"Monday\",\n \"Tuesday\",\n ],\n },\n time_zone_id=\"Pacific Standard Time\",\n task_type=\"LabVmsStartupTask\",\n notification_settings={},\n tags={\n \"environment\": \"Production\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleLab = new Azure.DevTest.Lab(\"example\", new()\n {\n Name = \"YourDevTestLab\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSchedule = new Azure.DevTest.Schedule(\"example\", new()\n {\n Name = \"LabVmAutoStart\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n LabName = exampleLab.Name,\n Status = \"Enabled\",\n WeeklyRecurrence = new Azure.DevTest.Inputs.ScheduleWeeklyRecurrenceArgs\n {\n Time = \"1100\",\n WeekDays = new[]\n {\n \"Monday\",\n \"Tuesday\",\n },\n },\n TimeZoneId = \"Pacific Standard Time\",\n TaskType = \"LabVmsStartupTask\",\n NotificationSettings = null,\n Tags = \n {\n { \"environment\", \"Production\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/devtest\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleLab, err := devtest.NewLab(ctx, \"example\", \u0026devtest.LabArgs{\n\t\t\tName: pulumi.String(\"YourDevTestLab\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = devtest.NewSchedule(ctx, \"example\", \u0026devtest.ScheduleArgs{\n\t\t\tName: pulumi.String(\"LabVmAutoStart\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLabName: exampleLab.Name,\n\t\t\tStatus: pulumi.String(\"Enabled\"),\n\t\t\tWeeklyRecurrence: \u0026devtest.ScheduleWeeklyRecurrenceArgs{\n\t\t\t\tTime: pulumi.String(\"1100\"),\n\t\t\t\tWeekDays: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"Monday\"),\n\t\t\t\t\tpulumi.String(\"Tuesday\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tTimeZoneId: pulumi.String(\"Pacific Standard Time\"),\n\t\t\tTaskType: pulumi.String(\"LabVmsStartupTask\"),\n\t\t\tNotificationSettings: \u0026devtest.ScheduleNotificationSettingsArgs{},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.devtest.Lab;\nimport com.pulumi.azure.devtest.LabArgs;\nimport com.pulumi.azure.devtest.Schedule;\nimport com.pulumi.azure.devtest.ScheduleArgs;\nimport com.pulumi.azure.devtest.inputs.ScheduleWeeklyRecurrenceArgs;\nimport com.pulumi.azure.devtest.inputs.ScheduleNotificationSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleLab = new Lab(\"exampleLab\", LabArgs.builder()\n .name(\"YourDevTestLab\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSchedule = new Schedule(\"exampleSchedule\", ScheduleArgs.builder()\n .name(\"LabVmAutoStart\")\n .location(example.location())\n .resourceGroupName(example.name())\n .labName(exampleLab.name())\n .status(\"Enabled\")\n .weeklyRecurrence(ScheduleWeeklyRecurrenceArgs.builder()\n .time(\"1100\")\n .weekDays( \n \"Monday\",\n \"Tuesday\")\n .build())\n .timeZoneId(\"Pacific Standard Time\")\n .taskType(\"LabVmsStartupTask\")\n .notificationSettings()\n .tags(Map.of(\"environment\", \"Production\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleLab:\n type: azure:devtest:Lab\n name: example\n properties:\n name: YourDevTestLab\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSchedule:\n type: azure:devtest:Schedule\n name: example\n properties:\n name: LabVmAutoStart\n location: ${example.location}\n resourceGroupName: ${example.name}\n labName: ${exampleLab.name}\n status: Enabled\n weeklyRecurrence:\n time: '1100'\n weekDays:\n - Monday\n - Tuesday\n timeZoneId: Pacific Standard Time\n taskType: LabVmsStartupTask\n notificationSettings: {}\n tags:\n environment: Production\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDevTest Schedule's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:devtest/schedule:Schedule example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.DevTestLab/labs/myDevTestLab/schedules/labvmautostart\n```\n\n", "properties": { "dailyRecurrence": { "$ref": "#/types/azure:devtest/ScheduleDailyRecurrence:ScheduleDailyRecurrence", @@ -180434,7 +180434,7 @@ } }, "azure:elasticsan/volumeGroup:VolumeGroup": { - "description": "Manages an Elastic SAN Volume Group resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst exampleElasticSan = new azure.elasticsan.ElasticSan(\"example\", {\n name: \"examplees-es\",\n resourceGroupName: example.name,\n location: example.location,\n baseSizeInTib: 1,\n sku: {\n name: \"Premium_LRS\",\n },\n});\nconst current = azure.core.getClientConfig({});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"example-uai\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.0.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.1.0/24\"],\n serviceEndpoints: [\"Microsoft.Storage.Global\"],\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: true,\n skuName: \"standard\",\n});\nconst userAssignedIdentity = new azure.keyvault.AccessPolicy(\"userAssignedIdentity\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-kvk\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n userAssignedIdentity,\n client,\n ],\n});\nconst exampleVolumeGroup = new azure.elasticsan.VolumeGroup(\"example\", {\n name: \"example-esvg\",\n elasticSanId: exampleElasticSan.id,\n encryptionType: \"EncryptionAtRestWithCustomerManagedKey\",\n encryption: {\n keyVaultKeyId: exampleKey.versionlessId,\n userAssignedIdentityId: exampleUserAssignedIdentity.id,\n },\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n networkRules: [{\n subnetId: exampleSubnet.id,\n action: \"Allow\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\nexample_elastic_san = azure.elasticsan.ElasticSan(\"example\",\n name=\"examplees-es\",\n resource_group_name=example.name,\n location=example.location,\n base_size_in_tib=1,\n sku={\n \"name\": \"Premium_LRS\",\n })\ncurrent = azure.core.get_client_config()\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"example-uai\",\n location=example.location,\n resource_group_name=example.name)\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.0.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.1.0/24\"],\n service_endpoints=[\"Microsoft.Storage.Global\"])\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=True,\n sku_name=\"standard\")\nuser_assigned_identity = azure.keyvault.AccessPolicy(\"userAssignedIdentity\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_user_assigned_identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secret_permissions=[\"Get\"])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secret_permissions=[\"Get\"])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-kvk\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n user_assigned_identity,\n client,\n ]))\nexample_volume_group = azure.elasticsan.VolumeGroup(\"example\",\n name=\"example-esvg\",\n elastic_san_id=example_elastic_san.id,\n encryption_type=\"EncryptionAtRestWithCustomerManagedKey\",\n encryption={\n \"key_vault_key_id\": example_key.versionless_id,\n \"user_assigned_identity_id\": example_user_assigned_identity.id,\n },\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n network_rules=[{\n \"subnet_id\": example_subnet.id,\n \"action\": \"Allow\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var exampleElasticSan = new Azure.ElasticSan.ElasticSan(\"example\", new()\n {\n Name = \"examplees-es\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n BaseSizeInTib = 1,\n Sku = new Azure.ElasticSan.Inputs.ElasticSanSkuArgs\n {\n Name = \"Premium_LRS\",\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"example-uai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.1.0/24\",\n },\n ServiceEndpoints = new[]\n {\n \"Microsoft.Storage.Global\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = true,\n SkuName = \"standard\",\n });\n\n var userAssignedIdentity = new Azure.KeyVault.AccessPolicy(\"userAssignedIdentity\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-kvk\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n userAssignedIdentity,\n client,\n },\n });\n\n var exampleVolumeGroup = new Azure.ElasticSan.VolumeGroup(\"example\", new()\n {\n Name = \"example-esvg\",\n ElasticSanId = exampleElasticSan.Id,\n EncryptionType = \"EncryptionAtRestWithCustomerManagedKey\",\n Encryption = new Azure.ElasticSan.Inputs.VolumeGroupEncryptionArgs\n {\n KeyVaultKeyId = exampleKey.VersionlessId,\n UserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n },\n Identity = new Azure.ElasticSan.Inputs.VolumeGroupIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n NetworkRules = new[]\n {\n new Azure.ElasticSan.Inputs.VolumeGroupNetworkRuleArgs\n {\n SubnetId = exampleSubnet.Id,\n Action = \"Allow\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/elasticsan\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleElasticSan, err := elasticsan.NewElasticSan(ctx, \"example\", \u0026elasticsan.ElasticSanArgs{\n\t\t\tName: pulumi.String(\"examplees-es\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tBaseSizeInTib: pulumi.Int(1),\n\t\t\tSku: \u0026elasticsan.ElasticSanSkuArgs{\n\t\t\t\tName: pulumi.String(\"Premium_LRS\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"example-uai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.1.0/24\"),\n\t\t\t},\n\t\t\tServiceEndpoints: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Microsoft.Storage.Global\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tuserAssignedIdentity, err := keyvault.NewAccessPolicy(ctx, \"userAssignedIdentity\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-kvk\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tuserAssignedIdentity,\n\t\t\tclient,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = elasticsan.NewVolumeGroup(ctx, \"example\", \u0026elasticsan.VolumeGroupArgs{\n\t\t\tName: pulumi.String(\"example-esvg\"),\n\t\t\tElasticSanId: exampleElasticSan.ID(),\n\t\t\tEncryptionType: pulumi.String(\"EncryptionAtRestWithCustomerManagedKey\"),\n\t\t\tEncryption: \u0026elasticsan.VolumeGroupEncryptionArgs{\n\t\t\t\tKeyVaultKeyId: exampleKey.VersionlessId,\n\t\t\t\tUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t\t},\n\t\t\tIdentity: \u0026elasticsan.VolumeGroupIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tNetworkRules: elasticsan.VolumeGroupNetworkRuleArray{\n\t\t\t\t\u0026elasticsan.VolumeGroupNetworkRuleArgs{\n\t\t\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\t\t\tAction: pulumi.String(\"Allow\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.elasticsan.ElasticSan;\nimport com.pulumi.azure.elasticsan.ElasticSanArgs;\nimport com.pulumi.azure.elasticsan.inputs.ElasticSanSkuArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.elasticsan.VolumeGroup;\nimport com.pulumi.azure.elasticsan.VolumeGroupArgs;\nimport com.pulumi.azure.elasticsan.inputs.VolumeGroupEncryptionArgs;\nimport com.pulumi.azure.elasticsan.inputs.VolumeGroupIdentityArgs;\nimport com.pulumi.azure.elasticsan.inputs.VolumeGroupNetworkRuleArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n var exampleElasticSan = new ElasticSan(\"exampleElasticSan\", ElasticSanArgs.builder()\n .name(\"examplees-es\")\n .resourceGroupName(example.name())\n .location(example.location())\n .baseSizeInTib(1)\n .sku(ElasticSanSkuArgs.builder()\n .name(\"Premium_LRS\")\n .build())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"example-uai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.0.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.1.0/24\")\n .serviceEndpoints(\"Microsoft.Storage.Global\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(true)\n .skuName(\"standard\")\n .build());\n\n var userAssignedIdentity = new AccessPolicy(\"userAssignedIdentity\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .secretPermissions(\"Get\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Get\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-kvk\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n userAssignedIdentity,\n client)\n .build());\n\n var exampleVolumeGroup = new VolumeGroup(\"exampleVolumeGroup\", VolumeGroupArgs.builder()\n .name(\"example-esvg\")\n .elasticSanId(exampleElasticSan.id())\n .encryptionType(\"EncryptionAtRestWithCustomerManagedKey\")\n .encryption(VolumeGroupEncryptionArgs.builder()\n .keyVaultKeyId(exampleKey.versionlessId())\n .userAssignedIdentityId(exampleUserAssignedIdentity.id())\n .build())\n .identity(VolumeGroupIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .networkRules(VolumeGroupNetworkRuleArgs.builder()\n .subnetId(exampleSubnet.id())\n .action(\"Allow\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n exampleElasticSan:\n type: azure:elasticsan:ElasticSan\n name: example\n properties:\n name: examplees-es\n resourceGroupName: ${example.name}\n location: ${example.location}\n baseSizeInTib: 1\n sku:\n name: Premium_LRS\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: example-uai\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.0.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.1.0/24\n serviceEndpoints:\n - Microsoft.Storage.Global\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: true\n skuName: standard\n userAssignedIdentity:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n secretPermissions:\n - Get\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n secretPermissions:\n - Get\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-kvk\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${userAssignedIdentity}\n - ${client}\n exampleVolumeGroup:\n type: azure:elasticsan:VolumeGroup\n name: example\n properties:\n name: example-esvg\n elasticSanId: ${exampleElasticSan.id}\n encryptionType: EncryptionAtRestWithCustomerManagedKey\n encryption:\n keyVaultKeyId: ${exampleKey.versionlessId}\n userAssignedIdentityId: ${exampleUserAssignedIdentity.id}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n networkRules:\n - subnetId: ${exampleSubnet.id}\n action: Allow\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn existing Elastic SAN Volume Group can be imported into Pulumi using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:elasticsan/volumeGroup:VolumeGroup example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg1/providers/Microsoft.ElasticSan/elasticSans/esan1/volumeGroups/vg1\n```\n\n", + "description": "Manages an Elastic SAN Volume Group resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst exampleElasticSan = new azure.elasticsan.ElasticSan(\"example\", {\n name: \"examplees-es\",\n resourceGroupName: example.name,\n location: example.location,\n baseSizeInTib: 1,\n sku: {\n name: \"Premium_LRS\",\n },\n});\nconst current = azure.core.getClientConfig({});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"example-uai\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.0.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.1.0/24\"],\n serviceEndpoints: [\"Microsoft.Storage.Global\"],\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: true,\n skuName: \"standard\",\n});\nconst userAssignedIdentity = new azure.keyvault.AccessPolicy(\"userAssignedIdentity\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-kvk\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n userAssignedIdentity,\n client,\n ],\n});\nconst exampleVolumeGroup = new azure.elasticsan.VolumeGroup(\"example\", {\n name: \"example-esvg\",\n elasticSanId: exampleElasticSan.id,\n encryptionType: \"EncryptionAtRestWithCustomerManagedKey\",\n encryption: {\n keyVaultKeyId: exampleKey.versionlessId,\n userAssignedIdentityId: exampleUserAssignedIdentity.id,\n },\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n networkRules: [{\n subnetId: exampleSubnet.id,\n action: \"Allow\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\nexample_elastic_san = azure.elasticsan.ElasticSan(\"example\",\n name=\"examplees-es\",\n resource_group_name=example.name,\n location=example.location,\n base_size_in_tib=1,\n sku={\n \"name\": \"Premium_LRS\",\n })\ncurrent = azure.core.get_client_config()\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"example-uai\",\n location=example.location,\n resource_group_name=example.name)\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.0.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.1.0/24\"],\n service_endpoints=[\"Microsoft.Storage.Global\"])\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=True,\n sku_name=\"standard\")\nuser_assigned_identity = azure.keyvault.AccessPolicy(\"userAssignedIdentity\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_user_assigned_identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secret_permissions=[\"Get\"])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secret_permissions=[\"Get\"])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-kvk\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n user_assigned_identity,\n client,\n ]))\nexample_volume_group = azure.elasticsan.VolumeGroup(\"example\",\n name=\"example-esvg\",\n elastic_san_id=example_elastic_san.id,\n encryption_type=\"EncryptionAtRestWithCustomerManagedKey\",\n encryption={\n \"key_vault_key_id\": example_key.versionless_id,\n \"user_assigned_identity_id\": example_user_assigned_identity.id,\n },\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n network_rules=[{\n \"subnet_id\": example_subnet.id,\n \"action\": \"Allow\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var exampleElasticSan = new Azure.ElasticSan.ElasticSan(\"example\", new()\n {\n Name = \"examplees-es\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n BaseSizeInTib = 1,\n Sku = new Azure.ElasticSan.Inputs.ElasticSanSkuArgs\n {\n Name = \"Premium_LRS\",\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"example-uai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.1.0/24\",\n },\n ServiceEndpoints = new[]\n {\n \"Microsoft.Storage.Global\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = true,\n SkuName = \"standard\",\n });\n\n var userAssignedIdentity = new Azure.KeyVault.AccessPolicy(\"userAssignedIdentity\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-kvk\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n userAssignedIdentity,\n client,\n },\n });\n\n var exampleVolumeGroup = new Azure.ElasticSan.VolumeGroup(\"example\", new()\n {\n Name = \"example-esvg\",\n ElasticSanId = exampleElasticSan.Id,\n EncryptionType = \"EncryptionAtRestWithCustomerManagedKey\",\n Encryption = new Azure.ElasticSan.Inputs.VolumeGroupEncryptionArgs\n {\n KeyVaultKeyId = exampleKey.VersionlessId,\n UserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n },\n Identity = new Azure.ElasticSan.Inputs.VolumeGroupIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n NetworkRules = new[]\n {\n new Azure.ElasticSan.Inputs.VolumeGroupNetworkRuleArgs\n {\n SubnetId = exampleSubnet.Id,\n Action = \"Allow\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/elasticsan\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleElasticSan, err := elasticsan.NewElasticSan(ctx, \"example\", \u0026elasticsan.ElasticSanArgs{\n\t\t\tName: pulumi.String(\"examplees-es\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tBaseSizeInTib: pulumi.Int(1),\n\t\t\tSku: \u0026elasticsan.ElasticSanSkuArgs{\n\t\t\t\tName: pulumi.String(\"Premium_LRS\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"example-uai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.1.0/24\"),\n\t\t\t},\n\t\t\tServiceEndpoints: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Microsoft.Storage.Global\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tuserAssignedIdentity, err := keyvault.NewAccessPolicy(ctx, \"userAssignedIdentity\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-kvk\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tuserAssignedIdentity,\n\t\t\tclient,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = elasticsan.NewVolumeGroup(ctx, \"example\", \u0026elasticsan.VolumeGroupArgs{\n\t\t\tName: pulumi.String(\"example-esvg\"),\n\t\t\tElasticSanId: exampleElasticSan.ID(),\n\t\t\tEncryptionType: pulumi.String(\"EncryptionAtRestWithCustomerManagedKey\"),\n\t\t\tEncryption: \u0026elasticsan.VolumeGroupEncryptionArgs{\n\t\t\t\tKeyVaultKeyId: exampleKey.VersionlessId,\n\t\t\t\tUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t\t},\n\t\t\tIdentity: \u0026elasticsan.VolumeGroupIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tNetworkRules: elasticsan.VolumeGroupNetworkRuleArray{\n\t\t\t\t\u0026elasticsan.VolumeGroupNetworkRuleArgs{\n\t\t\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\t\t\tAction: pulumi.String(\"Allow\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.elasticsan.ElasticSan;\nimport com.pulumi.azure.elasticsan.ElasticSanArgs;\nimport com.pulumi.azure.elasticsan.inputs.ElasticSanSkuArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.elasticsan.VolumeGroup;\nimport com.pulumi.azure.elasticsan.VolumeGroupArgs;\nimport com.pulumi.azure.elasticsan.inputs.VolumeGroupEncryptionArgs;\nimport com.pulumi.azure.elasticsan.inputs.VolumeGroupIdentityArgs;\nimport com.pulumi.azure.elasticsan.inputs.VolumeGroupNetworkRuleArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n var exampleElasticSan = new ElasticSan(\"exampleElasticSan\", ElasticSanArgs.builder()\n .name(\"examplees-es\")\n .resourceGroupName(example.name())\n .location(example.location())\n .baseSizeInTib(1)\n .sku(ElasticSanSkuArgs.builder()\n .name(\"Premium_LRS\")\n .build())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"example-uai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.0.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.1.0/24\")\n .serviceEndpoints(\"Microsoft.Storage.Global\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(true)\n .skuName(\"standard\")\n .build());\n\n var userAssignedIdentity = new AccessPolicy(\"userAssignedIdentity\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .secretPermissions(\"Get\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Get\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-kvk\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n userAssignedIdentity,\n client)\n .build());\n\n var exampleVolumeGroup = new VolumeGroup(\"exampleVolumeGroup\", VolumeGroupArgs.builder()\n .name(\"example-esvg\")\n .elasticSanId(exampleElasticSan.id())\n .encryptionType(\"EncryptionAtRestWithCustomerManagedKey\")\n .encryption(VolumeGroupEncryptionArgs.builder()\n .keyVaultKeyId(exampleKey.versionlessId())\n .userAssignedIdentityId(exampleUserAssignedIdentity.id())\n .build())\n .identity(VolumeGroupIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .networkRules(VolumeGroupNetworkRuleArgs.builder()\n .subnetId(exampleSubnet.id())\n .action(\"Allow\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n exampleElasticSan:\n type: azure:elasticsan:ElasticSan\n name: example\n properties:\n name: examplees-es\n resourceGroupName: ${example.name}\n location: ${example.location}\n baseSizeInTib: 1\n sku:\n name: Premium_LRS\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: example-uai\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.0.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.1.0/24\n serviceEndpoints:\n - Microsoft.Storage.Global\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: true\n skuName: standard\n userAssignedIdentity:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n secretPermissions:\n - Get\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n secretPermissions:\n - Get\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-kvk\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${userAssignedIdentity}\n - ${client}\n exampleVolumeGroup:\n type: azure:elasticsan:VolumeGroup\n name: example\n properties:\n name: example-esvg\n elasticSanId: ${exampleElasticSan.id}\n encryptionType: EncryptionAtRestWithCustomerManagedKey\n encryption:\n keyVaultKeyId: ${exampleKey.versionlessId}\n userAssignedIdentityId: ${exampleUserAssignedIdentity.id}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n networkRules:\n - subnetId: ${exampleSubnet.id}\n action: Allow\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn existing Elastic SAN Volume Group can be imported into Pulumi using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:elasticsan/volumeGroup:VolumeGroup example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg1/providers/Microsoft.ElasticSan/elasticSans/esan1/volumeGroups/vg1\n```\n\n", "properties": { "elasticSanId": { "type": "string", @@ -184324,7 +184324,7 @@ "deprecationMessage": "azure.eventhub.NamespaceAuthorizationRule has been deprecated in favor of azure.servicebus.NamespaceAuthorizationRule" }, "azure:eventhub/namespaceCustomerManagedKey:NamespaceCustomerManagedKey": { - "description": "Manages a Customer Managed Key for a EventHub Namespace.\n\n!\u003e **Note:** In 2.x versions of the Azure Provider during deletion this resource will **delete and recreate the parent EventHub Namespace which may involve data loss** as it's not possible to remove the Customer Managed Key from the EventHub Namespace once it's been added. Version 3.0 of the Azure Provider will change this so that the Delete operation is a noop, requiring the parent EventHub Namespace is deleted/recreated to remove the Customer Managed Key.\n\n## Example Usage\n\n### With System Assigned Identity\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.eventhub.Cluster(\"example\", {\n name: \"example-cluster\",\n resourceGroupName: example.name,\n location: example.location,\n skuName: \"Dedicated_1\",\n});\nconst exampleEventHubNamespace = new azure.eventhub.EventHubNamespace(\"example\", {\n name: \"example-namespace\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard\",\n dedicatedClusterId: exampleCluster.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleEventHubNamespace.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleEventHubNamespace.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n});\nconst example2 = new azure.keyvault.AccessPolicy(\"example2\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"examplekvkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n exampleAccessPolicy,\n example2,\n ],\n});\nconst exampleNamespaceCustomerManagedKey = new azure.eventhub.NamespaceCustomerManagedKey(\"example\", {\n eventhubNamespaceId: exampleEventHubNamespace.id,\n keyVaultKeyIds: [exampleKey.id],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_cluster = azure.eventhub.Cluster(\"example\",\n name=\"example-cluster\",\n resource_group_name=example.name,\n location=example.location,\n sku_name=\"Dedicated_1\")\nexample_event_hub_namespace = azure.eventhub.EventHubNamespace(\"example\",\n name=\"example-namespace\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard\",\n dedicated_cluster_id=example_cluster.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_event_hub_namespace.identity.tenant_id,\n object_id=example_event_hub_namespace.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ])\nexample2 = azure.keyvault.AccessPolicy(\"example2\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"examplekvkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n example_access_policy,\n example2,\n ]))\nexample_namespace_customer_managed_key = azure.eventhub.NamespaceCustomerManagedKey(\"example\",\n eventhub_namespace_id=example_event_hub_namespace.id,\n key_vault_key_ids=[example_key.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.EventHub.Cluster(\"example\", new()\n {\n Name = \"example-cluster\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n SkuName = \"Dedicated_1\",\n });\n\n var exampleEventHubNamespace = new Azure.EventHub.EventHubNamespace(\"example\", new()\n {\n Name = \"example-namespace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard\",\n DedicatedClusterId = exampleCluster.Id,\n Identity = new Azure.EventHub.Inputs.EventHubNamespaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleEventHubNamespace.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleEventHubNamespace.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n });\n\n var example2 = new Azure.KeyVault.AccessPolicy(\"example2\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"examplekvkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAccessPolicy,\n example2,\n },\n });\n\n var exampleNamespaceCustomerManagedKey = new Azure.EventHub.NamespaceCustomerManagedKey(\"example\", new()\n {\n EventhubNamespaceId = exampleEventHubNamespace.Id,\n KeyVaultKeyIds = new[]\n {\n exampleKey.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/eventhub\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := eventhub.NewCluster(ctx, \"example\", \u0026eventhub.ClusterArgs{\n\t\t\tName: pulumi.String(\"example-cluster\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSkuName: pulumi.String(\"Dedicated_1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHubNamespace, err := eventhub.NewEventHubNamespace(ctx, \"example\", \u0026eventhub.EventHubNamespaceArgs{\n\t\t\tName: pulumi.String(\"example-namespace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tDedicatedClusterId: exampleCluster.ID(),\n\t\t\tIdentity: \u0026eventhub.EventHubNamespaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccessPolicy, err := keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleEventHubNamespace.Identity.ApplyT(func(identity eventhub.EventHubNamespaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleEventHubNamespace.Identity.ApplyT(func(identity eventhub.EventHubNamespaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample2, err := keyvault.NewAccessPolicy(ctx, \"example2\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"examplekvkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAccessPolicy,\n\t\t\texample2,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = eventhub.NewNamespaceCustomerManagedKey(ctx, \"example\", \u0026eventhub.NamespaceCustomerManagedKeyArgs{\n\t\t\tEventhubNamespaceId: exampleEventHubNamespace.ID(),\n\t\t\tKeyVaultKeyIds: pulumi.StringArray{\n\t\t\t\texampleKey.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.eventhub.Cluster;\nimport com.pulumi.azure.eventhub.ClusterArgs;\nimport com.pulumi.azure.eventhub.EventHubNamespace;\nimport com.pulumi.azure.eventhub.EventHubNamespaceArgs;\nimport com.pulumi.azure.eventhub.inputs.EventHubNamespaceIdentityArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.eventhub.NamespaceCustomerManagedKey;\nimport com.pulumi.azure.eventhub.NamespaceCustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"example-cluster\")\n .resourceGroupName(example.name())\n .location(example.location())\n .skuName(\"Dedicated_1\")\n .build());\n\n var exampleEventHubNamespace = new EventHubNamespace(\"exampleEventHubNamespace\", EventHubNamespaceArgs.builder()\n .name(\"example-namespace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard\")\n .dedicatedClusterId(exampleCluster.id())\n .identity(EventHubNamespaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleEventHubNamespace.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleEventHubNamespace.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build());\n\n var example2 = new AccessPolicy(\"example2\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"examplekvkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n exampleAccessPolicy,\n example2)\n .build());\n\n var exampleNamespaceCustomerManagedKey = new NamespaceCustomerManagedKey(\"exampleNamespaceCustomerManagedKey\", NamespaceCustomerManagedKeyArgs.builder()\n .eventhubNamespaceId(exampleEventHubNamespace.id())\n .keyVaultKeyIds(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleCluster:\n type: azure:eventhub:Cluster\n name: example\n properties:\n name: example-cluster\n resourceGroupName: ${example.name}\n location: ${example.location}\n skuName: Dedicated_1\n exampleEventHubNamespace:\n type: azure:eventhub:EventHubNamespace\n name: example\n properties:\n name: example-namespace\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard\n dedicatedClusterId: ${exampleCluster.id}\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleEventHubNamespace.identity.tenantId}\n objectId: ${exampleEventHubNamespace.identity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n example2:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: examplekvkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${exampleAccessPolicy}\n - ${example2}\n exampleNamespaceCustomerManagedKey:\n type: azure:eventhub:NamespaceCustomerManagedKey\n name: example\n properties:\n eventhubNamespaceId: ${exampleEventHubNamespace.id}\n keyVaultKeyIds:\n - ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With User Assigned Identity\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.eventhub.Cluster(\"example\", {\n name: \"example-cluster\",\n resourceGroupName: example.name,\n location: example.location,\n skuName: \"Dedicated_1\",\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n location: example.location,\n name: \"example\",\n resourceGroupName: example.name,\n});\nconst exampleEventHubNamespace = new azure.eventhub.EventHubNamespace(\"example\", {\n name: \"example-namespace\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard\",\n dedicatedClusterId: exampleCluster.id,\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: test.tenantId,\n objectId: test.principalId,\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n});\nconst example2 = new azure.keyvault.AccessPolicy(\"example2\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"examplekvkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n exampleAccessPolicy,\n example2,\n ],\n});\nconst exampleNamespaceCustomerManagedKey = new azure.eventhub.NamespaceCustomerManagedKey(\"example\", {\n eventhubNamespaceId: exampleEventHubNamespace.id,\n keyVaultKeyIds: [exampleKey.id],\n userAssignedIdentityId: exampleUserAssignedIdentity.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_cluster = azure.eventhub.Cluster(\"example\",\n name=\"example-cluster\",\n resource_group_name=example.name,\n location=example.location,\n sku_name=\"Dedicated_1\")\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n location=example.location,\n name=\"example\",\n resource_group_name=example.name)\nexample_event_hub_namespace = azure.eventhub.EventHubNamespace(\"example\",\n name=\"example-namespace\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard\",\n dedicated_cluster_id=example_cluster.id,\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n })\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=test[\"tenantId\"],\n object_id=test[\"principalId\"],\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ])\nexample2 = azure.keyvault.AccessPolicy(\"example2\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"examplekvkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n example_access_policy,\n example2,\n ]))\nexample_namespace_customer_managed_key = azure.eventhub.NamespaceCustomerManagedKey(\"example\",\n eventhub_namespace_id=example_event_hub_namespace.id,\n key_vault_key_ids=[example_key.id],\n user_assigned_identity_id=example_user_assigned_identity.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.EventHub.Cluster(\"example\", new()\n {\n Name = \"example-cluster\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n SkuName = \"Dedicated_1\",\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Location = example.Location,\n Name = \"example\",\n ResourceGroupName = example.Name,\n });\n\n var exampleEventHubNamespace = new Azure.EventHub.EventHubNamespace(\"example\", new()\n {\n Name = \"example-namespace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard\",\n DedicatedClusterId = exampleCluster.Id,\n Identity = new Azure.EventHub.Inputs.EventHubNamespaceIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = test.TenantId,\n ObjectId = test.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n });\n\n var example2 = new Azure.KeyVault.AccessPolicy(\"example2\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"examplekvkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAccessPolicy,\n example2,\n },\n });\n\n var exampleNamespaceCustomerManagedKey = new Azure.EventHub.NamespaceCustomerManagedKey(\"example\", new()\n {\n EventhubNamespaceId = exampleEventHubNamespace.Id,\n KeyVaultKeyIds = new[]\n {\n exampleKey.Id,\n },\n UserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/eventhub\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := eventhub.NewCluster(ctx, \"example\", \u0026eventhub.ClusterArgs{\n\t\t\tName: pulumi.String(\"example-cluster\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSkuName: pulumi.String(\"Dedicated_1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tLocation: example.Location,\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHubNamespace, err := eventhub.NewEventHubNamespace(ctx, \"example\", \u0026eventhub.EventHubNamespaceArgs{\n\t\t\tName: pulumi.String(\"example-namespace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tDedicatedClusterId: exampleCluster.ID(),\n\t\t\tIdentity: \u0026eventhub.EventHubNamespaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccessPolicy, err := keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.Any(test.TenantId),\n\t\t\tObjectId: pulumi.Any(test.PrincipalId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample2, err := keyvault.NewAccessPolicy(ctx, \"example2\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"examplekvkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAccessPolicy,\n\t\t\texample2,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = eventhub.NewNamespaceCustomerManagedKey(ctx, \"example\", \u0026eventhub.NamespaceCustomerManagedKeyArgs{\n\t\t\tEventhubNamespaceId: exampleEventHubNamespace.ID(),\n\t\t\tKeyVaultKeyIds: pulumi.StringArray{\n\t\t\t\texampleKey.ID(),\n\t\t\t},\n\t\t\tUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.eventhub.Cluster;\nimport com.pulumi.azure.eventhub.ClusterArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.eventhub.EventHubNamespace;\nimport com.pulumi.azure.eventhub.EventHubNamespaceArgs;\nimport com.pulumi.azure.eventhub.inputs.EventHubNamespaceIdentityArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.eventhub.NamespaceCustomerManagedKey;\nimport com.pulumi.azure.eventhub.NamespaceCustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"example-cluster\")\n .resourceGroupName(example.name())\n .location(example.location())\n .skuName(\"Dedicated_1\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .location(example.location())\n .name(\"example\")\n .resourceGroupName(example.name())\n .build());\n\n var exampleEventHubNamespace = new EventHubNamespace(\"exampleEventHubNamespace\", EventHubNamespaceArgs.builder()\n .name(\"example-namespace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard\")\n .dedicatedClusterId(exampleCluster.id())\n .identity(EventHubNamespaceIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(test.tenantId())\n .objectId(test.principalId())\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build());\n\n var example2 = new AccessPolicy(\"example2\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"examplekvkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n exampleAccessPolicy,\n example2)\n .build());\n\n var exampleNamespaceCustomerManagedKey = new NamespaceCustomerManagedKey(\"exampleNamespaceCustomerManagedKey\", NamespaceCustomerManagedKeyArgs.builder()\n .eventhubNamespaceId(exampleEventHubNamespace.id())\n .keyVaultKeyIds(exampleKey.id())\n .userAssignedIdentityId(exampleUserAssignedIdentity.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleCluster:\n type: azure:eventhub:Cluster\n name: example\n properties:\n name: example-cluster\n resourceGroupName: ${example.name}\n location: ${example.location}\n skuName: Dedicated_1\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n location: ${example.location}\n name: example\n resourceGroupName: ${example.name}\n exampleEventHubNamespace:\n type: azure:eventhub:EventHubNamespace\n name: example\n properties:\n name: example-namespace\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard\n dedicatedClusterId: ${exampleCluster.id}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${test.tenantId}\n objectId: ${test.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n example2:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: examplekvkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${exampleAccessPolicy}\n - ${example2}\n exampleNamespaceCustomerManagedKey:\n type: azure:eventhub:NamespaceCustomerManagedKey\n name: example\n properties:\n eventhubNamespaceId: ${exampleEventHubNamespace.id}\n keyVaultKeyIds:\n - ${exampleKey.id}\n userAssignedIdentityId: ${exampleUserAssignedIdentity.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustomer Managed Keys for a EventHub Namespace can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:eventhub/namespaceCustomerManagedKey:NamespaceCustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.EventHub/namespaces/namespace1\n```\n\n", + "description": "Manages a Customer Managed Key for a EventHub Namespace.\n\n!\u003e **Note:** In 2.x versions of the Azure Provider during deletion this resource will **delete and recreate the parent EventHub Namespace which may involve data loss** as it's not possible to remove the Customer Managed Key from the EventHub Namespace once it's been added. Version 3.0 of the Azure Provider will change this so that the Delete operation is a noop, requiring the parent EventHub Namespace is deleted/recreated to remove the Customer Managed Key.\n\n## Example Usage\n\n### With System Assigned Identity\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.eventhub.Cluster(\"example\", {\n name: \"example-cluster\",\n resourceGroupName: example.name,\n location: example.location,\n skuName: \"Dedicated_1\",\n});\nconst exampleEventHubNamespace = new azure.eventhub.EventHubNamespace(\"example\", {\n name: \"example-namespace\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard\",\n dedicatedClusterId: exampleCluster.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleEventHubNamespace.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleEventHubNamespace.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n});\nconst example2 = new azure.keyvault.AccessPolicy(\"example2\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"examplekvkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n exampleAccessPolicy,\n example2,\n ],\n});\nconst exampleNamespaceCustomerManagedKey = new azure.eventhub.NamespaceCustomerManagedKey(\"example\", {\n eventhubNamespaceId: exampleEventHubNamespace.id,\n keyVaultKeyIds: [exampleKey.id],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_cluster = azure.eventhub.Cluster(\"example\",\n name=\"example-cluster\",\n resource_group_name=example.name,\n location=example.location,\n sku_name=\"Dedicated_1\")\nexample_event_hub_namespace = azure.eventhub.EventHubNamespace(\"example\",\n name=\"example-namespace\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard\",\n dedicated_cluster_id=example_cluster.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_event_hub_namespace.identity.tenant_id,\n object_id=example_event_hub_namespace.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ])\nexample2 = azure.keyvault.AccessPolicy(\"example2\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"examplekvkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n example_access_policy,\n example2,\n ]))\nexample_namespace_customer_managed_key = azure.eventhub.NamespaceCustomerManagedKey(\"example\",\n eventhub_namespace_id=example_event_hub_namespace.id,\n key_vault_key_ids=[example_key.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.EventHub.Cluster(\"example\", new()\n {\n Name = \"example-cluster\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n SkuName = \"Dedicated_1\",\n });\n\n var exampleEventHubNamespace = new Azure.EventHub.EventHubNamespace(\"example\", new()\n {\n Name = \"example-namespace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard\",\n DedicatedClusterId = exampleCluster.Id,\n Identity = new Azure.EventHub.Inputs.EventHubNamespaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleEventHubNamespace.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleEventHubNamespace.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n });\n\n var example2 = new Azure.KeyVault.AccessPolicy(\"example2\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"examplekvkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAccessPolicy,\n example2,\n },\n });\n\n var exampleNamespaceCustomerManagedKey = new Azure.EventHub.NamespaceCustomerManagedKey(\"example\", new()\n {\n EventhubNamespaceId = exampleEventHubNamespace.Id,\n KeyVaultKeyIds = new[]\n {\n exampleKey.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/eventhub\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := eventhub.NewCluster(ctx, \"example\", \u0026eventhub.ClusterArgs{\n\t\t\tName: pulumi.String(\"example-cluster\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSkuName: pulumi.String(\"Dedicated_1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHubNamespace, err := eventhub.NewEventHubNamespace(ctx, \"example\", \u0026eventhub.EventHubNamespaceArgs{\n\t\t\tName: pulumi.String(\"example-namespace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tDedicatedClusterId: exampleCluster.ID(),\n\t\t\tIdentity: \u0026eventhub.EventHubNamespaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccessPolicy, err := keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleEventHubNamespace.Identity.ApplyT(func(identity eventhub.EventHubNamespaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleEventHubNamespace.Identity.ApplyT(func(identity eventhub.EventHubNamespaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample2, err := keyvault.NewAccessPolicy(ctx, \"example2\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"examplekvkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAccessPolicy,\n\t\t\texample2,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = eventhub.NewNamespaceCustomerManagedKey(ctx, \"example\", \u0026eventhub.NamespaceCustomerManagedKeyArgs{\n\t\t\tEventhubNamespaceId: exampleEventHubNamespace.ID(),\n\t\t\tKeyVaultKeyIds: pulumi.StringArray{\n\t\t\t\texampleKey.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.eventhub.Cluster;\nimport com.pulumi.azure.eventhub.ClusterArgs;\nimport com.pulumi.azure.eventhub.EventHubNamespace;\nimport com.pulumi.azure.eventhub.EventHubNamespaceArgs;\nimport com.pulumi.azure.eventhub.inputs.EventHubNamespaceIdentityArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.eventhub.NamespaceCustomerManagedKey;\nimport com.pulumi.azure.eventhub.NamespaceCustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"example-cluster\")\n .resourceGroupName(example.name())\n .location(example.location())\n .skuName(\"Dedicated_1\")\n .build());\n\n var exampleEventHubNamespace = new EventHubNamespace(\"exampleEventHubNamespace\", EventHubNamespaceArgs.builder()\n .name(\"example-namespace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard\")\n .dedicatedClusterId(exampleCluster.id())\n .identity(EventHubNamespaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleEventHubNamespace.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleEventHubNamespace.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build());\n\n var example2 = new AccessPolicy(\"example2\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"examplekvkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n exampleAccessPolicy,\n example2)\n .build());\n\n var exampleNamespaceCustomerManagedKey = new NamespaceCustomerManagedKey(\"exampleNamespaceCustomerManagedKey\", NamespaceCustomerManagedKeyArgs.builder()\n .eventhubNamespaceId(exampleEventHubNamespace.id())\n .keyVaultKeyIds(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleCluster:\n type: azure:eventhub:Cluster\n name: example\n properties:\n name: example-cluster\n resourceGroupName: ${example.name}\n location: ${example.location}\n skuName: Dedicated_1\n exampleEventHubNamespace:\n type: azure:eventhub:EventHubNamespace\n name: example\n properties:\n name: example-namespace\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard\n dedicatedClusterId: ${exampleCluster.id}\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleEventHubNamespace.identity.tenantId}\n objectId: ${exampleEventHubNamespace.identity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n example2:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: examplekvkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${exampleAccessPolicy}\n - ${example2}\n exampleNamespaceCustomerManagedKey:\n type: azure:eventhub:NamespaceCustomerManagedKey\n name: example\n properties:\n eventhubNamespaceId: ${exampleEventHubNamespace.id}\n keyVaultKeyIds:\n - ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With User Assigned Identity\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.eventhub.Cluster(\"example\", {\n name: \"example-cluster\",\n resourceGroupName: example.name,\n location: example.location,\n skuName: \"Dedicated_1\",\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n location: example.location,\n name: \"example\",\n resourceGroupName: example.name,\n});\nconst exampleEventHubNamespace = new azure.eventhub.EventHubNamespace(\"example\", {\n name: \"example-namespace\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard\",\n dedicatedClusterId: exampleCluster.id,\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: test.tenantId,\n objectId: test.principalId,\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n});\nconst example2 = new azure.keyvault.AccessPolicy(\"example2\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"examplekvkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n exampleAccessPolicy,\n example2,\n ],\n});\nconst exampleNamespaceCustomerManagedKey = new azure.eventhub.NamespaceCustomerManagedKey(\"example\", {\n eventhubNamespaceId: exampleEventHubNamespace.id,\n keyVaultKeyIds: [exampleKey.id],\n userAssignedIdentityId: exampleUserAssignedIdentity.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_cluster = azure.eventhub.Cluster(\"example\",\n name=\"example-cluster\",\n resource_group_name=example.name,\n location=example.location,\n sku_name=\"Dedicated_1\")\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n location=example.location,\n name=\"example\",\n resource_group_name=example.name)\nexample_event_hub_namespace = azure.eventhub.EventHubNamespace(\"example\",\n name=\"example-namespace\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard\",\n dedicated_cluster_id=example_cluster.id,\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n })\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=test[\"tenantId\"],\n object_id=test[\"principalId\"],\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ])\nexample2 = azure.keyvault.AccessPolicy(\"example2\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"examplekvkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n example_access_policy,\n example2,\n ]))\nexample_namespace_customer_managed_key = azure.eventhub.NamespaceCustomerManagedKey(\"example\",\n eventhub_namespace_id=example_event_hub_namespace.id,\n key_vault_key_ids=[example_key.id],\n user_assigned_identity_id=example_user_assigned_identity.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.EventHub.Cluster(\"example\", new()\n {\n Name = \"example-cluster\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n SkuName = \"Dedicated_1\",\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Location = example.Location,\n Name = \"example\",\n ResourceGroupName = example.Name,\n });\n\n var exampleEventHubNamespace = new Azure.EventHub.EventHubNamespace(\"example\", new()\n {\n Name = \"example-namespace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard\",\n DedicatedClusterId = exampleCluster.Id,\n Identity = new Azure.EventHub.Inputs.EventHubNamespaceIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = test.TenantId,\n ObjectId = test.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n });\n\n var example2 = new Azure.KeyVault.AccessPolicy(\"example2\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"examplekvkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAccessPolicy,\n example2,\n },\n });\n\n var exampleNamespaceCustomerManagedKey = new Azure.EventHub.NamespaceCustomerManagedKey(\"example\", new()\n {\n EventhubNamespaceId = exampleEventHubNamespace.Id,\n KeyVaultKeyIds = new[]\n {\n exampleKey.Id,\n },\n UserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/eventhub\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := eventhub.NewCluster(ctx, \"example\", \u0026eventhub.ClusterArgs{\n\t\t\tName: pulumi.String(\"example-cluster\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSkuName: pulumi.String(\"Dedicated_1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tLocation: example.Location,\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHubNamespace, err := eventhub.NewEventHubNamespace(ctx, \"example\", \u0026eventhub.EventHubNamespaceArgs{\n\t\t\tName: pulumi.String(\"example-namespace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tDedicatedClusterId: exampleCluster.ID(),\n\t\t\tIdentity: \u0026eventhub.EventHubNamespaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccessPolicy, err := keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.Any(test.TenantId),\n\t\t\tObjectId: pulumi.Any(test.PrincipalId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample2, err := keyvault.NewAccessPolicy(ctx, \"example2\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"examplekvkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAccessPolicy,\n\t\t\texample2,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = eventhub.NewNamespaceCustomerManagedKey(ctx, \"example\", \u0026eventhub.NamespaceCustomerManagedKeyArgs{\n\t\t\tEventhubNamespaceId: exampleEventHubNamespace.ID(),\n\t\t\tKeyVaultKeyIds: pulumi.StringArray{\n\t\t\t\texampleKey.ID(),\n\t\t\t},\n\t\t\tUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.eventhub.Cluster;\nimport com.pulumi.azure.eventhub.ClusterArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.eventhub.EventHubNamespace;\nimport com.pulumi.azure.eventhub.EventHubNamespaceArgs;\nimport com.pulumi.azure.eventhub.inputs.EventHubNamespaceIdentityArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.eventhub.NamespaceCustomerManagedKey;\nimport com.pulumi.azure.eventhub.NamespaceCustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"example-cluster\")\n .resourceGroupName(example.name())\n .location(example.location())\n .skuName(\"Dedicated_1\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .location(example.location())\n .name(\"example\")\n .resourceGroupName(example.name())\n .build());\n\n var exampleEventHubNamespace = new EventHubNamespace(\"exampleEventHubNamespace\", EventHubNamespaceArgs.builder()\n .name(\"example-namespace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard\")\n .dedicatedClusterId(exampleCluster.id())\n .identity(EventHubNamespaceIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(test.tenantId())\n .objectId(test.principalId())\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build());\n\n var example2 = new AccessPolicy(\"example2\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"examplekvkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n exampleAccessPolicy,\n example2)\n .build());\n\n var exampleNamespaceCustomerManagedKey = new NamespaceCustomerManagedKey(\"exampleNamespaceCustomerManagedKey\", NamespaceCustomerManagedKeyArgs.builder()\n .eventhubNamespaceId(exampleEventHubNamespace.id())\n .keyVaultKeyIds(exampleKey.id())\n .userAssignedIdentityId(exampleUserAssignedIdentity.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleCluster:\n type: azure:eventhub:Cluster\n name: example\n properties:\n name: example-cluster\n resourceGroupName: ${example.name}\n location: ${example.location}\n skuName: Dedicated_1\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n location: ${example.location}\n name: example\n resourceGroupName: ${example.name}\n exampleEventHubNamespace:\n type: azure:eventhub:EventHubNamespace\n name: example\n properties:\n name: example-namespace\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard\n dedicatedClusterId: ${exampleCluster.id}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${test.tenantId}\n objectId: ${test.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n example2:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: examplekvkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${exampleAccessPolicy}\n - ${example2}\n exampleNamespaceCustomerManagedKey:\n type: azure:eventhub:NamespaceCustomerManagedKey\n name: example\n properties:\n eventhubNamespaceId: ${exampleEventHubNamespace.id}\n keyVaultKeyIds:\n - ${exampleKey.id}\n userAssignedIdentityId: ${exampleUserAssignedIdentity.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustomer Managed Keys for a EventHub Namespace can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:eventhub/namespaceCustomerManagedKey:NamespaceCustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.EventHub/namespaces/namespace1\n```\n\n", "properties": { "eventhubNamespaceId": { "type": "string", @@ -188580,7 +188580,7 @@ } }, "azure:healthcare/fhirService:FhirService": { - "description": "Manages a Healthcare FHIR (Fast Healthcare Interoperability Resources) Service\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleWorkspace = new azure.healthcare.Workspace(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleFhirService = new azure.healthcare.FhirService(\"example\", {\n name: \"tfexfhir\",\n location: \"east us\",\n resourceGroupName: \"tfex-resource_group\",\n workspaceId: exampleWorkspace.id,\n kind: \"fhir-R4\",\n authentication: {\n authority: \"https://login.microsoftonline.com/tenantId\",\n audience: \"https://tfexfhir.fhir.azurehealthcareapis.com\",\n },\n accessPolicyObjectIds: [current.then(current =\u003e current.objectId)],\n identity: {\n type: \"SystemAssigned\",\n },\n containerRegistryLoginServerUrls: [\"tfex-container_registry_login_server\"],\n cors: {\n allowedOrigins: [\n \"https://tfex.com:123\",\n \"https://tfex1.com:3389\",\n ],\n allowedHeaders: [\"*\"],\n allowedMethods: [\n \"GET\",\n \"DELETE\",\n \"PUT\",\n ],\n maxAgeInSeconds: 3600,\n credentialsAllowed: true,\n },\n configurationExportStorageAccountName: \"storage_account_name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_workspace = azure.healthcare.Workspace(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_fhir_service = azure.healthcare.FhirService(\"example\",\n name=\"tfexfhir\",\n location=\"east us\",\n resource_group_name=\"tfex-resource_group\",\n workspace_id=example_workspace.id,\n kind=\"fhir-R4\",\n authentication={\n \"authority\": \"https://login.microsoftonline.com/tenantId\",\n \"audience\": \"https://tfexfhir.fhir.azurehealthcareapis.com\",\n },\n access_policy_object_ids=[current.object_id],\n identity={\n \"type\": \"SystemAssigned\",\n },\n container_registry_login_server_urls=[\"tfex-container_registry_login_server\"],\n cors={\n \"allowed_origins\": [\n \"https://tfex.com:123\",\n \"https://tfex1.com:3389\",\n ],\n \"allowed_headers\": [\"*\"],\n \"allowed_methods\": [\n \"GET\",\n \"DELETE\",\n \"PUT\",\n ],\n \"max_age_in_seconds\": 3600,\n \"credentials_allowed\": True,\n },\n configuration_export_storage_account_name=\"storage_account_name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleWorkspace = new Azure.Healthcare.Workspace(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleFhirService = new Azure.Healthcare.FhirService(\"example\", new()\n {\n Name = \"tfexfhir\",\n Location = \"east us\",\n ResourceGroupName = \"tfex-resource_group\",\n WorkspaceId = exampleWorkspace.Id,\n Kind = \"fhir-R4\",\n Authentication = new Azure.Healthcare.Inputs.FhirServiceAuthenticationArgs\n {\n Authority = \"https://login.microsoftonline.com/tenantId\",\n Audience = \"https://tfexfhir.fhir.azurehealthcareapis.com\",\n },\n AccessPolicyObjectIds = new[]\n {\n current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n },\n Identity = new Azure.Healthcare.Inputs.FhirServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n ContainerRegistryLoginServerUrls = new[]\n {\n \"tfex-container_registry_login_server\",\n },\n Cors = new Azure.Healthcare.Inputs.FhirServiceCorsArgs\n {\n AllowedOrigins = new[]\n {\n \"https://tfex.com:123\",\n \"https://tfex1.com:3389\",\n },\n AllowedHeaders = new[]\n {\n \"*\",\n },\n AllowedMethods = new[]\n {\n \"GET\",\n \"DELETE\",\n \"PUT\",\n },\n MaxAgeInSeconds = 3600,\n CredentialsAllowed = true,\n },\n ConfigurationExportStorageAccountName = \"storage_account_name\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/healthcare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := healthcare.NewWorkspace(ctx, \"example\", \u0026healthcare.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = healthcare.NewFhirService(ctx, \"example\", \u0026healthcare.FhirServiceArgs{\n\t\t\tName: pulumi.String(\"tfexfhir\"),\n\t\t\tLocation: pulumi.String(\"east us\"),\n\t\t\tResourceGroupName: pulumi.String(\"tfex-resource_group\"),\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tKind: pulumi.String(\"fhir-R4\"),\n\t\t\tAuthentication: \u0026healthcare.FhirServiceAuthenticationArgs{\n\t\t\t\tAuthority: pulumi.String(\"https://login.microsoftonline.com/tenantId\"),\n\t\t\t\tAudience: pulumi.String(\"https://tfexfhir.fhir.azurehealthcareapis.com\"),\n\t\t\t},\n\t\t\tAccessPolicyObjectIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.ObjectId),\n\t\t\t},\n\t\t\tIdentity: \u0026healthcare.FhirServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tContainerRegistryLoginServerUrls: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"tfex-container_registry_login_server\"),\n\t\t\t},\n\t\t\tCors: \u0026healthcare.FhirServiceCorsArgs{\n\t\t\t\tAllowedOrigins: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"https://tfex.com:123\"),\n\t\t\t\t\tpulumi.String(\"https://tfex1.com:3389\"),\n\t\t\t\t},\n\t\t\t\tAllowedHeaders: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"*\"),\n\t\t\t\t},\n\t\t\t\tAllowedMethods: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"GET\"),\n\t\t\t\t\tpulumi.String(\"DELETE\"),\n\t\t\t\t\tpulumi.String(\"PUT\"),\n\t\t\t\t},\n\t\t\t\tMaxAgeInSeconds: pulumi.Int(3600),\n\t\t\t\tCredentialsAllowed: pulumi.Bool(true),\n\t\t\t},\n\t\t\tConfigurationExportStorageAccountName: pulumi.String(\"storage_account_name\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.healthcare.Workspace;\nimport com.pulumi.azure.healthcare.WorkspaceArgs;\nimport com.pulumi.azure.healthcare.FhirService;\nimport com.pulumi.azure.healthcare.FhirServiceArgs;\nimport com.pulumi.azure.healthcare.inputs.FhirServiceAuthenticationArgs;\nimport com.pulumi.azure.healthcare.inputs.FhirServiceIdentityArgs;\nimport com.pulumi.azure.healthcare.inputs.FhirServiceCorsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleFhirService = new FhirService(\"exampleFhirService\", FhirServiceArgs.builder()\n .name(\"tfexfhir\")\n .location(\"east us\")\n .resourceGroupName(\"tfex-resource_group\")\n .workspaceId(exampleWorkspace.id())\n .kind(\"fhir-R4\")\n .authentication(FhirServiceAuthenticationArgs.builder()\n .authority(\"https://login.microsoftonline.com/tenantId\")\n .audience(\"https://tfexfhir.fhir.azurehealthcareapis.com\")\n .build())\n .accessPolicyObjectIds(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .identity(FhirServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .containerRegistryLoginServerUrls(\"tfex-container_registry_login_server\")\n .cors(FhirServiceCorsArgs.builder()\n .allowedOrigins( \n \"https://tfex.com:123\",\n \"https://tfex1.com:3389\")\n .allowedHeaders(\"*\")\n .allowedMethods( \n \"GET\",\n \"DELETE\",\n \"PUT\")\n .maxAgeInSeconds(3600)\n .credentialsAllowed(true)\n .build())\n .configurationExportStorageAccountName(\"storage_account_name\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: West Europe\n exampleWorkspace:\n type: azure:healthcare:Workspace\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleFhirService:\n type: azure:healthcare:FhirService\n name: example\n properties:\n name: tfexfhir\n location: east us\n resourceGroupName: tfex-resource_group\n workspaceId: ${exampleWorkspace.id}\n kind: fhir-R4\n authentication:\n authority: https://login.microsoftonline.com/tenantId\n audience: https://tfexfhir.fhir.azurehealthcareapis.com\n accessPolicyObjectIds:\n - ${current.objectId}\n identity:\n type: SystemAssigned\n containerRegistryLoginServerUrls:\n - tfex-container_registry_login_server\n cors:\n allowedOrigins:\n - https://tfex.com:123\n - https://tfex1.com:3389\n allowedHeaders:\n - '*'\n allowedMethods:\n - GET\n - DELETE\n - PUT\n maxAgeInSeconds: 3600\n credentialsAllowed: true\n configurationExportStorageAccountName: storage_account_name\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nHealthcare FHIR Service can be imported using the resource`id`, e.g.\n\n```sh\n$ pulumi import azure:healthcare/fhirService:FhirService example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.HealthcareApis/workspaces/workspace1/fhirServices/service1\n```\n\n", + "description": "Manages a Healthcare FHIR (Fast Healthcare Interoperability Resources) Service\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleWorkspace = new azure.healthcare.Workspace(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleFhirService = new azure.healthcare.FhirService(\"example\", {\n name: \"tfexfhir\",\n location: \"east us\",\n resourceGroupName: \"tfex-resource_group\",\n workspaceId: exampleWorkspace.id,\n kind: \"fhir-R4\",\n authentication: {\n authority: \"https://login.microsoftonline.com/tenantId\",\n audience: \"https://tfexfhir.fhir.azurehealthcareapis.com\",\n },\n accessPolicyObjectIds: [current.then(current =\u003e current.objectId)],\n identity: {\n type: \"SystemAssigned\",\n },\n containerRegistryLoginServerUrls: [\"tfex-container_registry_login_server\"],\n cors: {\n allowedOrigins: [\n \"https://tfex.com:123\",\n \"https://tfex1.com:3389\",\n ],\n allowedHeaders: [\"*\"],\n allowedMethods: [\n \"GET\",\n \"DELETE\",\n \"PUT\",\n ],\n maxAgeInSeconds: 3600,\n credentialsAllowed: true,\n },\n configurationExportStorageAccountName: \"storage_account_name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_workspace = azure.healthcare.Workspace(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name)\nexample_fhir_service = azure.healthcare.FhirService(\"example\",\n name=\"tfexfhir\",\n location=\"east us\",\n resource_group_name=\"tfex-resource_group\",\n workspace_id=example_workspace.id,\n kind=\"fhir-R4\",\n authentication={\n \"authority\": \"https://login.microsoftonline.com/tenantId\",\n \"audience\": \"https://tfexfhir.fhir.azurehealthcareapis.com\",\n },\n access_policy_object_ids=[current.object_id],\n identity={\n \"type\": \"SystemAssigned\",\n },\n container_registry_login_server_urls=[\"tfex-container_registry_login_server\"],\n cors={\n \"allowed_origins\": [\n \"https://tfex.com:123\",\n \"https://tfex1.com:3389\",\n ],\n \"allowed_headers\": [\"*\"],\n \"allowed_methods\": [\n \"GET\",\n \"DELETE\",\n \"PUT\",\n ],\n \"max_age_in_seconds\": 3600,\n \"credentials_allowed\": True,\n },\n configuration_export_storage_account_name=\"storage_account_name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleWorkspace = new Azure.Healthcare.Workspace(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleFhirService = new Azure.Healthcare.FhirService(\"example\", new()\n {\n Name = \"tfexfhir\",\n Location = \"east us\",\n ResourceGroupName = \"tfex-resource_group\",\n WorkspaceId = exampleWorkspace.Id,\n Kind = \"fhir-R4\",\n Authentication = new Azure.Healthcare.Inputs.FhirServiceAuthenticationArgs\n {\n Authority = \"https://login.microsoftonline.com/tenantId\",\n Audience = \"https://tfexfhir.fhir.azurehealthcareapis.com\",\n },\n AccessPolicyObjectIds = new[]\n {\n current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n },\n Identity = new Azure.Healthcare.Inputs.FhirServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n ContainerRegistryLoginServerUrls = new[]\n {\n \"tfex-container_registry_login_server\",\n },\n Cors = new Azure.Healthcare.Inputs.FhirServiceCorsArgs\n {\n AllowedOrigins = new[]\n {\n \"https://tfex.com:123\",\n \"https://tfex1.com:3389\",\n },\n AllowedHeaders = new[]\n {\n \"*\",\n },\n AllowedMethods = new[]\n {\n \"GET\",\n \"DELETE\",\n \"PUT\",\n },\n MaxAgeInSeconds = 3600,\n CredentialsAllowed = true,\n },\n ConfigurationExportStorageAccountName = \"storage_account_name\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/healthcare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := healthcare.NewWorkspace(ctx, \"example\", \u0026healthcare.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = healthcare.NewFhirService(ctx, \"example\", \u0026healthcare.FhirServiceArgs{\n\t\t\tName: pulumi.String(\"tfexfhir\"),\n\t\t\tLocation: pulumi.String(\"east us\"),\n\t\t\tResourceGroupName: pulumi.String(\"tfex-resource_group\"),\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tKind: pulumi.String(\"fhir-R4\"),\n\t\t\tAuthentication: \u0026healthcare.FhirServiceAuthenticationArgs{\n\t\t\t\tAuthority: pulumi.String(\"https://login.microsoftonline.com/tenantId\"),\n\t\t\t\tAudience: pulumi.String(\"https://tfexfhir.fhir.azurehealthcareapis.com\"),\n\t\t\t},\n\t\t\tAccessPolicyObjectIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.ObjectId),\n\t\t\t},\n\t\t\tIdentity: \u0026healthcare.FhirServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tContainerRegistryLoginServerUrls: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"tfex-container_registry_login_server\"),\n\t\t\t},\n\t\t\tCors: \u0026healthcare.FhirServiceCorsArgs{\n\t\t\t\tAllowedOrigins: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"https://tfex.com:123\"),\n\t\t\t\t\tpulumi.String(\"https://tfex1.com:3389\"),\n\t\t\t\t},\n\t\t\t\tAllowedHeaders: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"*\"),\n\t\t\t\t},\n\t\t\t\tAllowedMethods: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"GET\"),\n\t\t\t\t\tpulumi.String(\"DELETE\"),\n\t\t\t\t\tpulumi.String(\"PUT\"),\n\t\t\t\t},\n\t\t\t\tMaxAgeInSeconds: pulumi.Int(3600),\n\t\t\t\tCredentialsAllowed: pulumi.Bool(true),\n\t\t\t},\n\t\t\tConfigurationExportStorageAccountName: pulumi.String(\"storage_account_name\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.healthcare.Workspace;\nimport com.pulumi.azure.healthcare.WorkspaceArgs;\nimport com.pulumi.azure.healthcare.FhirService;\nimport com.pulumi.azure.healthcare.FhirServiceArgs;\nimport com.pulumi.azure.healthcare.inputs.FhirServiceAuthenticationArgs;\nimport com.pulumi.azure.healthcare.inputs.FhirServiceIdentityArgs;\nimport com.pulumi.azure.healthcare.inputs.FhirServiceCorsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleFhirService = new FhirService(\"exampleFhirService\", FhirServiceArgs.builder()\n .name(\"tfexfhir\")\n .location(\"east us\")\n .resourceGroupName(\"tfex-resource_group\")\n .workspaceId(exampleWorkspace.id())\n .kind(\"fhir-R4\")\n .authentication(FhirServiceAuthenticationArgs.builder()\n .authority(\"https://login.microsoftonline.com/tenantId\")\n .audience(\"https://tfexfhir.fhir.azurehealthcareapis.com\")\n .build())\n .accessPolicyObjectIds(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .identity(FhirServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .containerRegistryLoginServerUrls(\"tfex-container_registry_login_server\")\n .cors(FhirServiceCorsArgs.builder()\n .allowedOrigins( \n \"https://tfex.com:123\",\n \"https://tfex1.com:3389\")\n .allowedHeaders(\"*\")\n .allowedMethods( \n \"GET\",\n \"DELETE\",\n \"PUT\")\n .maxAgeInSeconds(3600)\n .credentialsAllowed(true)\n .build())\n .configurationExportStorageAccountName(\"storage_account_name\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example\n location: West Europe\n exampleWorkspace:\n type: azure:healthcare:Workspace\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleFhirService:\n type: azure:healthcare:FhirService\n name: example\n properties:\n name: tfexfhir\n location: east us\n resourceGroupName: tfex-resource_group\n workspaceId: ${exampleWorkspace.id}\n kind: fhir-R4\n authentication:\n authority: https://login.microsoftonline.com/tenantId\n audience: https://tfexfhir.fhir.azurehealthcareapis.com\n accessPolicyObjectIds:\n - ${current.objectId}\n identity:\n type: SystemAssigned\n containerRegistryLoginServerUrls:\n - tfex-container_registry_login_server\n cors:\n allowedOrigins:\n - https://tfex.com:123\n - https://tfex1.com:3389\n allowedHeaders:\n - '*'\n allowedMethods:\n - GET\n - DELETE\n - PUT\n maxAgeInSeconds: 3600\n credentialsAllowed: true\n configurationExportStorageAccountName: storage_account_name\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nHealthcare FHIR Service can be imported using the resource`id`, e.g.\n\n```sh\n$ pulumi import azure:healthcare/fhirService:FhirService example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.HealthcareApis/workspaces/workspace1/fhirServices/service1\n```\n\n", "properties": { "accessPolicyObjectIds": { "type": "array", @@ -188968,7 +188968,7 @@ } }, "azure:healthcare/medtechServiceFhirDestination:MedtechServiceFhirDestination": { - "description": "Manages a Healthcare Med Tech Service Fhir Destination.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleWorkspace = new azure.healthcare.Workspace(\"example\", {\n name: \"exampleworkspace\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleEventHubNamespace = new azure.eventhub.EventHubNamespace(\"example\", {\n name: \"example-ehn\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard\",\n});\nconst exampleEventHub = new azure.eventhub.EventHub(\"example\", {\n name: \"example-eh\",\n namespaceName: exampleEventHubNamespace.name,\n resourceGroupName: example.name,\n partitionCount: 1,\n messageRetention: 1,\n});\nconst exampleConsumerGroup = new azure.eventhub.ConsumerGroup(\"example\", {\n name: \"$default\",\n namespaceName: exampleEventHubNamespace.name,\n eventhubName: exampleEventHub.name,\n resourceGroupName: example.name,\n});\nconst exampleFhirService = new azure.healthcare.FhirService(\"example\", {\n name: \"examplefhir\",\n location: example.location,\n resourceGroupName: example.name,\n workspaceId: exampleWorkspace.id,\n kind: \"fhir-R4\",\n authentication: {\n authority: \"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n audience: \"https://examplefhir.fhir.azurehealthcareapis.com\",\n },\n});\nconst exampleMedtechService = new azure.healthcare.MedtechService(\"example\", {\n name: \"examplemt\",\n workspaceId: exampleWorkspace.id,\n location: example.location,\n eventhubNamespaceName: exampleEventHubNamespace.name,\n eventhubName: exampleEventHub.name,\n eventhubConsumerGroupName: exampleConsumerGroup.name,\n deviceMappingJson: JSON.stringify({\n templateType: \"CollectionContent\",\n template: [],\n }),\n});\nconst exampleMedtechServiceFhirDestination = new azure.healthcare.MedtechServiceFhirDestination(\"example\", {\n name: \"examplemtdes\",\n location: \"east us\",\n medtechServiceId: exampleMedtechService.id,\n destinationFhirServiceId: exampleFhirService.id,\n destinationIdentityResolutionType: \"Create\",\n destinationFhirMappingJson: JSON.stringify({\n templateType: \"CollectionFhirTemplate\",\n template: [{\n templateType: \"CodeValueFhir\",\n template: {\n codes: [{\n code: \"8867-4\",\n system: \"http://loinc.org\",\n display: \"Heart rate\",\n }],\n periodInterval: 60,\n typeName: \"heartrate\",\n value: {\n defaultPeriod: 5000,\n unit: \"count/min\",\n valueName: \"hr\",\n valueType: \"SampledData\",\n },\n },\n }],\n }),\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_workspace = azure.healthcare.Workspace(\"example\",\n name=\"exampleworkspace\",\n location=example.location,\n resource_group_name=example.name)\nexample_event_hub_namespace = azure.eventhub.EventHubNamespace(\"example\",\n name=\"example-ehn\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard\")\nexample_event_hub = azure.eventhub.EventHub(\"example\",\n name=\"example-eh\",\n namespace_name=example_event_hub_namespace.name,\n resource_group_name=example.name,\n partition_count=1,\n message_retention=1)\nexample_consumer_group = azure.eventhub.ConsumerGroup(\"example\",\n name=\"$default\",\n namespace_name=example_event_hub_namespace.name,\n eventhub_name=example_event_hub.name,\n resource_group_name=example.name)\nexample_fhir_service = azure.healthcare.FhirService(\"example\",\n name=\"examplefhir\",\n location=example.location,\n resource_group_name=example.name,\n workspace_id=example_workspace.id,\n kind=\"fhir-R4\",\n authentication={\n \"authority\": \"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n \"audience\": \"https://examplefhir.fhir.azurehealthcareapis.com\",\n })\nexample_medtech_service = azure.healthcare.MedtechService(\"example\",\n name=\"examplemt\",\n workspace_id=example_workspace.id,\n location=example.location,\n eventhub_namespace_name=example_event_hub_namespace.name,\n eventhub_name=example_event_hub.name,\n eventhub_consumer_group_name=example_consumer_group.name,\n device_mapping_json=json.dumps({\n \"templateType\": \"CollectionContent\",\n \"template\": [],\n }))\nexample_medtech_service_fhir_destination = azure.healthcare.MedtechServiceFhirDestination(\"example\",\n name=\"examplemtdes\",\n location=\"east us\",\n medtech_service_id=example_medtech_service.id,\n destination_fhir_service_id=example_fhir_service.id,\n destination_identity_resolution_type=\"Create\",\n destination_fhir_mapping_json=json.dumps({\n \"templateType\": \"CollectionFhirTemplate\",\n \"template\": [{\n \"templateType\": \"CodeValueFhir\",\n \"template\": {\n \"codes\": [{\n \"code\": \"8867-4\",\n \"system\": \"http://loinc.org\",\n \"display\": \"Heart rate\",\n }],\n \"periodInterval\": 60,\n \"typeName\": \"heartrate\",\n \"value\": {\n \"defaultPeriod\": 5000,\n \"unit\": \"count/min\",\n \"valueName\": \"hr\",\n \"valueType\": \"SampledData\",\n },\n },\n }],\n }))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleWorkspace = new Azure.Healthcare.Workspace(\"example\", new()\n {\n Name = \"exampleworkspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleEventHubNamespace = new Azure.EventHub.EventHubNamespace(\"example\", new()\n {\n Name = \"example-ehn\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard\",\n });\n\n var exampleEventHub = new Azure.EventHub.EventHub(\"example\", new()\n {\n Name = \"example-eh\",\n NamespaceName = exampleEventHubNamespace.Name,\n ResourceGroupName = example.Name,\n PartitionCount = 1,\n MessageRetention = 1,\n });\n\n var exampleConsumerGroup = new Azure.EventHub.ConsumerGroup(\"example\", new()\n {\n Name = \"$default\",\n NamespaceName = exampleEventHubNamespace.Name,\n EventhubName = exampleEventHub.Name,\n ResourceGroupName = example.Name,\n });\n\n var exampleFhirService = new Azure.Healthcare.FhirService(\"example\", new()\n {\n Name = \"examplefhir\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n WorkspaceId = exampleWorkspace.Id,\n Kind = \"fhir-R4\",\n Authentication = new Azure.Healthcare.Inputs.FhirServiceAuthenticationArgs\n {\n Authority = \"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n Audience = \"https://examplefhir.fhir.azurehealthcareapis.com\",\n },\n });\n\n var exampleMedtechService = new Azure.Healthcare.MedtechService(\"example\", new()\n {\n Name = \"examplemt\",\n WorkspaceId = exampleWorkspace.Id,\n Location = example.Location,\n EventhubNamespaceName = exampleEventHubNamespace.Name,\n EventhubName = exampleEventHub.Name,\n EventhubConsumerGroupName = exampleConsumerGroup.Name,\n DeviceMappingJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"templateType\"] = \"CollectionContent\",\n [\"template\"] = new[]\n {\n },\n }),\n });\n\n var exampleMedtechServiceFhirDestination = new Azure.Healthcare.MedtechServiceFhirDestination(\"example\", new()\n {\n Name = \"examplemtdes\",\n Location = \"east us\",\n MedtechServiceId = exampleMedtechService.Id,\n DestinationFhirServiceId = exampleFhirService.Id,\n DestinationIdentityResolutionType = \"Create\",\n DestinationFhirMappingJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"templateType\"] = \"CollectionFhirTemplate\",\n [\"template\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"templateType\"] = \"CodeValueFhir\",\n [\"template\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"codes\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"code\"] = \"8867-4\",\n [\"system\"] = \"http://loinc.org\",\n [\"display\"] = \"Heart rate\",\n },\n },\n [\"periodInterval\"] = 60,\n [\"typeName\"] = \"heartrate\",\n [\"value\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"defaultPeriod\"] = 5000,\n [\"unit\"] = \"count/min\",\n [\"valueName\"] = \"hr\",\n [\"valueType\"] = \"SampledData\",\n },\n },\n },\n },\n }),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/eventhub\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/healthcare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := healthcare.NewWorkspace(ctx, \"example\", \u0026healthcare.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"exampleworkspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHubNamespace, err := eventhub.NewEventHubNamespace(ctx, \"example\", \u0026eventhub.EventHubNamespaceArgs{\n\t\t\tName: pulumi.String(\"example-ehn\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHub, err := eventhub.NewEventHub(ctx, \"example\", \u0026eventhub.EventHubArgs{\n\t\t\tName: pulumi.String(\"example-eh\"),\n\t\t\tNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tPartitionCount: pulumi.Int(1),\n\t\t\tMessageRetention: pulumi.Int(1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleConsumerGroup, err := eventhub.NewConsumerGroup(ctx, \"example\", \u0026eventhub.ConsumerGroupArgs{\n\t\t\tName: pulumi.String(\"$default\"),\n\t\t\tNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tEventhubName: exampleEventHub.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFhirService, err := healthcare.NewFhirService(ctx, \"example\", \u0026healthcare.FhirServiceArgs{\n\t\t\tName: pulumi.String(\"examplefhir\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tKind: pulumi.String(\"fhir-R4\"),\n\t\t\tAuthentication: \u0026healthcare.FhirServiceAuthenticationArgs{\n\t\t\t\tAuthority: pulumi.String(\"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\"),\n\t\t\t\tAudience: pulumi.String(\"https://examplefhir.fhir.azurehealthcareapis.com\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"templateType\": \"CollectionContent\",\n\t\t\t\"template\": []interface{}{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\texampleMedtechService, err := healthcare.NewMedtechService(ctx, \"example\", \u0026healthcare.MedtechServiceArgs{\n\t\t\tName: pulumi.String(\"examplemt\"),\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLocation: example.Location,\n\t\t\tEventhubNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tEventhubName: exampleEventHub.Name,\n\t\t\tEventhubConsumerGroupName: exampleConsumerGroup.Name,\n\t\t\tDeviceMappingJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"templateType\": \"CollectionFhirTemplate\",\n\t\t\t\"template\": []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"templateType\": \"CodeValueFhir\",\n\t\t\t\t\t\"template\": map[string]interface{}{\n\t\t\t\t\t\t\"codes\": []map[string]interface{}{\n\t\t\t\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\t\t\t\"code\": \"8867-4\",\n\t\t\t\t\t\t\t\t\"system\": \"http://loinc.org\",\n\t\t\t\t\t\t\t\t\"display\": \"Heart rate\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"periodInterval\": 60,\n\t\t\t\t\t\t\"typeName\": \"heartrate\",\n\t\t\t\t\t\t\"value\": map[string]interface{}{\n\t\t\t\t\t\t\t\"defaultPeriod\": 5000,\n\t\t\t\t\t\t\t\"unit\": \"count/min\",\n\t\t\t\t\t\t\t\"valueName\": \"hr\",\n\t\t\t\t\t\t\t\"valueType\": \"SampledData\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\t_, err = healthcare.NewMedtechServiceFhirDestination(ctx, \"example\", \u0026healthcare.MedtechServiceFhirDestinationArgs{\n\t\t\tName: pulumi.String(\"examplemtdes\"),\n\t\t\tLocation: pulumi.String(\"east us\"),\n\t\t\tMedtechServiceId: exampleMedtechService.ID(),\n\t\t\tDestinationFhirServiceId: exampleFhirService.ID(),\n\t\t\tDestinationIdentityResolutionType: pulumi.String(\"Create\"),\n\t\t\tDestinationFhirMappingJson: pulumi.String(json1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.healthcare.Workspace;\nimport com.pulumi.azure.healthcare.WorkspaceArgs;\nimport com.pulumi.azure.eventhub.EventHubNamespace;\nimport com.pulumi.azure.eventhub.EventHubNamespaceArgs;\nimport com.pulumi.azure.eventhub.EventHub;\nimport com.pulumi.azure.eventhub.EventHubArgs;\nimport com.pulumi.azure.eventhub.ConsumerGroup;\nimport com.pulumi.azure.eventhub.ConsumerGroupArgs;\nimport com.pulumi.azure.healthcare.FhirService;\nimport com.pulumi.azure.healthcare.FhirServiceArgs;\nimport com.pulumi.azure.healthcare.inputs.FhirServiceAuthenticationArgs;\nimport com.pulumi.azure.healthcare.MedtechService;\nimport com.pulumi.azure.healthcare.MedtechServiceArgs;\nimport com.pulumi.azure.healthcare.MedtechServiceFhirDestination;\nimport com.pulumi.azure.healthcare.MedtechServiceFhirDestinationArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"exampleworkspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleEventHubNamespace = new EventHubNamespace(\"exampleEventHubNamespace\", EventHubNamespaceArgs.builder()\n .name(\"example-ehn\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard\")\n .build());\n\n var exampleEventHub = new EventHub(\"exampleEventHub\", EventHubArgs.builder()\n .name(\"example-eh\")\n .namespaceName(exampleEventHubNamespace.name())\n .resourceGroupName(example.name())\n .partitionCount(1)\n .messageRetention(1)\n .build());\n\n var exampleConsumerGroup = new ConsumerGroup(\"exampleConsumerGroup\", ConsumerGroupArgs.builder()\n .name(\"$default\")\n .namespaceName(exampleEventHubNamespace.name())\n .eventhubName(exampleEventHub.name())\n .resourceGroupName(example.name())\n .build());\n\n var exampleFhirService = new FhirService(\"exampleFhirService\", FhirServiceArgs.builder()\n .name(\"examplefhir\")\n .location(example.location())\n .resourceGroupName(example.name())\n .workspaceId(exampleWorkspace.id())\n .kind(\"fhir-R4\")\n .authentication(FhirServiceAuthenticationArgs.builder()\n .authority(\"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\")\n .audience(\"https://examplefhir.fhir.azurehealthcareapis.com\")\n .build())\n .build());\n\n var exampleMedtechService = new MedtechService(\"exampleMedtechService\", MedtechServiceArgs.builder()\n .name(\"examplemt\")\n .workspaceId(exampleWorkspace.id())\n .location(example.location())\n .eventhubNamespaceName(exampleEventHubNamespace.name())\n .eventhubName(exampleEventHub.name())\n .eventhubConsumerGroupName(exampleConsumerGroup.name())\n .deviceMappingJson(serializeJson(\n jsonObject(\n jsonProperty(\"templateType\", \"CollectionContent\"),\n jsonProperty(\"template\", jsonArray(\n ))\n )))\n .build());\n\n var exampleMedtechServiceFhirDestination = new MedtechServiceFhirDestination(\"exampleMedtechServiceFhirDestination\", MedtechServiceFhirDestinationArgs.builder()\n .name(\"examplemtdes\")\n .location(\"east us\")\n .medtechServiceId(exampleMedtechService.id())\n .destinationFhirServiceId(exampleFhirService.id())\n .destinationIdentityResolutionType(\"Create\")\n .destinationFhirMappingJson(serializeJson(\n jsonObject(\n jsonProperty(\"templateType\", \"CollectionFhirTemplate\"),\n jsonProperty(\"template\", jsonArray(jsonObject(\n jsonProperty(\"templateType\", \"CodeValueFhir\"),\n jsonProperty(\"template\", jsonObject(\n jsonProperty(\"codes\", jsonArray(jsonObject(\n jsonProperty(\"code\", \"8867-4\"),\n jsonProperty(\"system\", \"http://loinc.org\"),\n jsonProperty(\"display\", \"Heart rate\")\n ))),\n jsonProperty(\"periodInterval\", 60),\n jsonProperty(\"typeName\", \"heartrate\"),\n jsonProperty(\"value\", jsonObject(\n jsonProperty(\"defaultPeriod\", 5000),\n jsonProperty(\"unit\", \"count/min\"),\n jsonProperty(\"valueName\", \"hr\"),\n jsonProperty(\"valueType\", \"SampledData\")\n ))\n ))\n )))\n )))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n exampleWorkspace:\n type: azure:healthcare:Workspace\n name: example\n properties:\n name: exampleworkspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleEventHubNamespace:\n type: azure:eventhub:EventHubNamespace\n name: example\n properties:\n name: example-ehn\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard\n exampleEventHub:\n type: azure:eventhub:EventHub\n name: example\n properties:\n name: example-eh\n namespaceName: ${exampleEventHubNamespace.name}\n resourceGroupName: ${example.name}\n partitionCount: 1\n messageRetention: 1\n exampleConsumerGroup:\n type: azure:eventhub:ConsumerGroup\n name: example\n properties:\n name: $default\n namespaceName: ${exampleEventHubNamespace.name}\n eventhubName: ${exampleEventHub.name}\n resourceGroupName: ${example.name}\n exampleFhirService:\n type: azure:healthcare:FhirService\n name: example\n properties:\n name: examplefhir\n location: ${example.location}\n resourceGroupName: ${example.name}\n workspaceId: ${exampleWorkspace.id}\n kind: fhir-R4\n authentication:\n authority: https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\n audience: https://examplefhir.fhir.azurehealthcareapis.com\n exampleMedtechService:\n type: azure:healthcare:MedtechService\n name: example\n properties:\n name: examplemt\n workspaceId: ${exampleWorkspace.id}\n location: ${example.location}\n eventhubNamespaceName: ${exampleEventHubNamespace.name}\n eventhubName: ${exampleEventHub.name}\n eventhubConsumerGroupName: ${exampleConsumerGroup.name}\n deviceMappingJson:\n fn::toJSON:\n templateType: CollectionContent\n template: []\n exampleMedtechServiceFhirDestination:\n type: azure:healthcare:MedtechServiceFhirDestination\n name: example\n properties:\n name: examplemtdes\n location: east us\n medtechServiceId: ${exampleMedtechService.id}\n destinationFhirServiceId: ${exampleFhirService.id}\n destinationIdentityResolutionType: Create\n destinationFhirMappingJson:\n fn::toJSON:\n templateType: CollectionFhirTemplate\n template:\n - templateType: CodeValueFhir\n template:\n codes:\n - code: 8867-4\n system: http://loinc.org\n display: Heart rate\n periodInterval: 60\n typeName: heartrate\n value:\n defaultPeriod: 5000\n unit: count/min\n valueName: hr\n valueType: SampledData\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nHealthcare Med Tech Service Fhir Destination can be imported using the resource`id`, e.g.\n\n```sh\n$ pulumi import azure:healthcare/medtechServiceFhirDestination:MedtechServiceFhirDestination example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.HealthcareApis/workspaces/workspace1/iotConnectors/iotconnector1/fhirDestinations/destination1\n```\n\n", + "description": "Manages a Healthcare Med Tech Service Fhir Destination.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleWorkspace = new azure.healthcare.Workspace(\"example\", {\n name: \"exampleworkspace\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleEventHubNamespace = new azure.eventhub.EventHubNamespace(\"example\", {\n name: \"example-ehn\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard\",\n});\nconst exampleEventHub = new azure.eventhub.EventHub(\"example\", {\n name: \"example-eh\",\n namespaceName: exampleEventHubNamespace.name,\n resourceGroupName: example.name,\n partitionCount: 1,\n messageRetention: 1,\n});\nconst exampleConsumerGroup = new azure.eventhub.ConsumerGroup(\"example\", {\n name: \"$default\",\n namespaceName: exampleEventHubNamespace.name,\n eventhubName: exampleEventHub.name,\n resourceGroupName: example.name,\n});\nconst exampleFhirService = new azure.healthcare.FhirService(\"example\", {\n name: \"examplefhir\",\n location: example.location,\n resourceGroupName: example.name,\n workspaceId: exampleWorkspace.id,\n kind: \"fhir-R4\",\n authentication: {\n authority: \"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n audience: \"https://examplefhir.fhir.azurehealthcareapis.com\",\n },\n});\nconst exampleMedtechService = new azure.healthcare.MedtechService(\"example\", {\n name: \"examplemt\",\n workspaceId: exampleWorkspace.id,\n location: example.location,\n eventhubNamespaceName: exampleEventHubNamespace.name,\n eventhubName: exampleEventHub.name,\n eventhubConsumerGroupName: exampleConsumerGroup.name,\n deviceMappingJson: JSON.stringify({\n templateType: \"CollectionContent\",\n template: [],\n }),\n});\nconst exampleMedtechServiceFhirDestination = new azure.healthcare.MedtechServiceFhirDestination(\"example\", {\n name: \"examplemtdes\",\n location: \"east us\",\n medtechServiceId: exampleMedtechService.id,\n destinationFhirServiceId: exampleFhirService.id,\n destinationIdentityResolutionType: \"Create\",\n destinationFhirMappingJson: JSON.stringify({\n templateType: \"CollectionFhirTemplate\",\n template: [{\n templateType: \"CodeValueFhir\",\n template: {\n codes: [{\n code: \"8867-4\",\n system: \"http://loinc.org\",\n display: \"Heart rate\",\n }],\n periodInterval: 60,\n typeName: \"heartrate\",\n value: {\n defaultPeriod: 5000,\n unit: \"count/min\",\n valueName: \"hr\",\n valueType: \"SampledData\",\n },\n },\n }],\n }),\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_workspace = azure.healthcare.Workspace(\"example\",\n name=\"exampleworkspace\",\n location=example.location,\n resource_group_name=example.name)\nexample_event_hub_namespace = azure.eventhub.EventHubNamespace(\"example\",\n name=\"example-ehn\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard\")\nexample_event_hub = azure.eventhub.EventHub(\"example\",\n name=\"example-eh\",\n namespace_name=example_event_hub_namespace.name,\n resource_group_name=example.name,\n partition_count=1,\n message_retention=1)\nexample_consumer_group = azure.eventhub.ConsumerGroup(\"example\",\n name=\"$default\",\n namespace_name=example_event_hub_namespace.name,\n eventhub_name=example_event_hub.name,\n resource_group_name=example.name)\nexample_fhir_service = azure.healthcare.FhirService(\"example\",\n name=\"examplefhir\",\n location=example.location,\n resource_group_name=example.name,\n workspace_id=example_workspace.id,\n kind=\"fhir-R4\",\n authentication={\n \"authority\": \"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n \"audience\": \"https://examplefhir.fhir.azurehealthcareapis.com\",\n })\nexample_medtech_service = azure.healthcare.MedtechService(\"example\",\n name=\"examplemt\",\n workspace_id=example_workspace.id,\n location=example.location,\n eventhub_namespace_name=example_event_hub_namespace.name,\n eventhub_name=example_event_hub.name,\n eventhub_consumer_group_name=example_consumer_group.name,\n device_mapping_json=json.dumps({\n \"templateType\": \"CollectionContent\",\n \"template\": [],\n }))\nexample_medtech_service_fhir_destination = azure.healthcare.MedtechServiceFhirDestination(\"example\",\n name=\"examplemtdes\",\n location=\"east us\",\n medtech_service_id=example_medtech_service.id,\n destination_fhir_service_id=example_fhir_service.id,\n destination_identity_resolution_type=\"Create\",\n destination_fhir_mapping_json=json.dumps({\n \"templateType\": \"CollectionFhirTemplate\",\n \"template\": [{\n \"templateType\": \"CodeValueFhir\",\n \"template\": {\n \"codes\": [{\n \"code\": \"8867-4\",\n \"system\": \"http://loinc.org\",\n \"display\": \"Heart rate\",\n }],\n \"periodInterval\": 60,\n \"typeName\": \"heartrate\",\n \"value\": {\n \"defaultPeriod\": 5000,\n \"unit\": \"count/min\",\n \"valueName\": \"hr\",\n \"valueType\": \"SampledData\",\n },\n },\n }],\n }))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleWorkspace = new Azure.Healthcare.Workspace(\"example\", new()\n {\n Name = \"exampleworkspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleEventHubNamespace = new Azure.EventHub.EventHubNamespace(\"example\", new()\n {\n Name = \"example-ehn\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard\",\n });\n\n var exampleEventHub = new Azure.EventHub.EventHub(\"example\", new()\n {\n Name = \"example-eh\",\n NamespaceName = exampleEventHubNamespace.Name,\n ResourceGroupName = example.Name,\n PartitionCount = 1,\n MessageRetention = 1,\n });\n\n var exampleConsumerGroup = new Azure.EventHub.ConsumerGroup(\"example\", new()\n {\n Name = \"$default\",\n NamespaceName = exampleEventHubNamespace.Name,\n EventhubName = exampleEventHub.Name,\n ResourceGroupName = example.Name,\n });\n\n var exampleFhirService = new Azure.Healthcare.FhirService(\"example\", new()\n {\n Name = \"examplefhir\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n WorkspaceId = exampleWorkspace.Id,\n Kind = \"fhir-R4\",\n Authentication = new Azure.Healthcare.Inputs.FhirServiceAuthenticationArgs\n {\n Authority = \"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n Audience = \"https://examplefhir.fhir.azurehealthcareapis.com\",\n },\n });\n\n var exampleMedtechService = new Azure.Healthcare.MedtechService(\"example\", new()\n {\n Name = \"examplemt\",\n WorkspaceId = exampleWorkspace.Id,\n Location = example.Location,\n EventhubNamespaceName = exampleEventHubNamespace.Name,\n EventhubName = exampleEventHub.Name,\n EventhubConsumerGroupName = exampleConsumerGroup.Name,\n DeviceMappingJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"templateType\"] = \"CollectionContent\",\n [\"template\"] = new[]\n {\n },\n }),\n });\n\n var exampleMedtechServiceFhirDestination = new Azure.Healthcare.MedtechServiceFhirDestination(\"example\", new()\n {\n Name = \"examplemtdes\",\n Location = \"east us\",\n MedtechServiceId = exampleMedtechService.Id,\n DestinationFhirServiceId = exampleFhirService.Id,\n DestinationIdentityResolutionType = \"Create\",\n DestinationFhirMappingJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"templateType\"] = \"CollectionFhirTemplate\",\n [\"template\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"templateType\"] = \"CodeValueFhir\",\n [\"template\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"codes\"] = new[]\n {\n new Dictionary\u003cstring, object?\u003e\n {\n [\"code\"] = \"8867-4\",\n [\"system\"] = \"http://loinc.org\",\n [\"display\"] = \"Heart rate\",\n },\n },\n [\"periodInterval\"] = 60,\n [\"typeName\"] = \"heartrate\",\n [\"value\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"defaultPeriod\"] = 5000,\n [\"unit\"] = \"count/min\",\n [\"valueName\"] = \"hr\",\n [\"valueType\"] = \"SampledData\",\n },\n },\n },\n },\n }),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/eventhub\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/healthcare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := healthcare.NewWorkspace(ctx, \"example\", \u0026healthcare.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"exampleworkspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHubNamespace, err := eventhub.NewEventHubNamespace(ctx, \"example\", \u0026eventhub.EventHubNamespaceArgs{\n\t\t\tName: pulumi.String(\"example-ehn\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHub, err := eventhub.NewEventHub(ctx, \"example\", \u0026eventhub.EventHubArgs{\n\t\t\tName: pulumi.String(\"example-eh\"),\n\t\t\tNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tPartitionCount: pulumi.Int(1),\n\t\t\tMessageRetention: pulumi.Int(1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleConsumerGroup, err := eventhub.NewConsumerGroup(ctx, \"example\", \u0026eventhub.ConsumerGroupArgs{\n\t\t\tName: pulumi.String(\"$default\"),\n\t\t\tNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tEventhubName: exampleEventHub.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFhirService, err := healthcare.NewFhirService(ctx, \"example\", \u0026healthcare.FhirServiceArgs{\n\t\t\tName: pulumi.String(\"examplefhir\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tKind: pulumi.String(\"fhir-R4\"),\n\t\t\tAuthentication: \u0026healthcare.FhirServiceAuthenticationArgs{\n\t\t\t\tAuthority: pulumi.String(\"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\"),\n\t\t\t\tAudience: pulumi.String(\"https://examplefhir.fhir.azurehealthcareapis.com\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"templateType\": \"CollectionContent\",\n\t\t\t\"template\": []interface{}{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\texampleMedtechService, err := healthcare.NewMedtechService(ctx, \"example\", \u0026healthcare.MedtechServiceArgs{\n\t\t\tName: pulumi.String(\"examplemt\"),\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLocation: example.Location,\n\t\t\tEventhubNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tEventhubName: exampleEventHub.Name,\n\t\t\tEventhubConsumerGroupName: exampleConsumerGroup.Name,\n\t\t\tDeviceMappingJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"templateType\": \"CollectionFhirTemplate\",\n\t\t\t\"template\": []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"templateType\": \"CodeValueFhir\",\n\t\t\t\t\t\"template\": map[string]interface{}{\n\t\t\t\t\t\t\"codes\": []map[string]interface{}{\n\t\t\t\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\t\t\t\"code\": \"8867-4\",\n\t\t\t\t\t\t\t\t\"system\": \"http://loinc.org\",\n\t\t\t\t\t\t\t\t\"display\": \"Heart rate\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"periodInterval\": 60,\n\t\t\t\t\t\t\"typeName\": \"heartrate\",\n\t\t\t\t\t\t\"value\": map[string]interface{}{\n\t\t\t\t\t\t\t\"defaultPeriod\": 5000,\n\t\t\t\t\t\t\t\"unit\": \"count/min\",\n\t\t\t\t\t\t\t\"valueName\": \"hr\",\n\t\t\t\t\t\t\t\"valueType\": \"SampledData\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\t_, err = healthcare.NewMedtechServiceFhirDestination(ctx, \"example\", \u0026healthcare.MedtechServiceFhirDestinationArgs{\n\t\t\tName: pulumi.String(\"examplemtdes\"),\n\t\t\tLocation: pulumi.String(\"east us\"),\n\t\t\tMedtechServiceId: exampleMedtechService.ID(),\n\t\t\tDestinationFhirServiceId: exampleFhirService.ID(),\n\t\t\tDestinationIdentityResolutionType: pulumi.String(\"Create\"),\n\t\t\tDestinationFhirMappingJson: pulumi.String(json1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.healthcare.Workspace;\nimport com.pulumi.azure.healthcare.WorkspaceArgs;\nimport com.pulumi.azure.eventhub.EventHubNamespace;\nimport com.pulumi.azure.eventhub.EventHubNamespaceArgs;\nimport com.pulumi.azure.eventhub.EventHub;\nimport com.pulumi.azure.eventhub.EventHubArgs;\nimport com.pulumi.azure.eventhub.ConsumerGroup;\nimport com.pulumi.azure.eventhub.ConsumerGroupArgs;\nimport com.pulumi.azure.healthcare.FhirService;\nimport com.pulumi.azure.healthcare.FhirServiceArgs;\nimport com.pulumi.azure.healthcare.inputs.FhirServiceAuthenticationArgs;\nimport com.pulumi.azure.healthcare.MedtechService;\nimport com.pulumi.azure.healthcare.MedtechServiceArgs;\nimport com.pulumi.azure.healthcare.MedtechServiceFhirDestination;\nimport com.pulumi.azure.healthcare.MedtechServiceFhirDestinationArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"exampleworkspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleEventHubNamespace = new EventHubNamespace(\"exampleEventHubNamespace\", EventHubNamespaceArgs.builder()\n .name(\"example-ehn\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard\")\n .build());\n\n var exampleEventHub = new EventHub(\"exampleEventHub\", EventHubArgs.builder()\n .name(\"example-eh\")\n .namespaceName(exampleEventHubNamespace.name())\n .resourceGroupName(example.name())\n .partitionCount(1)\n .messageRetention(1)\n .build());\n\n var exampleConsumerGroup = new ConsumerGroup(\"exampleConsumerGroup\", ConsumerGroupArgs.builder()\n .name(\"$default\")\n .namespaceName(exampleEventHubNamespace.name())\n .eventhubName(exampleEventHub.name())\n .resourceGroupName(example.name())\n .build());\n\n var exampleFhirService = new FhirService(\"exampleFhirService\", FhirServiceArgs.builder()\n .name(\"examplefhir\")\n .location(example.location())\n .resourceGroupName(example.name())\n .workspaceId(exampleWorkspace.id())\n .kind(\"fhir-R4\")\n .authentication(FhirServiceAuthenticationArgs.builder()\n .authority(\"https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\")\n .audience(\"https://examplefhir.fhir.azurehealthcareapis.com\")\n .build())\n .build());\n\n var exampleMedtechService = new MedtechService(\"exampleMedtechService\", MedtechServiceArgs.builder()\n .name(\"examplemt\")\n .workspaceId(exampleWorkspace.id())\n .location(example.location())\n .eventhubNamespaceName(exampleEventHubNamespace.name())\n .eventhubName(exampleEventHub.name())\n .eventhubConsumerGroupName(exampleConsumerGroup.name())\n .deviceMappingJson(serializeJson(\n jsonObject(\n jsonProperty(\"templateType\", \"CollectionContent\"),\n jsonProperty(\"template\", jsonArray(\n ))\n )))\n .build());\n\n var exampleMedtechServiceFhirDestination = new MedtechServiceFhirDestination(\"exampleMedtechServiceFhirDestination\", MedtechServiceFhirDestinationArgs.builder()\n .name(\"examplemtdes\")\n .location(\"east us\")\n .medtechServiceId(exampleMedtechService.id())\n .destinationFhirServiceId(exampleFhirService.id())\n .destinationIdentityResolutionType(\"Create\")\n .destinationFhirMappingJson(serializeJson(\n jsonObject(\n jsonProperty(\"templateType\", \"CollectionFhirTemplate\"),\n jsonProperty(\"template\", jsonArray(jsonObject(\n jsonProperty(\"templateType\", \"CodeValueFhir\"),\n jsonProperty(\"template\", jsonObject(\n jsonProperty(\"codes\", jsonArray(jsonObject(\n jsonProperty(\"code\", \"8867-4\"),\n jsonProperty(\"system\", \"http://loinc.org\"),\n jsonProperty(\"display\", \"Heart rate\")\n ))),\n jsonProperty(\"periodInterval\", 60),\n jsonProperty(\"typeName\", \"heartrate\"),\n jsonProperty(\"value\", jsonObject(\n jsonProperty(\"defaultPeriod\", 5000),\n jsonProperty(\"unit\", \"count/min\"),\n jsonProperty(\"valueName\", \"hr\"),\n jsonProperty(\"valueType\", \"SampledData\")\n ))\n ))\n )))\n )))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n exampleWorkspace:\n type: azure:healthcare:Workspace\n name: example\n properties:\n name: exampleworkspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleEventHubNamespace:\n type: azure:eventhub:EventHubNamespace\n name: example\n properties:\n name: example-ehn\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard\n exampleEventHub:\n type: azure:eventhub:EventHub\n name: example\n properties:\n name: example-eh\n namespaceName: ${exampleEventHubNamespace.name}\n resourceGroupName: ${example.name}\n partitionCount: 1\n messageRetention: 1\n exampleConsumerGroup:\n type: azure:eventhub:ConsumerGroup\n name: example\n properties:\n name: $default\n namespaceName: ${exampleEventHubNamespace.name}\n eventhubName: ${exampleEventHub.name}\n resourceGroupName: ${example.name}\n exampleFhirService:\n type: azure:healthcare:FhirService\n name: example\n properties:\n name: examplefhir\n location: ${example.location}\n resourceGroupName: ${example.name}\n workspaceId: ${exampleWorkspace.id}\n kind: fhir-R4\n authentication:\n authority: https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\n audience: https://examplefhir.fhir.azurehealthcareapis.com\n exampleMedtechService:\n type: azure:healthcare:MedtechService\n name: example\n properties:\n name: examplemt\n workspaceId: ${exampleWorkspace.id}\n location: ${example.location}\n eventhubNamespaceName: ${exampleEventHubNamespace.name}\n eventhubName: ${exampleEventHub.name}\n eventhubConsumerGroupName: ${exampleConsumerGroup.name}\n deviceMappingJson:\n fn::toJSON:\n templateType: CollectionContent\n template: []\n exampleMedtechServiceFhirDestination:\n type: azure:healthcare:MedtechServiceFhirDestination\n name: example\n properties:\n name: examplemtdes\n location: east us\n medtechServiceId: ${exampleMedtechService.id}\n destinationFhirServiceId: ${exampleFhirService.id}\n destinationIdentityResolutionType: Create\n destinationFhirMappingJson:\n fn::toJSON:\n templateType: CollectionFhirTemplate\n template:\n - templateType: CodeValueFhir\n template:\n codes:\n - code: 8867-4\n system: http://loinc.org\n display: Heart rate\n periodInterval: 60\n typeName: heartrate\n value:\n defaultPeriod: 5000\n unit: count/min\n valueName: hr\n valueType: SampledData\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nHealthcare Med Tech Service Fhir Destination can be imported using the resource`id`, e.g.\n\n```sh\n$ pulumi import azure:healthcare/medtechServiceFhirDestination:MedtechServiceFhirDestination example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.HealthcareApis/workspaces/workspace1/iotConnectors/iotconnector1/fhirDestinations/destination1\n```\n\n", "properties": { "destinationFhirMappingJson": { "type": "string", @@ -189073,7 +189073,7 @@ } }, "azure:healthcare/service:Service": { - "description": "Manages a Healthcare Service.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.healthcare.Service(\"example\", {\n name: \"uniquefhirname\",\n resourceGroupName: \"sample-resource-group\",\n location: \"westus2\",\n kind: \"fhir-R4\",\n cosmosdbThroughput: 2000,\n identity: {\n type: \"SystemAssigned\",\n },\n accessPolicyObjectIds: current.then(current =\u003e current.objectId),\n configurationExportStorageAccountName: \"teststorage\",\n tags: {\n environment: \"testenv\",\n purpose: \"AcceptanceTests\",\n },\n authenticationConfiguration: {\n authority: \"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\",\n audience: \"https://azurehealthcareapis.com/\",\n smartProxyEnabled: true,\n },\n corsConfiguration: {\n allowedOrigins: [\n \"http://www.example.com\",\n \"http://www.example2.com\",\n ],\n allowedHeaders: [\n \"x-tempo-*\",\n \"x-tempo2-*\",\n ],\n allowedMethods: [\n \"GET\",\n \"PUT\",\n ],\n maxAgeInSeconds: 500,\n allowCredentials: true,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.healthcare.Service(\"example\",\n name=\"uniquefhirname\",\n resource_group_name=\"sample-resource-group\",\n location=\"westus2\",\n kind=\"fhir-R4\",\n cosmosdb_throughput=2000,\n identity={\n \"type\": \"SystemAssigned\",\n },\n access_policy_object_ids=current.object_id,\n configuration_export_storage_account_name=\"teststorage\",\n tags={\n \"environment\": \"testenv\",\n \"purpose\": \"AcceptanceTests\",\n },\n authentication_configuration={\n \"authority\": \"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\",\n \"audience\": \"https://azurehealthcareapis.com/\",\n \"smart_proxy_enabled\": True,\n },\n cors_configuration={\n \"allowed_origins\": [\n \"http://www.example.com\",\n \"http://www.example2.com\",\n ],\n \"allowed_headers\": [\n \"x-tempo-*\",\n \"x-tempo2-*\",\n ],\n \"allowed_methods\": [\n \"GET\",\n \"PUT\",\n ],\n \"max_age_in_seconds\": 500,\n \"allow_credentials\": True,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Healthcare.Service(\"example\", new()\n {\n Name = \"uniquefhirname\",\n ResourceGroupName = \"sample-resource-group\",\n Location = \"westus2\",\n Kind = \"fhir-R4\",\n CosmosdbThroughput = 2000,\n Identity = new Azure.Healthcare.Inputs.ServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n AccessPolicyObjectIds = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n ConfigurationExportStorageAccountName = \"teststorage\",\n Tags = \n {\n { \"environment\", \"testenv\" },\n { \"purpose\", \"AcceptanceTests\" },\n },\n AuthenticationConfiguration = new Azure.Healthcare.Inputs.ServiceAuthenticationConfigurationArgs\n {\n Authority = \"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\",\n Audience = \"https://azurehealthcareapis.com/\",\n SmartProxyEnabled = true,\n },\n CorsConfiguration = new Azure.Healthcare.Inputs.ServiceCorsConfigurationArgs\n {\n AllowedOrigins = new[]\n {\n \"http://www.example.com\",\n \"http://www.example2.com\",\n },\n AllowedHeaders = new[]\n {\n \"x-tempo-*\",\n \"x-tempo2-*\",\n },\n AllowedMethods = new[]\n {\n \"GET\",\n \"PUT\",\n },\n MaxAgeInSeconds = 500,\n AllowCredentials = true,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/healthcare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = healthcare.NewService(ctx, \"example\", \u0026healthcare.ServiceArgs{\n\t\t\tName: pulumi.String(\"uniquefhirname\"),\n\t\t\tResourceGroupName: pulumi.String(\"sample-resource-group\"),\n\t\t\tLocation: pulumi.String(\"westus2\"),\n\t\t\tKind: pulumi.String(\"fhir-R4\"),\n\t\t\tCosmosdbThroughput: pulumi.Int(2000),\n\t\t\tIdentity: \u0026healthcare.ServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tAccessPolicyObjectIds: pulumi.String(current.ObjectId),\n\t\t\tConfigurationExportStorageAccountName: pulumi.String(\"teststorage\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"testenv\"),\n\t\t\t\t\"purpose\": pulumi.String(\"AcceptanceTests\"),\n\t\t\t},\n\t\t\tAuthenticationConfiguration: \u0026healthcare.ServiceAuthenticationConfigurationArgs{\n\t\t\t\tAuthority: pulumi.String(\"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\"),\n\t\t\t\tAudience: pulumi.String(\"https://azurehealthcareapis.com/\"),\n\t\t\t\tSmartProxyEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t\tCorsConfiguration: \u0026healthcare.ServiceCorsConfigurationArgs{\n\t\t\t\tAllowedOrigins: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"http://www.example.com\"),\n\t\t\t\t\tpulumi.String(\"http://www.example2.com\"),\n\t\t\t\t},\n\t\t\t\tAllowedHeaders: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"x-tempo-*\"),\n\t\t\t\t\tpulumi.String(\"x-tempo2-*\"),\n\t\t\t\t},\n\t\t\t\tAllowedMethods: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"GET\"),\n\t\t\t\t\tpulumi.String(\"PUT\"),\n\t\t\t\t},\n\t\t\t\tMaxAgeInSeconds: pulumi.Int(500),\n\t\t\t\tAllowCredentials: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.healthcare.Service;\nimport com.pulumi.azure.healthcare.ServiceArgs;\nimport com.pulumi.azure.healthcare.inputs.ServiceIdentityArgs;\nimport com.pulumi.azure.healthcare.inputs.ServiceAuthenticationConfigurationArgs;\nimport com.pulumi.azure.healthcare.inputs.ServiceCorsConfigurationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new Service(\"example\", ServiceArgs.builder()\n .name(\"uniquefhirname\")\n .resourceGroupName(\"sample-resource-group\")\n .location(\"westus2\")\n .kind(\"fhir-R4\")\n .cosmosdbThroughput(\"2000\")\n .identity(ServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .accessPolicyObjectIds(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .configurationExportStorageAccountName(\"teststorage\")\n .tags(Map.ofEntries(\n Map.entry(\"environment\", \"testenv\"),\n Map.entry(\"purpose\", \"AcceptanceTests\")\n ))\n .authenticationConfiguration(ServiceAuthenticationConfigurationArgs.builder()\n .authority(\"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\")\n .audience(\"https://azurehealthcareapis.com/\")\n .smartProxyEnabled(\"true\")\n .build())\n .corsConfiguration(ServiceCorsConfigurationArgs.builder()\n .allowedOrigins( \n \"http://www.example.com\",\n \"http://www.example2.com\")\n .allowedHeaders( \n \"x-tempo-*\",\n \"x-tempo2-*\")\n .allowedMethods( \n \"GET\",\n \"PUT\")\n .maxAgeInSeconds(\"500\")\n .allowCredentials(\"true\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:healthcare:Service\n properties:\n name: uniquefhirname\n resourceGroupName: sample-resource-group\n location: westus2\n kind: fhir-R4\n cosmosdbThroughput: '2000'\n identity:\n type: SystemAssigned\n accessPolicyObjectIds: ${current.objectId}\n configurationExportStorageAccountName: teststorage\n tags:\n environment: testenv\n purpose: AcceptanceTests\n authenticationConfiguration:\n authority: https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\n audience: https://azurehealthcareapis.com/\n smartProxyEnabled: 'true'\n corsConfiguration:\n allowedOrigins:\n - http://www.example.com\n - http://www.example2.com\n allowedHeaders:\n - x-tempo-*\n - x-tempo2-*\n allowedMethods:\n - GET\n - PUT\n maxAgeInSeconds: '500'\n allowCredentials: 'true'\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nHealthcare Service can be imported using the resource`id`, e.g.\n\n```sh\n$ pulumi import azure:healthcare/service:Service example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resource_group/providers/Microsoft.HealthcareApis/services/service_name\n```\n\n", + "description": "Manages a Healthcare Service.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.healthcare.Service(\"example\", {\n name: \"uniquefhirname\",\n resourceGroupName: \"sample-resource-group\",\n location: \"westus2\",\n kind: \"fhir-R4\",\n cosmosdbThroughput: 2000,\n identity: {\n type: \"SystemAssigned\",\n },\n accessPolicyObjectIds: current.then(current =\u003e current.objectId),\n configurationExportStorageAccountName: \"teststorage\",\n tags: {\n environment: \"testenv\",\n purpose: \"AcceptanceTests\",\n },\n authenticationConfiguration: {\n authority: \"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\",\n audience: \"https://azurehealthcareapis.com/\",\n smartProxyEnabled: true,\n },\n corsConfiguration: {\n allowedOrigins: [\n \"http://www.example.com\",\n \"http://www.example2.com\",\n ],\n allowedHeaders: [\n \"x-tempo-*\",\n \"x-tempo2-*\",\n ],\n allowedMethods: [\n \"GET\",\n \"PUT\",\n ],\n maxAgeInSeconds: 500,\n allowCredentials: true,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.healthcare.Service(\"example\",\n name=\"uniquefhirname\",\n resource_group_name=\"sample-resource-group\",\n location=\"westus2\",\n kind=\"fhir-R4\",\n cosmosdb_throughput=2000,\n identity={\n \"type\": \"SystemAssigned\",\n },\n access_policy_object_ids=current.object_id,\n configuration_export_storage_account_name=\"teststorage\",\n tags={\n \"environment\": \"testenv\",\n \"purpose\": \"AcceptanceTests\",\n },\n authentication_configuration={\n \"authority\": \"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\",\n \"audience\": \"https://azurehealthcareapis.com/\",\n \"smart_proxy_enabled\": True,\n },\n cors_configuration={\n \"allowed_origins\": [\n \"http://www.example.com\",\n \"http://www.example2.com\",\n ],\n \"allowed_headers\": [\n \"x-tempo-*\",\n \"x-tempo2-*\",\n ],\n \"allowed_methods\": [\n \"GET\",\n \"PUT\",\n ],\n \"max_age_in_seconds\": 500,\n \"allow_credentials\": True,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Healthcare.Service(\"example\", new()\n {\n Name = \"uniquefhirname\",\n ResourceGroupName = \"sample-resource-group\",\n Location = \"westus2\",\n Kind = \"fhir-R4\",\n CosmosdbThroughput = 2000,\n Identity = new Azure.Healthcare.Inputs.ServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n AccessPolicyObjectIds = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n ConfigurationExportStorageAccountName = \"teststorage\",\n Tags = \n {\n { \"environment\", \"testenv\" },\n { \"purpose\", \"AcceptanceTests\" },\n },\n AuthenticationConfiguration = new Azure.Healthcare.Inputs.ServiceAuthenticationConfigurationArgs\n {\n Authority = \"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\",\n Audience = \"https://azurehealthcareapis.com/\",\n SmartProxyEnabled = true,\n },\n CorsConfiguration = new Azure.Healthcare.Inputs.ServiceCorsConfigurationArgs\n {\n AllowedOrigins = new[]\n {\n \"http://www.example.com\",\n \"http://www.example2.com\",\n },\n AllowedHeaders = new[]\n {\n \"x-tempo-*\",\n \"x-tempo2-*\",\n },\n AllowedMethods = new[]\n {\n \"GET\",\n \"PUT\",\n },\n MaxAgeInSeconds = 500,\n AllowCredentials = true,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/healthcare\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = healthcare.NewService(ctx, \"example\", \u0026healthcare.ServiceArgs{\n\t\t\tName: pulumi.String(\"uniquefhirname\"),\n\t\t\tResourceGroupName: pulumi.String(\"sample-resource-group\"),\n\t\t\tLocation: pulumi.String(\"westus2\"),\n\t\t\tKind: pulumi.String(\"fhir-R4\"),\n\t\t\tCosmosdbThroughput: pulumi.Int(2000),\n\t\t\tIdentity: \u0026healthcare.ServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tAccessPolicyObjectIds: pulumi.String(current.ObjectId),\n\t\t\tConfigurationExportStorageAccountName: pulumi.String(\"teststorage\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"testenv\"),\n\t\t\t\t\"purpose\": pulumi.String(\"AcceptanceTests\"),\n\t\t\t},\n\t\t\tAuthenticationConfiguration: \u0026healthcare.ServiceAuthenticationConfigurationArgs{\n\t\t\t\tAuthority: pulumi.String(\"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\"),\n\t\t\t\tAudience: pulumi.String(\"https://azurehealthcareapis.com/\"),\n\t\t\t\tSmartProxyEnabled: pulumi.Bool(true),\n\t\t\t},\n\t\t\tCorsConfiguration: \u0026healthcare.ServiceCorsConfigurationArgs{\n\t\t\t\tAllowedOrigins: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"http://www.example.com\"),\n\t\t\t\t\tpulumi.String(\"http://www.example2.com\"),\n\t\t\t\t},\n\t\t\t\tAllowedHeaders: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"x-tempo-*\"),\n\t\t\t\t\tpulumi.String(\"x-tempo2-*\"),\n\t\t\t\t},\n\t\t\t\tAllowedMethods: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"GET\"),\n\t\t\t\t\tpulumi.String(\"PUT\"),\n\t\t\t\t},\n\t\t\t\tMaxAgeInSeconds: pulumi.Int(500),\n\t\t\t\tAllowCredentials: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.healthcare.Service;\nimport com.pulumi.azure.healthcare.ServiceArgs;\nimport com.pulumi.azure.healthcare.inputs.ServiceIdentityArgs;\nimport com.pulumi.azure.healthcare.inputs.ServiceAuthenticationConfigurationArgs;\nimport com.pulumi.azure.healthcare.inputs.ServiceCorsConfigurationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new Service(\"example\", ServiceArgs.builder()\n .name(\"uniquefhirname\")\n .resourceGroupName(\"sample-resource-group\")\n .location(\"westus2\")\n .kind(\"fhir-R4\")\n .cosmosdbThroughput(\"2000\")\n .identity(ServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .accessPolicyObjectIds(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .configurationExportStorageAccountName(\"teststorage\")\n .tags(Map.ofEntries(\n Map.entry(\"environment\", \"testenv\"),\n Map.entry(\"purpose\", \"AcceptanceTests\")\n ))\n .authenticationConfiguration(ServiceAuthenticationConfigurationArgs.builder()\n .authority(\"https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\")\n .audience(\"https://azurehealthcareapis.com/\")\n .smartProxyEnabled(\"true\")\n .build())\n .corsConfiguration(ServiceCorsConfigurationArgs.builder()\n .allowedOrigins( \n \"http://www.example.com\",\n \"http://www.example2.com\")\n .allowedHeaders( \n \"x-tempo-*\",\n \"x-tempo2-*\")\n .allowedMethods( \n \"GET\",\n \"PUT\")\n .maxAgeInSeconds(\"500\")\n .allowCredentials(\"true\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:healthcare:Service\n properties:\n name: uniquefhirname\n resourceGroupName: sample-resource-group\n location: westus2\n kind: fhir-R4\n cosmosdbThroughput: '2000'\n identity:\n type: SystemAssigned\n accessPolicyObjectIds: ${current.objectId}\n configurationExportStorageAccountName: teststorage\n tags:\n environment: testenv\n purpose: AcceptanceTests\n authenticationConfiguration:\n authority: https://login.microsoftonline.com/$%7Bdata.azurerm_client_config.current.tenant_id%7D\n audience: https://azurehealthcareapis.com/\n smartProxyEnabled: 'true'\n corsConfiguration:\n allowedOrigins:\n - http://www.example.com\n - http://www.example2.com\n allowedHeaders:\n - x-tempo-*\n - x-tempo2-*\n allowedMethods:\n - GET\n - PUT\n maxAgeInSeconds: '500'\n allowCredentials: 'true'\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nHealthcare Service can be imported using the resource`id`, e.g.\n\n```sh\n$ pulumi import azure:healthcare/service:Service example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resource_group/providers/Microsoft.HealthcareApis/services/service_name\n```\n\n", "properties": { "accessPolicyObjectIds": { "type": "array", @@ -193543,7 +193543,7 @@ } }, "azure:keyvault/accessPolicy:AccessPolicy": { - "description": "Manages a Key Vault Access Policy.\n\n\u003e **NOTE:** It's possible to define Key Vault Access Policies both within the `azure.keyvault.KeyVault` resource via the `access_policy` block and by using the `azure.keyvault.AccessPolicy` resource. However it's not possible to use both methods to manage Access Policies within a KeyVault, since there'll be conflicts.\n\n\u003e **NOTE:** Azure permits a maximum of 1024 Access Policies per Key Vault - [more information can be found in this document](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault#data-plane-access-control).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst current = azure.core.getClientConfig({});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\"Get\"],\n secretPermissions: [\"Get\"],\n});\nconst example = azuread.getServicePrincipal({\n displayName: \"example-app\",\n});\nconst example_principal = new azure.keyvault.AccessPolicy(\"example-principal\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: example.then(example =\u003e example.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Encrypt\",\n \"Decrypt\",\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\ncurrent = azure.core.get_client_config()\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\"Get\"],\n secret_permissions=[\"Get\"])\nexample = azuread.get_service_principal(display_name=\"example-app\")\nexample_principal = azure.keyvault.AccessPolicy(\"example-principal\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example.object_id,\n key_permissions=[\n \"Get\",\n \"List\",\n \"Encrypt\",\n \"Decrypt\",\n ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var example = AzureAD.GetServicePrincipal.Invoke(new()\n {\n DisplayName = \"example-app\",\n });\n\n var example_principal = new Azure.KeyVault.AccessPolicy(\"example-principal\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = example.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Encrypt\",\n \"Decrypt\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"example-app\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-principal\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(example.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions(\"Get\")\n .secretPermissions(\"Get\")\n .build());\n\n final var example = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .displayName(\"example-app\")\n .build());\n\n var example_principal = new AccessPolicy(\"example-principal\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(example.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Encrypt\",\n \"Decrypt\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n secretPermissions:\n - Get\n example-principal:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${example.objectId}\n keyPermissions:\n - Get\n - List\n - Encrypt\n - Decrypt\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n displayName: example-app\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Access Policies can be imported using the Resource ID of the Key Vault, plus some additional metadata.\n\nIf both an `object_id` and `application_id` are specified, then the Access Policy can be imported using the following code:\n\n```sh\n$ pulumi import azure:keyvault/accessPolicy:AccessPolicy example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.KeyVault/vaults/test-vault/objectId/11111111-1111-1111-1111-111111111111/applicationId/22222222-2222-2222-2222-222222222222\n```\n\nwhere `11111111-1111-1111-1111-111111111111` is the `object_id` and `22222222-2222-2222-2222-222222222222` is the `application_id`.\n\n---\n\nAccess Policies with an `object_id` but no `application_id` can be imported using the following command:\n\n```sh\n$ pulumi import azure:keyvault/accessPolicy:AccessPolicy example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.KeyVault/vaults/test-vault/objectId/11111111-1111-1111-1111-111111111111\n```\n\nwhere `11111111-1111-1111-1111-111111111111` is the `object_id`.\n\n", + "description": "Manages a Key Vault Access Policy.\n\n\u003e **NOTE:** It's possible to define Key Vault Access Policies both within the `azure.keyvault.KeyVault` resource via the `access_policy` block and by using the `azure.keyvault.AccessPolicy` resource. However it's not possible to use both methods to manage Access Policies within a KeyVault, since there'll be conflicts.\n\n\u003e **NOTE:** Azure permits a maximum of 1024 Access Policies per Key Vault - [more information can be found in this document](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault#data-plane-access-control).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst current = azure.core.getClientConfig({});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\"Get\"],\n secretPermissions: [\"Get\"],\n});\nconst example = azuread.getServicePrincipal({\n displayName: \"example-app\",\n});\nconst example_principal = new azure.keyvault.AccessPolicy(\"example-principal\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: example.then(example =\u003e example.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Encrypt\",\n \"Decrypt\",\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\ncurrent = azure.core.get_client_config()\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\"Get\"],\n secret_permissions=[\"Get\"])\nexample = azuread.get_service_principal(display_name=\"example-app\")\nexample_principal = azure.keyvault.AccessPolicy(\"example-principal\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example.object_id,\n key_permissions=[\n \"Get\",\n \"List\",\n \"Encrypt\",\n \"Decrypt\",\n ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var example = AzureAD.GetServicePrincipal.Invoke(new()\n {\n DisplayName = \"example-app\",\n });\n\n var example_principal = new Azure.KeyVault.AccessPolicy(\"example-principal\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = example.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Encrypt\",\n \"Decrypt\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"example-app\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-principal\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(example.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions(\"Get\")\n .secretPermissions(\"Get\")\n .build());\n\n final var example = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .displayName(\"example-app\")\n .build());\n\n var example_principal = new AccessPolicy(\"example-principal\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(example.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Encrypt\",\n \"Decrypt\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n secretPermissions:\n - Get\n example-principal:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${example.objectId}\n keyPermissions:\n - Get\n - List\n - Encrypt\n - Decrypt\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n displayName: example-app\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Access Policies can be imported using the Resource ID of the Key Vault, plus some additional metadata.\n\nIf both an `object_id` and `application_id` are specified, then the Access Policy can be imported using the following code:\n\n```sh\n$ pulumi import azure:keyvault/accessPolicy:AccessPolicy example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.KeyVault/vaults/test-vault/objectId/11111111-1111-1111-1111-111111111111/applicationId/22222222-2222-2222-2222-222222222222\n```\n\nwhere `11111111-1111-1111-1111-111111111111` is the `object_id` and `22222222-2222-2222-2222-222222222222` is the `application_id`.\n\n---\n\nAccess Policies with an `object_id` but no `application_id` can be imported using the following command:\n\n```sh\n$ pulumi import azure:keyvault/accessPolicy:AccessPolicy example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.KeyVault/vaults/test-vault/objectId/11111111-1111-1111-1111-111111111111\n```\n\nwhere `11111111-1111-1111-1111-111111111111` is the `object_id`.\n\n", "properties": { "applicationId": { "type": "string", @@ -193706,7 +193706,7 @@ } }, "azure:keyvault/certifiate:Certifiate": { - "description": "Manages a Key Vault Certificate.\n\n## Example Usage\n\n### Importing A PFX)\n\n\u003e **Note:** this example assumed the PFX file is located in the same directory at `certificate-to-import.pfx`.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n keyPermissions: [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n secretPermissions: [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n \"key_permissions\": [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n \"secret_permissions\": [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n },\n KeyPermissions = new[]\n {\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\")\n .keyPermissions( \n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\")\n .secretPermissions( \n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - SetIssuers\n - Update\n keyPermissions:\n - Backup\n - Create\n - Decrypt\n - Delete\n - Encrypt\n - Get\n - Import\n - List\n - Purge\n - Recover\n - Restore\n - Sign\n - UnwrapKey\n - Update\n - Verify\n - WrapKey\n secretPermissions:\n - Backup\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - Restore\n - Set\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Generating a new certificate\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n ],\n keyPermissions: [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n secretPermissions: [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"generated-cert\",\n keyVaultId: exampleKeyVault.id,\n certificatePolicy: {\n issuerParameters: {\n name: \"Self\",\n },\n keyProperties: {\n exportable: true,\n keySize: 2048,\n keyType: \"RSA\",\n reuseKey: true,\n },\n lifetimeActions: [{\n action: {\n actionType: \"AutoRenew\",\n },\n trigger: {\n daysBeforeExpiry: 30,\n },\n }],\n secretProperties: {\n contentType: \"application/x-pkcs12\",\n },\n x509CertificateProperties: {\n extendedKeyUsages: [\"1.3.6.1.5.5.7.3.1\"],\n keyUsages: [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n subjectAlternativeNames: {\n dnsNames: [\n \"internal.contoso.com\",\n \"domain.hello.world\",\n ],\n },\n subject: \"CN=hello-world\",\n validityInMonths: 12,\n },\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n ],\n \"key_permissions\": [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n \"secret_permissions\": [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"generated-cert\",\n key_vault_id=example_key_vault.id,\n certificate_policy={\n \"issuer_parameters\": {\n \"name\": \"Self\",\n },\n \"key_properties\": {\n \"exportable\": True,\n \"key_size\": 2048,\n \"key_type\": \"RSA\",\n \"reuse_key\": True,\n },\n \"lifetime_actions\": [{\n \"action\": {\n \"action_type\": \"AutoRenew\",\n },\n \"trigger\": {\n \"days_before_expiry\": 30,\n },\n }],\n \"secret_properties\": {\n \"content_type\": \"application/x-pkcs12\",\n },\n \"x509_certificate_properties\": {\n \"extended_key_usages\": [\"1.3.6.1.5.5.7.3.1\"],\n \"key_usages\": [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n \"subject_alternative_names\": {\n \"dns_names\": [\n \"internal.contoso.com\",\n \"domain.hello.world\",\n ],\n },\n \"subject\": \"CN=hello-world\",\n \"validity_in_months\": 12,\n },\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n },\n KeyPermissions = new[]\n {\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"generated-cert\",\n KeyVaultId = exampleKeyVault.Id,\n CertificatePolicy = new Azure.KeyVault.Inputs.CertificateCertificatePolicyArgs\n {\n IssuerParameters = new Azure.KeyVault.Inputs.CertificateCertificatePolicyIssuerParametersArgs\n {\n Name = \"Self\",\n },\n KeyProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyKeyPropertiesArgs\n {\n Exportable = true,\n KeySize = 2048,\n KeyType = \"RSA\",\n ReuseKey = true,\n },\n LifetimeActions = new[]\n {\n new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionArgs\n {\n Action = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionActionArgs\n {\n ActionType = \"AutoRenew\",\n },\n Trigger = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionTriggerArgs\n {\n DaysBeforeExpiry = 30,\n },\n },\n },\n SecretProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicySecretPropertiesArgs\n {\n ContentType = \"application/x-pkcs12\",\n },\n X509CertificateProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs\n {\n ExtendedKeyUsages = new[]\n {\n \"1.3.6.1.5.5.7.3.1\",\n },\n KeyUsages = new[]\n {\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n },\n SubjectAlternativeNames = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs\n {\n DnsNames = new[]\n {\n \"internal.contoso.com\",\n \"domain.hello.world\",\n },\n },\n Subject = \"CN=hello-world\",\n ValidityInMonths = 12,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"generated-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificatePolicy: \u0026keyvault.CertificateCertificatePolicyArgs{\n\t\t\t\tIssuerParameters: \u0026keyvault.CertificateCertificatePolicyIssuerParametersArgs{\n\t\t\t\t\tName: pulumi.String(\"Self\"),\n\t\t\t\t},\n\t\t\t\tKeyProperties: \u0026keyvault.CertificateCertificatePolicyKeyPropertiesArgs{\n\t\t\t\t\tExportable: pulumi.Bool(true),\n\t\t\t\t\tKeySize: pulumi.Int(2048),\n\t\t\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\t\t\tReuseKey: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t\tLifetimeActions: keyvault.CertificateCertificatePolicyLifetimeActionArray{\n\t\t\t\t\t\u0026keyvault.CertificateCertificatePolicyLifetimeActionArgs{\n\t\t\t\t\t\tAction: \u0026keyvault.CertificateCertificatePolicyLifetimeActionActionArgs{\n\t\t\t\t\t\t\tActionType: pulumi.String(\"AutoRenew\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tTrigger: \u0026keyvault.CertificateCertificatePolicyLifetimeActionTriggerArgs{\n\t\t\t\t\t\t\tDaysBeforeExpiry: pulumi.Int(30),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSecretProperties: \u0026keyvault.CertificateCertificatePolicySecretPropertiesArgs{\n\t\t\t\t\tContentType: pulumi.String(\"application/x-pkcs12\"),\n\t\t\t\t},\n\t\t\t\tX509CertificateProperties: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesArgs{\n\t\t\t\t\tExtendedKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"1.3.6.1.5.5.7.3.1\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"cRLSign\"),\n\t\t\t\t\t\tpulumi.String(\"dataEncipherment\"),\n\t\t\t\t\t\tpulumi.String(\"digitalSignature\"),\n\t\t\t\t\t\tpulumi.String(\"keyAgreement\"),\n\t\t\t\t\t\tpulumi.String(\"keyCertSign\"),\n\t\t\t\t\t\tpulumi.String(\"keyEncipherment\"),\n\t\t\t\t\t},\n\t\t\t\t\tSubjectAlternativeNames: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs{\n\t\t\t\t\t\tDnsNames: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"internal.contoso.com\"),\n\t\t\t\t\t\t\tpulumi.String(\"domain.hello.world\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSubject: pulumi.String(\"CN=hello-world\"),\n\t\t\t\t\tValidityInMonths: pulumi.Int(12),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyIssuerParametersArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyKeyPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicySecretPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\")\n .keyPermissions( \n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\")\n .secretPermissions( \n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"generated-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificatePolicy(CertificateCertificatePolicyArgs.builder()\n .issuerParameters(CertificateCertificatePolicyIssuerParametersArgs.builder()\n .name(\"Self\")\n .build())\n .keyProperties(CertificateCertificatePolicyKeyPropertiesArgs.builder()\n .exportable(true)\n .keySize(2048)\n .keyType(\"RSA\")\n .reuseKey(true)\n .build())\n .lifetimeActions(CertificateCertificatePolicyLifetimeActionArgs.builder()\n .action(CertificateCertificatePolicyLifetimeActionActionArgs.builder()\n .actionType(\"AutoRenew\")\n .build())\n .trigger(CertificateCertificatePolicyLifetimeActionTriggerArgs.builder()\n .daysBeforeExpiry(30)\n .build())\n .build())\n .secretProperties(CertificateCertificatePolicySecretPropertiesArgs.builder()\n .contentType(\"application/x-pkcs12\")\n .build())\n .x509CertificateProperties(CertificateCertificatePolicyX509CertificatePropertiesArgs.builder()\n .extendedKeyUsages(\"1.3.6.1.5.5.7.3.1\")\n .keyUsages( \n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\")\n .subjectAlternativeNames(CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs.builder()\n .dnsNames( \n \"internal.contoso.com\",\n \"domain.hello.world\")\n .build())\n .subject(\"CN=hello-world\")\n .validityInMonths(12)\n .build())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - Purge\n - SetIssuers\n - Update\n keyPermissions:\n - Backup\n - Create\n - Decrypt\n - Delete\n - Encrypt\n - Get\n - Import\n - List\n - Purge\n - Recover\n - Restore\n - Sign\n - UnwrapKey\n - Update\n - Verify\n - WrapKey\n secretPermissions:\n - Backup\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - Restore\n - Set\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: generated-cert\n keyVaultId: ${exampleKeyVault.id}\n certificatePolicy:\n issuerParameters:\n name: Self\n keyProperties:\n exportable: true\n keySize: 2048\n keyType: RSA\n reuseKey: true\n lifetimeActions:\n - action:\n actionType: AutoRenew\n trigger:\n daysBeforeExpiry: 30\n secretProperties:\n contentType: application/x-pkcs12\n x509CertificateProperties:\n extendedKeyUsages:\n - 1.3.6.1.5.5.7.3.1\n keyUsages:\n - cRLSign\n - dataEncipherment\n - digitalSignature\n - keyAgreement\n - keyCertSign\n - keyEncipherment\n subjectAlternativeNames:\n dnsNames:\n - internal.contoso.com\n - domain.hello.world\n subject: CN=hello-world\n validityInMonths: 12\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Certificates can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/certifiate:Certifiate example \"https://example-keyvault.vault.azure.net/certificates/example/fdf067c93bbb4b22bff4d8b7a9a56217\"\n```\n\n", + "description": "Manages a Key Vault Certificate.\n\n## Example Usage\n\n### Importing A PFX)\n\n\u003e **Note:** this example assumed the PFX file is located in the same directory at `certificate-to-import.pfx`.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n keyPermissions: [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n secretPermissions: [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n \"key_permissions\": [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n \"secret_permissions\": [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n },\n KeyPermissions = new[]\n {\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\")\n .keyPermissions( \n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\")\n .secretPermissions( \n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - SetIssuers\n - Update\n keyPermissions:\n - Backup\n - Create\n - Decrypt\n - Delete\n - Encrypt\n - Get\n - Import\n - List\n - Purge\n - Recover\n - Restore\n - Sign\n - UnwrapKey\n - Update\n - Verify\n - WrapKey\n secretPermissions:\n - Backup\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - Restore\n - Set\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Generating a new certificate\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n ],\n keyPermissions: [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n secretPermissions: [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"generated-cert\",\n keyVaultId: exampleKeyVault.id,\n certificatePolicy: {\n issuerParameters: {\n name: \"Self\",\n },\n keyProperties: {\n exportable: true,\n keySize: 2048,\n keyType: \"RSA\",\n reuseKey: true,\n },\n lifetimeActions: [{\n action: {\n actionType: \"AutoRenew\",\n },\n trigger: {\n daysBeforeExpiry: 30,\n },\n }],\n secretProperties: {\n contentType: \"application/x-pkcs12\",\n },\n x509CertificateProperties: {\n extendedKeyUsages: [\"1.3.6.1.5.5.7.3.1\"],\n keyUsages: [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n subjectAlternativeNames: {\n dnsNames: [\n \"internal.contoso.com\",\n \"domain.hello.world\",\n ],\n },\n subject: \"CN=hello-world\",\n validityInMonths: 12,\n },\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n ],\n \"key_permissions\": [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n \"secret_permissions\": [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"generated-cert\",\n key_vault_id=example_key_vault.id,\n certificate_policy={\n \"issuer_parameters\": {\n \"name\": \"Self\",\n },\n \"key_properties\": {\n \"exportable\": True,\n \"key_size\": 2048,\n \"key_type\": \"RSA\",\n \"reuse_key\": True,\n },\n \"lifetime_actions\": [{\n \"action\": {\n \"action_type\": \"AutoRenew\",\n },\n \"trigger\": {\n \"days_before_expiry\": 30,\n },\n }],\n \"secret_properties\": {\n \"content_type\": \"application/x-pkcs12\",\n },\n \"x509_certificate_properties\": {\n \"extended_key_usages\": [\"1.3.6.1.5.5.7.3.1\"],\n \"key_usages\": [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n \"subject_alternative_names\": {\n \"dns_names\": [\n \"internal.contoso.com\",\n \"domain.hello.world\",\n ],\n },\n \"subject\": \"CN=hello-world\",\n \"validity_in_months\": 12,\n },\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n },\n KeyPermissions = new[]\n {\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"generated-cert\",\n KeyVaultId = exampleKeyVault.Id,\n CertificatePolicy = new Azure.KeyVault.Inputs.CertificateCertificatePolicyArgs\n {\n IssuerParameters = new Azure.KeyVault.Inputs.CertificateCertificatePolicyIssuerParametersArgs\n {\n Name = \"Self\",\n },\n KeyProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyKeyPropertiesArgs\n {\n Exportable = true,\n KeySize = 2048,\n KeyType = \"RSA\",\n ReuseKey = true,\n },\n LifetimeActions = new[]\n {\n new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionArgs\n {\n Action = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionActionArgs\n {\n ActionType = \"AutoRenew\",\n },\n Trigger = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionTriggerArgs\n {\n DaysBeforeExpiry = 30,\n },\n },\n },\n SecretProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicySecretPropertiesArgs\n {\n ContentType = \"application/x-pkcs12\",\n },\n X509CertificateProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs\n {\n ExtendedKeyUsages = new[]\n {\n \"1.3.6.1.5.5.7.3.1\",\n },\n KeyUsages = new[]\n {\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n },\n SubjectAlternativeNames = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs\n {\n DnsNames = new[]\n {\n \"internal.contoso.com\",\n \"domain.hello.world\",\n },\n },\n Subject = \"CN=hello-world\",\n ValidityInMonths = 12,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"generated-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificatePolicy: \u0026keyvault.CertificateCertificatePolicyArgs{\n\t\t\t\tIssuerParameters: \u0026keyvault.CertificateCertificatePolicyIssuerParametersArgs{\n\t\t\t\t\tName: pulumi.String(\"Self\"),\n\t\t\t\t},\n\t\t\t\tKeyProperties: \u0026keyvault.CertificateCertificatePolicyKeyPropertiesArgs{\n\t\t\t\t\tExportable: pulumi.Bool(true),\n\t\t\t\t\tKeySize: pulumi.Int(2048),\n\t\t\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\t\t\tReuseKey: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t\tLifetimeActions: keyvault.CertificateCertificatePolicyLifetimeActionArray{\n\t\t\t\t\t\u0026keyvault.CertificateCertificatePolicyLifetimeActionArgs{\n\t\t\t\t\t\tAction: \u0026keyvault.CertificateCertificatePolicyLifetimeActionActionArgs{\n\t\t\t\t\t\t\tActionType: pulumi.String(\"AutoRenew\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tTrigger: \u0026keyvault.CertificateCertificatePolicyLifetimeActionTriggerArgs{\n\t\t\t\t\t\t\tDaysBeforeExpiry: pulumi.Int(30),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSecretProperties: \u0026keyvault.CertificateCertificatePolicySecretPropertiesArgs{\n\t\t\t\t\tContentType: pulumi.String(\"application/x-pkcs12\"),\n\t\t\t\t},\n\t\t\t\tX509CertificateProperties: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesArgs{\n\t\t\t\t\tExtendedKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"1.3.6.1.5.5.7.3.1\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"cRLSign\"),\n\t\t\t\t\t\tpulumi.String(\"dataEncipherment\"),\n\t\t\t\t\t\tpulumi.String(\"digitalSignature\"),\n\t\t\t\t\t\tpulumi.String(\"keyAgreement\"),\n\t\t\t\t\t\tpulumi.String(\"keyCertSign\"),\n\t\t\t\t\t\tpulumi.String(\"keyEncipherment\"),\n\t\t\t\t\t},\n\t\t\t\t\tSubjectAlternativeNames: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs{\n\t\t\t\t\t\tDnsNames: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"internal.contoso.com\"),\n\t\t\t\t\t\t\tpulumi.String(\"domain.hello.world\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSubject: pulumi.String(\"CN=hello-world\"),\n\t\t\t\t\tValidityInMonths: pulumi.Int(12),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyIssuerParametersArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyKeyPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicySecretPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\")\n .keyPermissions( \n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\")\n .secretPermissions( \n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"generated-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificatePolicy(CertificateCertificatePolicyArgs.builder()\n .issuerParameters(CertificateCertificatePolicyIssuerParametersArgs.builder()\n .name(\"Self\")\n .build())\n .keyProperties(CertificateCertificatePolicyKeyPropertiesArgs.builder()\n .exportable(true)\n .keySize(2048)\n .keyType(\"RSA\")\n .reuseKey(true)\n .build())\n .lifetimeActions(CertificateCertificatePolicyLifetimeActionArgs.builder()\n .action(CertificateCertificatePolicyLifetimeActionActionArgs.builder()\n .actionType(\"AutoRenew\")\n .build())\n .trigger(CertificateCertificatePolicyLifetimeActionTriggerArgs.builder()\n .daysBeforeExpiry(30)\n .build())\n .build())\n .secretProperties(CertificateCertificatePolicySecretPropertiesArgs.builder()\n .contentType(\"application/x-pkcs12\")\n .build())\n .x509CertificateProperties(CertificateCertificatePolicyX509CertificatePropertiesArgs.builder()\n .extendedKeyUsages(\"1.3.6.1.5.5.7.3.1\")\n .keyUsages( \n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\")\n .subjectAlternativeNames(CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs.builder()\n .dnsNames( \n \"internal.contoso.com\",\n \"domain.hello.world\")\n .build())\n .subject(\"CN=hello-world\")\n .validityInMonths(12)\n .build())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - Purge\n - SetIssuers\n - Update\n keyPermissions:\n - Backup\n - Create\n - Decrypt\n - Delete\n - Encrypt\n - Get\n - Import\n - List\n - Purge\n - Recover\n - Restore\n - Sign\n - UnwrapKey\n - Update\n - Verify\n - WrapKey\n secretPermissions:\n - Backup\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - Restore\n - Set\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: generated-cert\n keyVaultId: ${exampleKeyVault.id}\n certificatePolicy:\n issuerParameters:\n name: Self\n keyProperties:\n exportable: true\n keySize: 2048\n keyType: RSA\n reuseKey: true\n lifetimeActions:\n - action:\n actionType: AutoRenew\n trigger:\n daysBeforeExpiry: 30\n secretProperties:\n contentType: application/x-pkcs12\n x509CertificateProperties:\n extendedKeyUsages:\n - 1.3.6.1.5.5.7.3.1\n keyUsages:\n - cRLSign\n - dataEncipherment\n - digitalSignature\n - keyAgreement\n - keyCertSign\n - keyEncipherment\n subjectAlternativeNames:\n dnsNames:\n - internal.contoso.com\n - domain.hello.world\n subject: CN=hello-world\n validityInMonths: 12\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Certificates can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/certifiate:Certifiate example \"https://example-keyvault.vault.azure.net/certificates/example/fdf067c93bbb4b22bff4d8b7a9a56217\"\n```\n\n", "properties": { "certificate": { "$ref": "#/types/azure:keyvault/CertifiateCertificate:CertifiateCertificate", @@ -193912,7 +193912,7 @@ "deprecationMessage": "azure.keyvault.Certifiate has been deprecated in favor of azure.keyvault.Certificate" }, "azure:keyvault/certificate:Certificate": { - "description": "Manages a Key Vault Certificate.\n\n## Example Usage\n\n### Importing A PFX)\n\n\u003e **Note:** this example assumed the PFX file is located in the same directory at `certificate-to-import.pfx`.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n keyPermissions: [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n secretPermissions: [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n \"key_permissions\": [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n \"secret_permissions\": [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n },\n KeyPermissions = new[]\n {\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\")\n .keyPermissions( \n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\")\n .secretPermissions( \n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - SetIssuers\n - Update\n keyPermissions:\n - Backup\n - Create\n - Decrypt\n - Delete\n - Encrypt\n - Get\n - Import\n - List\n - Purge\n - Recover\n - Restore\n - Sign\n - UnwrapKey\n - Update\n - Verify\n - WrapKey\n secretPermissions:\n - Backup\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - Restore\n - Set\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Generating a new certificate\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n ],\n keyPermissions: [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n secretPermissions: [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"generated-cert\",\n keyVaultId: exampleKeyVault.id,\n certificatePolicy: {\n issuerParameters: {\n name: \"Self\",\n },\n keyProperties: {\n exportable: true,\n keySize: 2048,\n keyType: \"RSA\",\n reuseKey: true,\n },\n lifetimeActions: [{\n action: {\n actionType: \"AutoRenew\",\n },\n trigger: {\n daysBeforeExpiry: 30,\n },\n }],\n secretProperties: {\n contentType: \"application/x-pkcs12\",\n },\n x509CertificateProperties: {\n extendedKeyUsages: [\"1.3.6.1.5.5.7.3.1\"],\n keyUsages: [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n subjectAlternativeNames: {\n dnsNames: [\n \"internal.contoso.com\",\n \"domain.hello.world\",\n ],\n },\n subject: \"CN=hello-world\",\n validityInMonths: 12,\n },\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n ],\n \"key_permissions\": [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n \"secret_permissions\": [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"generated-cert\",\n key_vault_id=example_key_vault.id,\n certificate_policy={\n \"issuer_parameters\": {\n \"name\": \"Self\",\n },\n \"key_properties\": {\n \"exportable\": True,\n \"key_size\": 2048,\n \"key_type\": \"RSA\",\n \"reuse_key\": True,\n },\n \"lifetime_actions\": [{\n \"action\": {\n \"action_type\": \"AutoRenew\",\n },\n \"trigger\": {\n \"days_before_expiry\": 30,\n },\n }],\n \"secret_properties\": {\n \"content_type\": \"application/x-pkcs12\",\n },\n \"x509_certificate_properties\": {\n \"extended_key_usages\": [\"1.3.6.1.5.5.7.3.1\"],\n \"key_usages\": [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n \"subject_alternative_names\": {\n \"dns_names\": [\n \"internal.contoso.com\",\n \"domain.hello.world\",\n ],\n },\n \"subject\": \"CN=hello-world\",\n \"validity_in_months\": 12,\n },\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n },\n KeyPermissions = new[]\n {\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"generated-cert\",\n KeyVaultId = exampleKeyVault.Id,\n CertificatePolicy = new Azure.KeyVault.Inputs.CertificateCertificatePolicyArgs\n {\n IssuerParameters = new Azure.KeyVault.Inputs.CertificateCertificatePolicyIssuerParametersArgs\n {\n Name = \"Self\",\n },\n KeyProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyKeyPropertiesArgs\n {\n Exportable = true,\n KeySize = 2048,\n KeyType = \"RSA\",\n ReuseKey = true,\n },\n LifetimeActions = new[]\n {\n new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionArgs\n {\n Action = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionActionArgs\n {\n ActionType = \"AutoRenew\",\n },\n Trigger = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionTriggerArgs\n {\n DaysBeforeExpiry = 30,\n },\n },\n },\n SecretProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicySecretPropertiesArgs\n {\n ContentType = \"application/x-pkcs12\",\n },\n X509CertificateProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs\n {\n ExtendedKeyUsages = new[]\n {\n \"1.3.6.1.5.5.7.3.1\",\n },\n KeyUsages = new[]\n {\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n },\n SubjectAlternativeNames = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs\n {\n DnsNames = new[]\n {\n \"internal.contoso.com\",\n \"domain.hello.world\",\n },\n },\n Subject = \"CN=hello-world\",\n ValidityInMonths = 12,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"generated-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificatePolicy: \u0026keyvault.CertificateCertificatePolicyArgs{\n\t\t\t\tIssuerParameters: \u0026keyvault.CertificateCertificatePolicyIssuerParametersArgs{\n\t\t\t\t\tName: pulumi.String(\"Self\"),\n\t\t\t\t},\n\t\t\t\tKeyProperties: \u0026keyvault.CertificateCertificatePolicyKeyPropertiesArgs{\n\t\t\t\t\tExportable: pulumi.Bool(true),\n\t\t\t\t\tKeySize: pulumi.Int(2048),\n\t\t\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\t\t\tReuseKey: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t\tLifetimeActions: keyvault.CertificateCertificatePolicyLifetimeActionArray{\n\t\t\t\t\t\u0026keyvault.CertificateCertificatePolicyLifetimeActionArgs{\n\t\t\t\t\t\tAction: \u0026keyvault.CertificateCertificatePolicyLifetimeActionActionArgs{\n\t\t\t\t\t\t\tActionType: pulumi.String(\"AutoRenew\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tTrigger: \u0026keyvault.CertificateCertificatePolicyLifetimeActionTriggerArgs{\n\t\t\t\t\t\t\tDaysBeforeExpiry: pulumi.Int(30),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSecretProperties: \u0026keyvault.CertificateCertificatePolicySecretPropertiesArgs{\n\t\t\t\t\tContentType: pulumi.String(\"application/x-pkcs12\"),\n\t\t\t\t},\n\t\t\t\tX509CertificateProperties: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesArgs{\n\t\t\t\t\tExtendedKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"1.3.6.1.5.5.7.3.1\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"cRLSign\"),\n\t\t\t\t\t\tpulumi.String(\"dataEncipherment\"),\n\t\t\t\t\t\tpulumi.String(\"digitalSignature\"),\n\t\t\t\t\t\tpulumi.String(\"keyAgreement\"),\n\t\t\t\t\t\tpulumi.String(\"keyCertSign\"),\n\t\t\t\t\t\tpulumi.String(\"keyEncipherment\"),\n\t\t\t\t\t},\n\t\t\t\t\tSubjectAlternativeNames: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs{\n\t\t\t\t\t\tDnsNames: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"internal.contoso.com\"),\n\t\t\t\t\t\t\tpulumi.String(\"domain.hello.world\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSubject: pulumi.String(\"CN=hello-world\"),\n\t\t\t\t\tValidityInMonths: pulumi.Int(12),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyIssuerParametersArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyKeyPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicySecretPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\")\n .keyPermissions( \n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\")\n .secretPermissions( \n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"generated-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificatePolicy(CertificateCertificatePolicyArgs.builder()\n .issuerParameters(CertificateCertificatePolicyIssuerParametersArgs.builder()\n .name(\"Self\")\n .build())\n .keyProperties(CertificateCertificatePolicyKeyPropertiesArgs.builder()\n .exportable(true)\n .keySize(2048)\n .keyType(\"RSA\")\n .reuseKey(true)\n .build())\n .lifetimeActions(CertificateCertificatePolicyLifetimeActionArgs.builder()\n .action(CertificateCertificatePolicyLifetimeActionActionArgs.builder()\n .actionType(\"AutoRenew\")\n .build())\n .trigger(CertificateCertificatePolicyLifetimeActionTriggerArgs.builder()\n .daysBeforeExpiry(30)\n .build())\n .build())\n .secretProperties(CertificateCertificatePolicySecretPropertiesArgs.builder()\n .contentType(\"application/x-pkcs12\")\n .build())\n .x509CertificateProperties(CertificateCertificatePolicyX509CertificatePropertiesArgs.builder()\n .extendedKeyUsages(\"1.3.6.1.5.5.7.3.1\")\n .keyUsages( \n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\")\n .subjectAlternativeNames(CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs.builder()\n .dnsNames( \n \"internal.contoso.com\",\n \"domain.hello.world\")\n .build())\n .subject(\"CN=hello-world\")\n .validityInMonths(12)\n .build())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - Purge\n - SetIssuers\n - Update\n keyPermissions:\n - Backup\n - Create\n - Decrypt\n - Delete\n - Encrypt\n - Get\n - Import\n - List\n - Purge\n - Recover\n - Restore\n - Sign\n - UnwrapKey\n - Update\n - Verify\n - WrapKey\n secretPermissions:\n - Backup\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - Restore\n - Set\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: generated-cert\n keyVaultId: ${exampleKeyVault.id}\n certificatePolicy:\n issuerParameters:\n name: Self\n keyProperties:\n exportable: true\n keySize: 2048\n keyType: RSA\n reuseKey: true\n lifetimeActions:\n - action:\n actionType: AutoRenew\n trigger:\n daysBeforeExpiry: 30\n secretProperties:\n contentType: application/x-pkcs12\n x509CertificateProperties:\n extendedKeyUsages:\n - 1.3.6.1.5.5.7.3.1\n keyUsages:\n - cRLSign\n - dataEncipherment\n - digitalSignature\n - keyAgreement\n - keyCertSign\n - keyEncipherment\n subjectAlternativeNames:\n dnsNames:\n - internal.contoso.com\n - domain.hello.world\n subject: CN=hello-world\n validityInMonths: 12\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Certificates can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/certificate:Certificate example \"https://example-keyvault.vault.azure.net/certificates/example/fdf067c93bbb4b22bff4d8b7a9a56217\"\n```\n\n", + "description": "Manages a Key Vault Certificate.\n\n## Example Usage\n\n### Importing A PFX)\n\n\u003e **Note:** this example assumed the PFX file is located in the same directory at `certificate-to-import.pfx`.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n keyPermissions: [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n secretPermissions: [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n \"key_permissions\": [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n \"secret_permissions\": [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n },\n KeyPermissions = new[]\n {\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\")\n .keyPermissions( \n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\")\n .secretPermissions( \n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - SetIssuers\n - Update\n keyPermissions:\n - Backup\n - Create\n - Decrypt\n - Delete\n - Encrypt\n - Get\n - Import\n - List\n - Purge\n - Recover\n - Restore\n - Sign\n - UnwrapKey\n - Update\n - Verify\n - WrapKey\n secretPermissions:\n - Backup\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - Restore\n - Set\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Generating a new certificate\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n ],\n keyPermissions: [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n secretPermissions: [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"generated-cert\",\n keyVaultId: exampleKeyVault.id,\n certificatePolicy: {\n issuerParameters: {\n name: \"Self\",\n },\n keyProperties: {\n exportable: true,\n keySize: 2048,\n keyType: \"RSA\",\n reuseKey: true,\n },\n lifetimeActions: [{\n action: {\n actionType: \"AutoRenew\",\n },\n trigger: {\n daysBeforeExpiry: 30,\n },\n }],\n secretProperties: {\n contentType: \"application/x-pkcs12\",\n },\n x509CertificateProperties: {\n extendedKeyUsages: [\"1.3.6.1.5.5.7.3.1\"],\n keyUsages: [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n subjectAlternativeNames: {\n dnsNames: [\n \"internal.contoso.com\",\n \"domain.hello.world\",\n ],\n },\n subject: \"CN=hello-world\",\n validityInMonths: 12,\n },\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n ],\n \"key_permissions\": [\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n ],\n \"secret_permissions\": [\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"generated-cert\",\n key_vault_id=example_key_vault.id,\n certificate_policy={\n \"issuer_parameters\": {\n \"name\": \"Self\",\n },\n \"key_properties\": {\n \"exportable\": True,\n \"key_size\": 2048,\n \"key_type\": \"RSA\",\n \"reuse_key\": True,\n },\n \"lifetime_actions\": [{\n \"action\": {\n \"action_type\": \"AutoRenew\",\n },\n \"trigger\": {\n \"days_before_expiry\": 30,\n },\n }],\n \"secret_properties\": {\n \"content_type\": \"application/x-pkcs12\",\n },\n \"x509_certificate_properties\": {\n \"extended_key_usages\": [\"1.3.6.1.5.5.7.3.1\"],\n \"key_usages\": [\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n ],\n \"subject_alternative_names\": {\n \"dns_names\": [\n \"internal.contoso.com\",\n \"domain.hello.world\",\n ],\n },\n \"subject\": \"CN=hello-world\",\n \"validity_in_months\": 12,\n },\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\",\n },\n KeyPermissions = new[]\n {\n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"generated-cert\",\n KeyVaultId = exampleKeyVault.Id,\n CertificatePolicy = new Azure.KeyVault.Inputs.CertificateCertificatePolicyArgs\n {\n IssuerParameters = new Azure.KeyVault.Inputs.CertificateCertificatePolicyIssuerParametersArgs\n {\n Name = \"Self\",\n },\n KeyProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyKeyPropertiesArgs\n {\n Exportable = true,\n KeySize = 2048,\n KeyType = \"RSA\",\n ReuseKey = true,\n },\n LifetimeActions = new[]\n {\n new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionArgs\n {\n Action = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionActionArgs\n {\n ActionType = \"AutoRenew\",\n },\n Trigger = new Azure.KeyVault.Inputs.CertificateCertificatePolicyLifetimeActionTriggerArgs\n {\n DaysBeforeExpiry = 30,\n },\n },\n },\n SecretProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicySecretPropertiesArgs\n {\n ContentType = \"application/x-pkcs12\",\n },\n X509CertificateProperties = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs\n {\n ExtendedKeyUsages = new[]\n {\n \"1.3.6.1.5.5.7.3.1\",\n },\n KeyUsages = new[]\n {\n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\",\n },\n SubjectAlternativeNames = new Azure.KeyVault.Inputs.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs\n {\n DnsNames = new[]\n {\n \"internal.contoso.com\",\n \"domain.hello.world\",\n },\n },\n Subject = \"CN=hello-world\",\n ValidityInMonths = 12,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"generated-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificatePolicy: \u0026keyvault.CertificateCertificatePolicyArgs{\n\t\t\t\tIssuerParameters: \u0026keyvault.CertificateCertificatePolicyIssuerParametersArgs{\n\t\t\t\t\tName: pulumi.String(\"Self\"),\n\t\t\t\t},\n\t\t\t\tKeyProperties: \u0026keyvault.CertificateCertificatePolicyKeyPropertiesArgs{\n\t\t\t\t\tExportable: pulumi.Bool(true),\n\t\t\t\t\tKeySize: pulumi.Int(2048),\n\t\t\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\t\t\tReuseKey: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t\tLifetimeActions: keyvault.CertificateCertificatePolicyLifetimeActionArray{\n\t\t\t\t\t\u0026keyvault.CertificateCertificatePolicyLifetimeActionArgs{\n\t\t\t\t\t\tAction: \u0026keyvault.CertificateCertificatePolicyLifetimeActionActionArgs{\n\t\t\t\t\t\t\tActionType: pulumi.String(\"AutoRenew\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t\tTrigger: \u0026keyvault.CertificateCertificatePolicyLifetimeActionTriggerArgs{\n\t\t\t\t\t\t\tDaysBeforeExpiry: pulumi.Int(30),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSecretProperties: \u0026keyvault.CertificateCertificatePolicySecretPropertiesArgs{\n\t\t\t\t\tContentType: pulumi.String(\"application/x-pkcs12\"),\n\t\t\t\t},\n\t\t\t\tX509CertificateProperties: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesArgs{\n\t\t\t\t\tExtendedKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"1.3.6.1.5.5.7.3.1\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyUsages: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"cRLSign\"),\n\t\t\t\t\t\tpulumi.String(\"dataEncipherment\"),\n\t\t\t\t\t\tpulumi.String(\"digitalSignature\"),\n\t\t\t\t\t\tpulumi.String(\"keyAgreement\"),\n\t\t\t\t\t\tpulumi.String(\"keyCertSign\"),\n\t\t\t\t\t\tpulumi.String(\"keyEncipherment\"),\n\t\t\t\t\t},\n\t\t\t\t\tSubjectAlternativeNames: \u0026keyvault.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs{\n\t\t\t\t\t\tDnsNames: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"internal.contoso.com\"),\n\t\t\t\t\t\t\tpulumi.String(\"domain.hello.world\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSubject: pulumi.String(\"CN=hello-world\"),\n\t\t\t\t\tValidityInMonths: pulumi.Int(12),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyIssuerParametersArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyKeyPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicySecretPropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"Purge\",\n \"SetIssuers\",\n \"Update\")\n .keyPermissions( \n \"Backup\",\n \"Create\",\n \"Decrypt\",\n \"Delete\",\n \"Encrypt\",\n \"Get\",\n \"Import\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Sign\",\n \"UnwrapKey\",\n \"Update\",\n \"Verify\",\n \"WrapKey\")\n .secretPermissions( \n \"Backup\",\n \"Delete\",\n \"Get\",\n \"List\",\n \"Purge\",\n \"Recover\",\n \"Restore\",\n \"Set\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"generated-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificatePolicy(CertificateCertificatePolicyArgs.builder()\n .issuerParameters(CertificateCertificatePolicyIssuerParametersArgs.builder()\n .name(\"Self\")\n .build())\n .keyProperties(CertificateCertificatePolicyKeyPropertiesArgs.builder()\n .exportable(true)\n .keySize(2048)\n .keyType(\"RSA\")\n .reuseKey(true)\n .build())\n .lifetimeActions(CertificateCertificatePolicyLifetimeActionArgs.builder()\n .action(CertificateCertificatePolicyLifetimeActionActionArgs.builder()\n .actionType(\"AutoRenew\")\n .build())\n .trigger(CertificateCertificatePolicyLifetimeActionTriggerArgs.builder()\n .daysBeforeExpiry(30)\n .build())\n .build())\n .secretProperties(CertificateCertificatePolicySecretPropertiesArgs.builder()\n .contentType(\"application/x-pkcs12\")\n .build())\n .x509CertificateProperties(CertificateCertificatePolicyX509CertificatePropertiesArgs.builder()\n .extendedKeyUsages(\"1.3.6.1.5.5.7.3.1\")\n .keyUsages( \n \"cRLSign\",\n \"dataEncipherment\",\n \"digitalSignature\",\n \"keyAgreement\",\n \"keyCertSign\",\n \"keyEncipherment\")\n .subjectAlternativeNames(CertificateCertificatePolicyX509CertificatePropertiesSubjectAlternativeNamesArgs.builder()\n .dnsNames( \n \"internal.contoso.com\",\n \"domain.hello.world\")\n .build())\n .subject(\"CN=hello-world\")\n .validityInMonths(12)\n .build())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - Purge\n - SetIssuers\n - Update\n keyPermissions:\n - Backup\n - Create\n - Decrypt\n - Delete\n - Encrypt\n - Get\n - Import\n - List\n - Purge\n - Recover\n - Restore\n - Sign\n - UnwrapKey\n - Update\n - Verify\n - WrapKey\n secretPermissions:\n - Backup\n - Delete\n - Get\n - List\n - Purge\n - Recover\n - Restore\n - Set\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: generated-cert\n keyVaultId: ${exampleKeyVault.id}\n certificatePolicy:\n issuerParameters:\n name: Self\n keyProperties:\n exportable: true\n keySize: 2048\n keyType: RSA\n reuseKey: true\n lifetimeActions:\n - action:\n actionType: AutoRenew\n trigger:\n daysBeforeExpiry: 30\n secretProperties:\n contentType: application/x-pkcs12\n x509CertificateProperties:\n extendedKeyUsages:\n - 1.3.6.1.5.5.7.3.1\n keyUsages:\n - cRLSign\n - dataEncipherment\n - digitalSignature\n - keyAgreement\n - keyCertSign\n - keyEncipherment\n subjectAlternativeNames:\n dnsNames:\n - internal.contoso.com\n - domain.hello.world\n subject: CN=hello-world\n validityInMonths: 12\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Certificates can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/certificate:Certificate example \"https://example-keyvault.vault.azure.net/certificates/example/fdf067c93bbb4b22bff4d8b7a9a56217\"\n```\n\n", "properties": { "certificate": { "$ref": "#/types/azure:keyvault/CertificateCertificate:CertificateCertificate", @@ -194122,7 +194122,7 @@ ] }, "azure:keyvault/certificateContacts:CertificateContacts": { - "description": "Manages Key Vault Certificate Contacts.\n\n## Disclaimers\n\n\u003c!-- TODO: Remove Note in 4.0 --\u003e\n\u003e **Note:** It's possible to define Key Vault Certificate Contacts both within the `azure.keyvault.KeyVault` resource via the `contact` block and by using the `azure.keyvault.CertificateContacts` resource. However it's not possible to use both methods to manage Certificate Contacts within a KeyVault, since there'll be conflicts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\"ManageContacts\"],\n keyPermissions: [\"Create\"],\n secretPermissions: [\"Set\"],\n});\nconst exampleCertificateContacts = new azure.keyvault.CertificateContacts(\"example\", {\n keyVaultId: exampleKeyVault.id,\n contacts: [\n {\n email: \"example@example.com\",\n name: \"example\",\n phone: \"01234567890\",\n },\n {\n email: \"example2@example.com\",\n },\n ],\n}, {\n dependsOn: [exampleAccessPolicy],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n certificate_permissions=[\"ManageContacts\"],\n key_permissions=[\"Create\"],\n secret_permissions=[\"Set\"])\nexample_certificate_contacts = azure.keyvault.CertificateContacts(\"example\",\n key_vault_id=example_key_vault.id,\n contacts=[\n {\n \"email\": \"example@example.com\",\n \"name\": \"example\",\n \"phone\": \"01234567890\",\n },\n {\n \"email\": \"example2@example.com\",\n },\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_access_policy]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"ManageContacts\",\n },\n KeyPermissions = new[]\n {\n \"Create\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n },\n });\n\n var exampleCertificateContacts = new Azure.KeyVault.CertificateContacts(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n Contacts = new[]\n {\n new Azure.KeyVault.Inputs.CertificateContactsContactArgs\n {\n Email = \"example@example.com\",\n Name = \"example\",\n Phone = \"01234567890\",\n },\n new Azure.KeyVault.Inputs.CertificateContactsContactArgs\n {\n Email = \"example2@example.com\",\n },\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAccessPolicy,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccessPolicy, err := keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t},\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificateContacts(ctx, \"example\", \u0026keyvault.CertificateContactsArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tContacts: keyvault.CertificateContactsContactArray{\n\t\t\t\t\u0026keyvault.CertificateContactsContactArgs{\n\t\t\t\t\tEmail: pulumi.String(\"example@example.com\"),\n\t\t\t\t\tName: pulumi.String(\"example\"),\n\t\t\t\t\tPhone: pulumi.String(\"01234567890\"),\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.CertificateContactsContactArgs{\n\t\t\t\t\tEmail: pulumi.String(\"example2@example.com\"),\n\t\t\t\t},\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.CertificateContacts;\nimport com.pulumi.azure.keyvault.CertificateContactsArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateContactsContactArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions(\"ManageContacts\")\n .keyPermissions(\"Create\")\n .secretPermissions(\"Set\")\n .build());\n\n var exampleCertificateContacts = new CertificateContacts(\"exampleCertificateContacts\", CertificateContactsArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .contacts( \n CertificateContactsContactArgs.builder()\n .email(\"example@example.com\")\n .name(\"example\")\n .phone(\"01234567890\")\n .build(),\n CertificateContactsContactArgs.builder()\n .email(\"example2@example.com\")\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAccessPolicy)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - ManageContacts\n keyPermissions:\n - Create\n secretPermissions:\n - Set\n exampleCertificateContacts:\n type: azure:keyvault:CertificateContacts\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n contacts:\n - email: example@example.com\n name: example\n phone: '01234567890'\n - email: example2@example.com\n options:\n dependson:\n - ${exampleAccessPolicy}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Certificate Contacts can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/certificateContacts:CertificateContacts example https://example-keyvault.vault.azure.net/certificates/contacts\n```\n\n", + "description": "Manages Key Vault Certificate Contacts.\n\n## Disclaimers\n\n\u003c!-- TODO: Remove Note in 4.0 --\u003e\n\u003e **Note:** It's possible to define Key Vault Certificate Contacts both within the `azure.keyvault.KeyVault` resource via the `contact` block and by using the `azure.keyvault.CertificateContacts` resource. However it's not possible to use both methods to manage Certificate Contacts within a KeyVault, since there'll be conflicts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\"ManageContacts\"],\n keyPermissions: [\"Create\"],\n secretPermissions: [\"Set\"],\n});\nconst exampleCertificateContacts = new azure.keyvault.CertificateContacts(\"example\", {\n keyVaultId: exampleKeyVault.id,\n contacts: [\n {\n email: \"example@example.com\",\n name: \"example\",\n phone: \"01234567890\",\n },\n {\n email: \"example2@example.com\",\n },\n ],\n}, {\n dependsOn: [exampleAccessPolicy],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n certificate_permissions=[\"ManageContacts\"],\n key_permissions=[\"Create\"],\n secret_permissions=[\"Set\"])\nexample_certificate_contacts = azure.keyvault.CertificateContacts(\"example\",\n key_vault_id=example_key_vault.id,\n contacts=[\n {\n \"email\": \"example@example.com\",\n \"name\": \"example\",\n \"phone\": \"01234567890\",\n },\n {\n \"email\": \"example2@example.com\",\n },\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_access_policy]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"ManageContacts\",\n },\n KeyPermissions = new[]\n {\n \"Create\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n },\n });\n\n var exampleCertificateContacts = new Azure.KeyVault.CertificateContacts(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n Contacts = new[]\n {\n new Azure.KeyVault.Inputs.CertificateContactsContactArgs\n {\n Email = \"example@example.com\",\n Name = \"example\",\n Phone = \"01234567890\",\n },\n new Azure.KeyVault.Inputs.CertificateContactsContactArgs\n {\n Email = \"example2@example.com\",\n },\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAccessPolicy,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccessPolicy, err := keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t},\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificateContacts(ctx, \"example\", \u0026keyvault.CertificateContactsArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tContacts: keyvault.CertificateContactsContactArray{\n\t\t\t\t\u0026keyvault.CertificateContactsContactArgs{\n\t\t\t\t\tEmail: pulumi.String(\"example@example.com\"),\n\t\t\t\t\tName: pulumi.String(\"example\"),\n\t\t\t\t\tPhone: pulumi.String(\"01234567890\"),\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.CertificateContactsContactArgs{\n\t\t\t\t\tEmail: pulumi.String(\"example2@example.com\"),\n\t\t\t\t},\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.CertificateContacts;\nimport com.pulumi.azure.keyvault.CertificateContactsArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateContactsContactArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions(\"ManageContacts\")\n .keyPermissions(\"Create\")\n .secretPermissions(\"Set\")\n .build());\n\n var exampleCertificateContacts = new CertificateContacts(\"exampleCertificateContacts\", CertificateContactsArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .contacts( \n CertificateContactsContactArgs.builder()\n .email(\"example@example.com\")\n .name(\"example\")\n .phone(\"01234567890\")\n .build(),\n CertificateContactsContactArgs.builder()\n .email(\"example2@example.com\")\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAccessPolicy)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - ManageContacts\n keyPermissions:\n - Create\n secretPermissions:\n - Set\n exampleCertificateContacts:\n type: azure:keyvault:CertificateContacts\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n contacts:\n - email: example@example.com\n name: example\n phone: '01234567890'\n - email: example2@example.com\n options:\n dependson:\n - ${exampleAccessPolicy}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Certificate Contacts can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/certificateContacts:CertificateContacts example https://example-keyvault.vault.azure.net/certificates/contacts\n```\n\n", "properties": { "contacts": { "type": "array", @@ -194176,7 +194176,7 @@ } }, "azure:keyvault/certificateIssuer:CertificateIssuer": { - "description": "Manages a Key Vault Certificate Issuer.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"standard\",\n tenantId: current.then(current =\u003e current.tenantId),\n});\nconst exampleCertificateIssuer = new azure.keyvault.CertificateIssuer(\"example\", {\n name: \"example-issuer\",\n orgId: \"ExampleOrgName\",\n keyVaultId: exampleKeyVault.id,\n providerName: \"DigiCert\",\n accountId: \"0000\",\n password: \"example-password\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"standard\",\n tenant_id=current.tenant_id)\nexample_certificate_issuer = azure.keyvault.CertificateIssuer(\"example\",\n name=\"example-issuer\",\n org_id=\"ExampleOrgName\",\n key_vault_id=example_key_vault.id,\n provider_name=\"DigiCert\",\n account_id=\"0000\",\n password=\"example-password\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"standard\",\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n var exampleCertificateIssuer = new Azure.KeyVault.CertificateIssuer(\"example\", new()\n {\n Name = \"example-issuer\",\n OrgId = \"ExampleOrgName\",\n KeyVaultId = exampleKeyVault.Id,\n ProviderName = \"DigiCert\",\n AccountId = \"0000\",\n Password = \"example-password\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificateIssuer(ctx, \"example\", \u0026keyvault.CertificateIssuerArgs{\n\t\t\tName: pulumi.String(\"example-issuer\"),\n\t\t\tOrgId: pulumi.String(\"ExampleOrgName\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tProviderName: pulumi.String(\"DigiCert\"),\n\t\t\tAccountId: pulumi.String(\"0000\"),\n\t\t\tPassword: pulumi.String(\"example-password\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.CertificateIssuer;\nimport com.pulumi.azure.keyvault.CertificateIssuerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"standard\")\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n var exampleCertificateIssuer = new CertificateIssuer(\"exampleCertificateIssuer\", CertificateIssuerArgs.builder()\n .name(\"example-issuer\")\n .orgId(\"ExampleOrgName\")\n .keyVaultId(exampleKeyVault.id())\n .providerName(\"DigiCert\")\n .accountId(\"0000\")\n .password(\"example-password\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: standard\n tenantId: ${current.tenantId}\n exampleCertificateIssuer:\n type: azure:keyvault:CertificateIssuer\n name: example\n properties:\n name: example-issuer\n orgId: ExampleOrgName\n keyVaultId: ${exampleKeyVault.id}\n providerName: DigiCert\n accountId: '0000'\n password: example-password\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Certificate Issuers can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/certificateIssuer:CertificateIssuer example \"https://key-vault-name.vault.azure.net/certificates/issuers/example\"\n```\n\n", + "description": "Manages a Key Vault Certificate Issuer.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n skuName: \"standard\",\n tenantId: current.then(current =\u003e current.tenantId),\n});\nconst exampleCertificateIssuer = new azure.keyvault.CertificateIssuer(\"example\", {\n name: \"example-issuer\",\n orgId: \"ExampleOrgName\",\n keyVaultId: exampleKeyVault.id,\n providerName: \"DigiCert\",\n accountId: \"0000\",\n password: \"example-password\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n sku_name=\"standard\",\n tenant_id=current.tenant_id)\nexample_certificate_issuer = azure.keyvault.CertificateIssuer(\"example\",\n name=\"example-issuer\",\n org_id=\"ExampleOrgName\",\n key_vault_id=example_key_vault.id,\n provider_name=\"DigiCert\",\n account_id=\"0000\",\n password=\"example-password\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n SkuName = \"standard\",\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n var exampleCertificateIssuer = new Azure.KeyVault.CertificateIssuer(\"example\", new()\n {\n Name = \"example-issuer\",\n OrgId = \"ExampleOrgName\",\n KeyVaultId = exampleKeyVault.Id,\n ProviderName = \"DigiCert\",\n AccountId = \"0000\",\n Password = \"example-password\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewCertificateIssuer(ctx, \"example\", \u0026keyvault.CertificateIssuerArgs{\n\t\t\tName: pulumi.String(\"example-issuer\"),\n\t\t\tOrgId: pulumi.String(\"ExampleOrgName\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tProviderName: pulumi.String(\"DigiCert\"),\n\t\t\tAccountId: pulumi.String(\"0000\"),\n\t\t\tPassword: pulumi.String(\"example-password\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.CertificateIssuer;\nimport com.pulumi.azure.keyvault.CertificateIssuerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .skuName(\"standard\")\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n var exampleCertificateIssuer = new CertificateIssuer(\"exampleCertificateIssuer\", CertificateIssuerArgs.builder()\n .name(\"example-issuer\")\n .orgId(\"ExampleOrgName\")\n .keyVaultId(exampleKeyVault.id())\n .providerName(\"DigiCert\")\n .accountId(\"0000\")\n .password(\"example-password\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n skuName: standard\n tenantId: ${current.tenantId}\n exampleCertificateIssuer:\n type: azure:keyvault:CertificateIssuer\n name: example\n properties:\n name: example-issuer\n orgId: ExampleOrgName\n keyVaultId: ${exampleKeyVault.id}\n providerName: DigiCert\n accountId: '0000'\n password: example-password\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Certificate Issuers can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/certificateIssuer:CertificateIssuer example \"https://key-vault-name.vault.azure.net/certificates/issuers/example\"\n```\n\n", "properties": { "accountId": { "type": "string", @@ -194298,7 +194298,7 @@ } }, "azure:keyvault/key:Key": { - "description": "Manages a Key Vault Key.\n\n## Example Usage\n\n\u003e **Note:** To use this resource, your client should have RBAC roles with permissions like `Key Vault Crypto Officer` or `Key Vault Administrator` or an assigned Key Vault Access Policy with permissions `Create`,`Delete`,`Get`,`Purge`,`Recover`,`Update` and `GetRotationPolicy` for keys without Rotation Policy. Include `SetRotationPolicy` for keys with Rotation Policy.\n\n\u003e **Note:** The Azure Provider includes a Feature Toggle which will purge a Key Vault Key resource on destroy, rather than the default soft-delete. See `purge_soft_deleted_keys_on_destroy` for more information.\n\n\n### Additional Examples\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n secretPermissions: [\"Set\"],\n }],\n});\nconst generated = new azure.keyvault.Key(\"generated\", {\n name: \"generated-certificate\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n rotationPolicy: {\n automatic: {\n timeBeforeExpiry: \"P30D\",\n },\n expireAfter: \"P90D\",\n notifyBeforeExpiry: \"P29D\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n \"secret_permissions\": [\"Set\"],\n }])\ngenerated = azure.keyvault.Key(\"generated\",\n name=\"generated-certificate\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n rotation_policy={\n \"automatic\": {\n \"time_before_expiry\": \"P30D\",\n },\n \"expire_after\": \"P90D\",\n \"notify_before_expiry\": \"P29D\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n },\n },\n },\n });\n\n var generated = new Azure.KeyVault.Key(\"generated\", new()\n {\n Name = \"generated-certificate\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n RotationPolicy = new Azure.KeyVault.Inputs.KeyRotationPolicyArgs\n {\n Automatic = new Azure.KeyVault.Inputs.KeyRotationPolicyAutomaticArgs\n {\n TimeBeforeExpiry = \"P30D\",\n },\n ExpireAfter = \"P90D\",\n NotifyBeforeExpiry = \"P29D\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t\tpulumi.String(\"SetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewKey(ctx, \"generated\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"generated-certificate\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t\tRotationPolicy: \u0026keyvault.KeyRotationPolicyArgs{\n\t\t\t\tAutomatic: \u0026keyvault.KeyRotationPolicyAutomaticArgs{\n\t\t\t\t\tTimeBeforeExpiry: pulumi.String(\"P30D\"),\n\t\t\t\t},\n\t\t\t\tExpireAfter: pulumi.String(\"P90D\"),\n\t\t\t\tNotifyBeforeExpiry: pulumi.String(\"P29D\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyRotationPolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyRotationPolicyAutomaticArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\")\n .secretPermissions(\"Set\")\n .build())\n .build());\n\n var generated = new Key(\"generated\", KeyArgs.builder()\n .name(\"generated-certificate\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .rotationPolicy(KeyRotationPolicyArgs.builder()\n .automatic(KeyRotationPolicyAutomaticArgs.builder()\n .timeBeforeExpiry(\"P30D\")\n .build())\n .expireAfter(\"P90D\")\n .notifyBeforeExpiry(\"P29D\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - GetRotationPolicy\n - SetRotationPolicy\n secretPermissions:\n - Set\n generated:\n type: azure:keyvault:Key\n properties:\n name: generated-certificate\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n rotationPolicy:\n automatic:\n timeBeforeExpiry: P30D\n expireAfter: P90D\n notifyBeforeExpiry: P29D\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Key which is Enabled can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/key:Key example \"https://example-keyvault.vault.azure.net/keys/example/fdf067c93bbb4b22bff4d8b7a9a56217\"\n```\n\n", + "description": "Manages a Key Vault Key.\n\n## Example Usage\n\n\u003e **Note:** To use this resource, your client should have RBAC roles with permissions like `Key Vault Crypto Officer` or `Key Vault Administrator` or an assigned Key Vault Access Policy with permissions `Create`,`Delete`,`Get`,`Purge`,`Recover`,`Update` and `GetRotationPolicy` for keys without Rotation Policy. Include `SetRotationPolicy` for keys with Rotation Policy.\n\n\u003e **Note:** The Azure Provider includes a Feature Toggle which will purge a Key Vault Key resource on destroy, rather than the default soft-delete. See `purge_soft_deleted_keys_on_destroy` for more information.\n\n\n### Additional Examples\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n secretPermissions: [\"Set\"],\n }],\n});\nconst generated = new azure.keyvault.Key(\"generated\", {\n name: \"generated-certificate\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n rotationPolicy: {\n automatic: {\n timeBeforeExpiry: \"P30D\",\n },\n expireAfter: \"P90D\",\n notifyBeforeExpiry: \"P29D\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n \"secret_permissions\": [\"Set\"],\n }])\ngenerated = azure.keyvault.Key(\"generated\",\n name=\"generated-certificate\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n rotation_policy={\n \"automatic\": {\n \"time_before_expiry\": \"P30D\",\n },\n \"expire_after\": \"P90D\",\n \"notify_before_expiry\": \"P29D\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n },\n },\n },\n });\n\n var generated = new Azure.KeyVault.Key(\"generated\", new()\n {\n Name = \"generated-certificate\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n RotationPolicy = new Azure.KeyVault.Inputs.KeyRotationPolicyArgs\n {\n Automatic = new Azure.KeyVault.Inputs.KeyRotationPolicyAutomaticArgs\n {\n TimeBeforeExpiry = \"P30D\",\n },\n ExpireAfter = \"P90D\",\n NotifyBeforeExpiry = \"P29D\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t\tpulumi.String(\"SetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewKey(ctx, \"generated\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"generated-certificate\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t\tRotationPolicy: \u0026keyvault.KeyRotationPolicyArgs{\n\t\t\t\tAutomatic: \u0026keyvault.KeyRotationPolicyAutomaticArgs{\n\t\t\t\t\tTimeBeforeExpiry: pulumi.String(\"P30D\"),\n\t\t\t\t},\n\t\t\t\tExpireAfter: pulumi.String(\"P90D\"),\n\t\t\t\tNotifyBeforeExpiry: pulumi.String(\"P29D\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyRotationPolicyArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyRotationPolicyAutomaticArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Delete\",\n \"Get\",\n \"Purge\",\n \"Recover\",\n \"Update\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\")\n .secretPermissions(\"Set\")\n .build())\n .build());\n\n var generated = new Key(\"generated\", KeyArgs.builder()\n .name(\"generated-certificate\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .rotationPolicy(KeyRotationPolicyArgs.builder()\n .automatic(KeyRotationPolicyAutomaticArgs.builder()\n .timeBeforeExpiry(\"P30D\")\n .build())\n .expireAfter(\"P90D\")\n .notifyBeforeExpiry(\"P29D\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Delete\n - Get\n - Purge\n - Recover\n - Update\n - GetRotationPolicy\n - SetRotationPolicy\n secretPermissions:\n - Set\n generated:\n type: azure:keyvault:Key\n properties:\n name: generated-certificate\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n rotationPolicy:\n automatic:\n timeBeforeExpiry: P30D\n expireAfter: P90D\n notifyBeforeExpiry: P29D\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Key which is Enabled can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/key:Key example \"https://example-keyvault.vault.azure.net/keys/example/fdf067c93bbb4b22bff4d8b7a9a56217\"\n```\n\n", "properties": { "curve": { "type": "string", @@ -194561,7 +194561,7 @@ } }, "azure:keyvault/keyVault:KeyVault": { - "description": "Manages a Key Vault.\n\n## Disclaimers\n\n\u003e **Note:** It's possible to define Key Vault Access Policies both within the `azure.keyvault.KeyVault` resource via the `access_policy` block and by using the `azure.keyvault.AccessPolicy` resource. However it's not possible to use both methods to manage Access Policies within a KeyVault, since there'll be conflicts.\n\n\u003e **Note:** It's possible to define Key Vault Certificate Contacts both within the `azure.keyvault.KeyVault` resource via the `contact` block and by using the `azure.keyvault.CertificateContacts` resource. However it's not possible to use both methods to manage Certificate Contacts within a KeyVault, since there'll be conflicts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: false,\n skuName: \"standard\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\"Get\"],\n secretPermissions: [\"Get\"],\n storagePermissions: [\"Get\"],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=False,\n sku_name=\"standard\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\"Get\"],\n \"secret_permissions\": [\"Get\"],\n \"storage_permissions\": [\"Get\"],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = false,\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n StoragePermissions = new[]\n {\n \"Get\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tStoragePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(false)\n .skuName(\"standard\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions(\"Get\")\n .secretPermissions(\"Get\")\n .storagePermissions(\"Get\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: false\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n secretPermissions:\n - Get\n storagePermissions:\n - Get\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/keyVault:KeyVault example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.KeyVault/vaults/vault1\n```\n\n", + "description": "Manages a Key Vault.\n\n## Disclaimers\n\n\u003e **Note:** It's possible to define Key Vault Access Policies both within the `azure.keyvault.KeyVault` resource via the `access_policy` block and by using the `azure.keyvault.AccessPolicy` resource. However it's not possible to use both methods to manage Access Policies within a KeyVault, since there'll be conflicts.\n\n\u003e **Note:** It's possible to define Key Vault Certificate Contacts both within the `azure.keyvault.KeyVault` resource via the `contact` block and by using the `azure.keyvault.CertificateContacts` resource. However it's not possible to use both methods to manage Certificate Contacts within a KeyVault, since there'll be conflicts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: false,\n skuName: \"standard\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\"Get\"],\n secretPermissions: [\"Get\"],\n storagePermissions: [\"Get\"],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=False,\n sku_name=\"standard\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\"Get\"],\n \"secret_permissions\": [\"Get\"],\n \"storage_permissions\": [\"Get\"],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = false,\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n StoragePermissions = new[]\n {\n \"Get\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tStoragePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(false)\n .skuName(\"standard\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions(\"Get\")\n .secretPermissions(\"Get\")\n .storagePermissions(\"Get\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: false\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n secretPermissions:\n - Get\n storagePermissions:\n - Get\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/keyVault:KeyVault example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.KeyVault/vaults/vault1\n```\n\n", "properties": { "accessPolicies": { "type": "array", @@ -194826,7 +194826,7 @@ } }, "azure:keyvault/managedHardwareSecurityModule:ManagedHardwareSecurityModule": { - "description": "Manages a Key Vault Managed Hardware Security Module.\n\n\u003e **Note:** The Azure Provider includes a Feature Toggle which will purge a Key Vault Managed Hardware Security Module resource on destroy, rather than the default soft-delete. See `purge_soft_deleted_hardware_security_modules_on_destroy` for more information.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleManagedHardwareSecurityModule = new azure.keyvault.ManagedHardwareSecurityModule(\"example\", {\n name: \"exampleKVHsm\",\n resourceGroupName: example.name,\n location: example.location,\n skuName: \"Standard_B1\",\n purgeProtectionEnabled: false,\n softDeleteRetentionDays: 90,\n tenantId: current.then(current =\u003e current.tenantId),\n adminObjectIds: [current.then(current =\u003e current.objectId)],\n tags: {\n Env: \"Test\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_managed_hardware_security_module = azure.keyvault.ManagedHardwareSecurityModule(\"example\",\n name=\"exampleKVHsm\",\n resource_group_name=example.name,\n location=example.location,\n sku_name=\"Standard_B1\",\n purge_protection_enabled=False,\n soft_delete_retention_days=90,\n tenant_id=current.tenant_id,\n admin_object_ids=[current.object_id],\n tags={\n \"Env\": \"Test\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleManagedHardwareSecurityModule = new Azure.KeyVault.ManagedHardwareSecurityModule(\"example\", new()\n {\n Name = \"exampleKVHsm\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n SkuName = \"Standard_B1\",\n PurgeProtectionEnabled = false,\n SoftDeleteRetentionDays = 90,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n AdminObjectIds = new[]\n {\n current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n },\n Tags = \n {\n { \"Env\", \"Test\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewManagedHardwareSecurityModule(ctx, \"example\", \u0026keyvault.ManagedHardwareSecurityModuleArgs{\n\t\t\tName: pulumi.String(\"exampleKVHsm\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSkuName: pulumi.String(\"Standard_B1\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(90),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tAdminObjectIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.ObjectId),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"Test\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.ManagedHardwareSecurityModule;\nimport com.pulumi.azure.keyvault.ManagedHardwareSecurityModuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleManagedHardwareSecurityModule = new ManagedHardwareSecurityModule(\"exampleManagedHardwareSecurityModule\", ManagedHardwareSecurityModuleArgs.builder()\n .name(\"exampleKVHsm\")\n .resourceGroupName(example.name())\n .location(example.location())\n .skuName(\"Standard_B1\")\n .purgeProtectionEnabled(false)\n .softDeleteRetentionDays(90)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .adminObjectIds(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .tags(Map.of(\"Env\", \"Test\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleManagedHardwareSecurityModule:\n type: azure:keyvault:ManagedHardwareSecurityModule\n name: example\n properties:\n name: exampleKVHsm\n resourceGroupName: ${example.name}\n location: ${example.location}\n skuName: Standard_B1\n purgeProtectionEnabled: false\n softDeleteRetentionDays: 90\n tenantId: ${current.tenantId}\n adminObjectIds:\n - ${current.objectId}\n tags:\n Env: Test\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Managed Hardware Security Module can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/managedHardwareSecurityModule:ManagedHardwareSecurityModule example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.KeyVault/managedHSMs/hsm1\n```\n\n", + "description": "Manages a Key Vault Managed Hardware Security Module.\n\n\u003e **Note:** The Azure Provider includes a Feature Toggle which will purge a Key Vault Managed Hardware Security Module resource on destroy, rather than the default soft-delete. See `purge_soft_deleted_hardware_security_modules_on_destroy` for more information.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleManagedHardwareSecurityModule = new azure.keyvault.ManagedHardwareSecurityModule(\"example\", {\n name: \"exampleKVHsm\",\n resourceGroupName: example.name,\n location: example.location,\n skuName: \"Standard_B1\",\n purgeProtectionEnabled: false,\n softDeleteRetentionDays: 90,\n tenantId: current.then(current =\u003e current.tenantId),\n adminObjectIds: [current.then(current =\u003e current.objectId)],\n tags: {\n Env: \"Test\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_managed_hardware_security_module = azure.keyvault.ManagedHardwareSecurityModule(\"example\",\n name=\"exampleKVHsm\",\n resource_group_name=example.name,\n location=example.location,\n sku_name=\"Standard_B1\",\n purge_protection_enabled=False,\n soft_delete_retention_days=90,\n tenant_id=current.tenant_id,\n admin_object_ids=[current.object_id],\n tags={\n \"Env\": \"Test\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleManagedHardwareSecurityModule = new Azure.KeyVault.ManagedHardwareSecurityModule(\"example\", new()\n {\n Name = \"exampleKVHsm\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n SkuName = \"Standard_B1\",\n PurgeProtectionEnabled = false,\n SoftDeleteRetentionDays = 90,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n AdminObjectIds = new[]\n {\n current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n },\n Tags = \n {\n { \"Env\", \"Test\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewManagedHardwareSecurityModule(ctx, \"example\", \u0026keyvault.ManagedHardwareSecurityModuleArgs{\n\t\t\tName: pulumi.String(\"exampleKVHsm\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tSkuName: pulumi.String(\"Standard_B1\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(90),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tAdminObjectIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.ObjectId),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"Test\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.ManagedHardwareSecurityModule;\nimport com.pulumi.azure.keyvault.ManagedHardwareSecurityModuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleManagedHardwareSecurityModule = new ManagedHardwareSecurityModule(\"exampleManagedHardwareSecurityModule\", ManagedHardwareSecurityModuleArgs.builder()\n .name(\"exampleKVHsm\")\n .resourceGroupName(example.name())\n .location(example.location())\n .skuName(\"Standard_B1\")\n .purgeProtectionEnabled(false)\n .softDeleteRetentionDays(90)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .adminObjectIds(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .tags(Map.of(\"Env\", \"Test\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleManagedHardwareSecurityModule:\n type: azure:keyvault:ManagedHardwareSecurityModule\n name: example\n properties:\n name: exampleKVHsm\n resourceGroupName: ${example.name}\n location: ${example.location}\n skuName: Standard_B1\n purgeProtectionEnabled: false\n softDeleteRetentionDays: 90\n tenantId: ${current.tenantId}\n adminObjectIds:\n - ${current.objectId}\n tags:\n Env: Test\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Managed Hardware Security Module can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/managedHardwareSecurityModule:ManagedHardwareSecurityModule example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.KeyVault/managedHSMs/hsm1\n```\n\n", "properties": { "adminObjectIds": { "type": "array", @@ -195526,7 +195526,7 @@ } }, "azure:keyvault/managedStorageAccount:ManagedStorageAccount": { - "description": "Manages a Key Vault Managed Storage Account.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"keyvaultname\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n secretPermissions: [\n \"Get\",\n \"Delete\",\n ],\n storagePermissions: [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }],\n});\nconst exampleManagedStorageAccount = new azure.keyvault.ManagedStorageAccount(\"example\", {\n name: \"examplemanagedstorage\",\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n storageAccountKey: \"key1\",\n regenerateKeyAutomatically: false,\n regenerationPeriod: \"P1D\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"keyvaultname\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"secret_permissions\": [\n \"Get\",\n \"Delete\",\n ],\n \"storage_permissions\": [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }])\nexample_managed_storage_account = azure.keyvault.ManagedStorageAccount(\"example\",\n name=\"examplemanagedstorage\",\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n storage_account_key=\"key1\",\n regenerate_key_automatically=False,\n regeneration_period=\"P1D\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"keyvaultname\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n \"Delete\",\n },\n StoragePermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n },\n },\n },\n });\n\n var exampleManagedStorageAccount = new Azure.KeyVault.ManagedStorageAccount(\"example\", new()\n {\n Name = \"examplemanagedstorage\",\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n StorageAccountKey = \"key1\",\n RegenerateKeyAutomatically = false,\n RegenerationPeriod = \"P1D\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"keyvaultname\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t},\n\t\t\t\t\tStoragePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"SetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"GetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteSAS\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"RegenerateKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewManagedStorageAccount(ctx, \"example\", \u0026keyvault.ManagedStorageAccountArgs{\n\t\t\tName: pulumi.String(\"examplemanagedstorage\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tStorageAccountKey: pulumi.String(\"key1\"),\n\t\t\tRegenerateKeyAutomatically: pulumi.Bool(false),\n\t\t\tRegenerationPeriod: pulumi.String(\"P1D\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.ManagedStorageAccount;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"keyvaultname\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions( \n \"Get\",\n \"Delete\")\n .storagePermissions( \n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\")\n .build())\n .build());\n\n var exampleManagedStorageAccount = new ManagedStorageAccount(\"exampleManagedStorageAccount\", ManagedStorageAccountArgs.builder()\n .name(\"examplemanagedstorage\")\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .storageAccountKey(\"key1\")\n .regenerateKeyAutomatically(false)\n .regenerationPeriod(\"P1D\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: keyvaultname\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n secretPermissions:\n - Get\n - Delete\n storagePermissions:\n - Get\n - List\n - Set\n - SetSAS\n - GetSAS\n - DeleteSAS\n - Update\n - RegenerateKey\n exampleManagedStorageAccount:\n type: azure:keyvault:ManagedStorageAccount\n name: example\n properties:\n name: examplemanagedstorage\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n storageAccountKey: key1\n regenerateKeyAutomatically: false\n regenerationPeriod: P1D\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Automatically Regenerate Storage Account Access Key)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst current = azure.core.getClientConfig({});\nconst test = azuread.getServicePrincipal({\n applicationId: \"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\",\n});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"keyvaultname\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n secretPermissions: [\n \"Get\",\n \"Delete\",\n ],\n storagePermissions: [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Storage Account Key Operator Service Role\",\n principalId: test.then(test =\u003e test.id),\n});\nconst exampleManagedStorageAccount = new azure.keyvault.ManagedStorageAccount(\"example\", {\n name: \"examplemanagedstorage\",\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n storageAccountKey: \"key1\",\n regenerateKeyAutomatically: true,\n regenerationPeriod: \"P1D\",\n}, {\n dependsOn: [exampleAssignment],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\ncurrent = azure.core.get_client_config()\ntest = azuread.get_service_principal(application_id=\"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\")\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"keyvaultname\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"secret_permissions\": [\n \"Get\",\n \"Delete\",\n ],\n \"storage_permissions\": [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }])\nexample_assignment = azure.authorization.Assignment(\"example\",\n scope=example_account.id,\n role_definition_name=\"Storage Account Key Operator Service Role\",\n principal_id=test.id)\nexample_managed_storage_account = azure.keyvault.ManagedStorageAccount(\"example\",\n name=\"examplemanagedstorage\",\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n storage_account_key=\"key1\",\n regenerate_key_automatically=True,\n regeneration_period=\"P1D\",\n opts = pulumi.ResourceOptions(depends_on=[example_assignment]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var test = AzureAD.GetServicePrincipal.Invoke(new()\n {\n ApplicationId = \"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\",\n });\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"keyvaultname\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n \"Delete\",\n },\n StoragePermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n },\n },\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Storage Account Key Operator Service Role\",\n PrincipalId = test.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.Id),\n });\n\n var exampleManagedStorageAccount = new Azure.KeyVault.ManagedStorageAccount(\"example\", new()\n {\n Name = \"examplemanagedstorage\",\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n StorageAccountKey = \"key1\",\n RegenerateKeyAutomatically = true,\n RegenerationPeriod = \"P1D\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAssignment,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttest, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tApplicationId: pulumi.StringRef(\"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"keyvaultname\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t},\n\t\t\t\t\tStoragePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"SetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"GetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteSAS\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"RegenerateKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAssignment, err := authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Storage Account Key Operator Service Role\"),\n\t\t\tPrincipalId: pulumi.String(test.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewManagedStorageAccount(ctx, \"example\", \u0026keyvault.ManagedStorageAccountArgs{\n\t\t\tName: pulumi.String(\"examplemanagedstorage\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tStorageAccountKey: pulumi.String(\"key1\"),\n\t\t\tRegenerateKeyAutomatically: pulumi.Bool(true),\n\t\t\tRegenerationPeriod: pulumi.String(\"P1D\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAssignment,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.keyvault.ManagedStorageAccount;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var test = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .applicationId(\"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\")\n .build());\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"keyvaultname\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions( \n \"Get\",\n \"Delete\")\n .storagePermissions( \n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\")\n .build())\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Storage Account Key Operator Service Role\")\n .principalId(test.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.id()))\n .build());\n\n var exampleManagedStorageAccount = new ManagedStorageAccount(\"exampleManagedStorageAccount\", ManagedStorageAccountArgs.builder()\n .name(\"examplemanagedstorage\")\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .storageAccountKey(\"key1\")\n .regenerateKeyAutomatically(true)\n .regenerationPeriod(\"P1D\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAssignment)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: keyvaultname\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n secretPermissions:\n - Get\n - Delete\n storagePermissions:\n - Get\n - List\n - Set\n - SetSAS\n - GetSAS\n - DeleteSAS\n - Update\n - RegenerateKey\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Storage Account Key Operator Service Role\n principalId: ${test.id}\n exampleManagedStorageAccount:\n type: azure:keyvault:ManagedStorageAccount\n name: example\n properties:\n name: examplemanagedstorage\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n storageAccountKey: key1\n regenerateKeyAutomatically: true\n regenerationPeriod: P1D\n options:\n dependson:\n - ${exampleAssignment}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n test:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n applicationId: cfa8b339-82a2-471a-a3c9-0fc0be7a4093\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Managed Storage Accounts can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/managedStorageAccount:ManagedStorageAccount example https://example-keyvault.vault.azure.net/storage/exampleStorageAcc01\n```\n\n", + "description": "Manages a Key Vault Managed Storage Account.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"keyvaultname\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n secretPermissions: [\n \"Get\",\n \"Delete\",\n ],\n storagePermissions: [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }],\n});\nconst exampleManagedStorageAccount = new azure.keyvault.ManagedStorageAccount(\"example\", {\n name: \"examplemanagedstorage\",\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n storageAccountKey: \"key1\",\n regenerateKeyAutomatically: false,\n regenerationPeriod: \"P1D\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"keyvaultname\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"secret_permissions\": [\n \"Get\",\n \"Delete\",\n ],\n \"storage_permissions\": [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }])\nexample_managed_storage_account = azure.keyvault.ManagedStorageAccount(\"example\",\n name=\"examplemanagedstorage\",\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n storage_account_key=\"key1\",\n regenerate_key_automatically=False,\n regeneration_period=\"P1D\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"keyvaultname\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n \"Delete\",\n },\n StoragePermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n },\n },\n },\n });\n\n var exampleManagedStorageAccount = new Azure.KeyVault.ManagedStorageAccount(\"example\", new()\n {\n Name = \"examplemanagedstorage\",\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n StorageAccountKey = \"key1\",\n RegenerateKeyAutomatically = false,\n RegenerationPeriod = \"P1D\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"keyvaultname\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t},\n\t\t\t\t\tStoragePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"SetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"GetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteSAS\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"RegenerateKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewManagedStorageAccount(ctx, \"example\", \u0026keyvault.ManagedStorageAccountArgs{\n\t\t\tName: pulumi.String(\"examplemanagedstorage\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tStorageAccountKey: pulumi.String(\"key1\"),\n\t\t\tRegenerateKeyAutomatically: pulumi.Bool(false),\n\t\t\tRegenerationPeriod: pulumi.String(\"P1D\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.ManagedStorageAccount;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"keyvaultname\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions( \n \"Get\",\n \"Delete\")\n .storagePermissions( \n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\")\n .build())\n .build());\n\n var exampleManagedStorageAccount = new ManagedStorageAccount(\"exampleManagedStorageAccount\", ManagedStorageAccountArgs.builder()\n .name(\"examplemanagedstorage\")\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .storageAccountKey(\"key1\")\n .regenerateKeyAutomatically(false)\n .regenerationPeriod(\"P1D\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: keyvaultname\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n secretPermissions:\n - Get\n - Delete\n storagePermissions:\n - Get\n - List\n - Set\n - SetSAS\n - GetSAS\n - DeleteSAS\n - Update\n - RegenerateKey\n exampleManagedStorageAccount:\n type: azure:keyvault:ManagedStorageAccount\n name: example\n properties:\n name: examplemanagedstorage\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n storageAccountKey: key1\n regenerateKeyAutomatically: false\n regenerationPeriod: P1D\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Automatically Regenerate Storage Account Access Key)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst current = azure.core.getClientConfig({});\nconst test = azuread.getServicePrincipal({\n applicationId: \"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\",\n});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"keyvaultname\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n secretPermissions: [\n \"Get\",\n \"Delete\",\n ],\n storagePermissions: [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Storage Account Key Operator Service Role\",\n principalId: test.then(test =\u003e test.id),\n});\nconst exampleManagedStorageAccount = new azure.keyvault.ManagedStorageAccount(\"example\", {\n name: \"examplemanagedstorage\",\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n storageAccountKey: \"key1\",\n regenerateKeyAutomatically: true,\n regenerationPeriod: \"P1D\",\n}, {\n dependsOn: [exampleAssignment],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\ncurrent = azure.core.get_client_config()\ntest = azuread.get_service_principal(application_id=\"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\")\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"keyvaultname\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"secret_permissions\": [\n \"Get\",\n \"Delete\",\n ],\n \"storage_permissions\": [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }])\nexample_assignment = azure.authorization.Assignment(\"example\",\n scope=example_account.id,\n role_definition_name=\"Storage Account Key Operator Service Role\",\n principal_id=test.id)\nexample_managed_storage_account = azure.keyvault.ManagedStorageAccount(\"example\",\n name=\"examplemanagedstorage\",\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n storage_account_key=\"key1\",\n regenerate_key_automatically=True,\n regeneration_period=\"P1D\",\n opts = pulumi.ResourceOptions(depends_on=[example_assignment]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var test = AzureAD.GetServicePrincipal.Invoke(new()\n {\n ApplicationId = \"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\",\n });\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"keyvaultname\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n \"Delete\",\n },\n StoragePermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n },\n },\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Storage Account Key Operator Service Role\",\n PrincipalId = test.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.Id),\n });\n\n var exampleManagedStorageAccount = new Azure.KeyVault.ManagedStorageAccount(\"example\", new()\n {\n Name = \"examplemanagedstorage\",\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n StorageAccountKey = \"key1\",\n RegenerateKeyAutomatically = true,\n RegenerationPeriod = \"P1D\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAssignment,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttest, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tApplicationId: pulumi.StringRef(\"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"keyvaultname\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t},\n\t\t\t\t\tStoragePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"SetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"GetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteSAS\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"RegenerateKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAssignment, err := authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Storage Account Key Operator Service Role\"),\n\t\t\tPrincipalId: pulumi.String(test.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewManagedStorageAccount(ctx, \"example\", \u0026keyvault.ManagedStorageAccountArgs{\n\t\t\tName: pulumi.String(\"examplemanagedstorage\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tStorageAccountKey: pulumi.String(\"key1\"),\n\t\t\tRegenerateKeyAutomatically: pulumi.Bool(true),\n\t\t\tRegenerationPeriod: pulumi.String(\"P1D\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAssignment,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.keyvault.ManagedStorageAccount;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var test = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .applicationId(\"cfa8b339-82a2-471a-a3c9-0fc0be7a4093\")\n .build());\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"keyvaultname\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions( \n \"Get\",\n \"Delete\")\n .storagePermissions( \n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\")\n .build())\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Storage Account Key Operator Service Role\")\n .principalId(test.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.id()))\n .build());\n\n var exampleManagedStorageAccount = new ManagedStorageAccount(\"exampleManagedStorageAccount\", ManagedStorageAccountArgs.builder()\n .name(\"examplemanagedstorage\")\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .storageAccountKey(\"key1\")\n .regenerateKeyAutomatically(true)\n .regenerationPeriod(\"P1D\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAssignment)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: keyvaultname\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n secretPermissions:\n - Get\n - Delete\n storagePermissions:\n - Get\n - List\n - Set\n - SetSAS\n - GetSAS\n - DeleteSAS\n - Update\n - RegenerateKey\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Storage Account Key Operator Service Role\n principalId: ${test.id}\n exampleManagedStorageAccount:\n type: azure:keyvault:ManagedStorageAccount\n name: example\n properties:\n name: examplemanagedstorage\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n storageAccountKey: key1\n regenerateKeyAutomatically: true\n regenerationPeriod: P1D\n options:\n dependson:\n - ${exampleAssignment}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n test:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n applicationId: cfa8b339-82a2-471a-a3c9-0fc0be7a4093\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Managed Storage Accounts can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/managedStorageAccount:ManagedStorageAccount example https://example-keyvault.vault.azure.net/storage/exampleStorageAcc01\n```\n\n", "properties": { "keyVaultId": { "type": "string", @@ -195649,7 +195649,7 @@ } }, "azure:keyvault/managedStorageAccountSasTokenDefinition:ManagedStorageAccountSasTokenDefinition": { - "description": "Manages a Key Vault Managed Storage Account SAS Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleGetAccountSAS = azure.storage.getAccountSASOutput({\n connectionString: exampleAccount.primaryConnectionString,\n httpsOnly: true,\n resourceTypes: {\n service: true,\n container: false,\n object: false,\n },\n services: {\n blob: true,\n queue: false,\n table: false,\n file: false,\n },\n start: \"2021-04-30T00:00:00Z\",\n expiry: \"2023-04-30T00:00:00Z\",\n permissions: {\n read: true,\n write: true,\n \"delete\": false,\n list: false,\n add: true,\n create: true,\n update: false,\n process: false,\n tag: false,\n filter: false,\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvault\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: example.then(example =\u003e example.tenantId),\n skuName: \"standard\",\n accessPolicies: [{\n tenantId: example.then(example =\u003e example.tenantId),\n objectId: example.then(example =\u003e example.objectId),\n secretPermissions: [\n \"Get\",\n \"Delete\",\n ],\n storagePermissions: [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }],\n});\nconst exampleManagedStorageAccount = new azure.keyvault.ManagedStorageAccount(\"example\", {\n name: \"examplemanagedstorage\",\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n storageAccountKey: \"key1\",\n regenerateKeyAutomatically: false,\n regenerationPeriod: \"P1D\",\n});\nconst exampleManagedStorageAccountSasTokenDefinition = new azure.keyvault.ManagedStorageAccountSasTokenDefinition(\"example\", {\n name: \"examplesasdefinition\",\n validityPeriod: \"P1D\",\n managedStorageAccountId: exampleManagedStorageAccount.id,\n sasTemplateUri: exampleGetAccountSAS.apply(exampleGetAccountSAS =\u003e exampleGetAccountSAS.sas),\n sasType: \"account\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.get_client_config()\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_get_account_sas = azure.storage.get_account_sas_output(connection_string=example_account.primary_connection_string,\n https_only=True,\n resource_types={\n \"service\": True,\n \"container\": False,\n \"object\": False,\n },\n services={\n \"blob\": True,\n \"queue\": False,\n \"table\": False,\n \"file\": False,\n },\n start=\"2021-04-30T00:00:00Z\",\n expiry=\"2023-04-30T00:00:00Z\",\n permissions={\n \"read\": True,\n \"write\": True,\n \"delete\": False,\n \"list\": False,\n \"add\": True,\n \"create\": True,\n \"update\": False,\n \"process\": False,\n \"tag\": False,\n \"filter\": False,\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvault\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n tenant_id=example.tenant_id,\n sku_name=\"standard\",\n access_policies=[{\n \"tenant_id\": example.tenant_id,\n \"object_id\": example.object_id,\n \"secret_permissions\": [\n \"Get\",\n \"Delete\",\n ],\n \"storage_permissions\": [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }])\nexample_managed_storage_account = azure.keyvault.ManagedStorageAccount(\"example\",\n name=\"examplemanagedstorage\",\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n storage_account_key=\"key1\",\n regenerate_key_automatically=False,\n regeneration_period=\"P1D\")\nexample_managed_storage_account_sas_token_definition = azure.keyvault.ManagedStorageAccountSasTokenDefinition(\"example\",\n name=\"examplesasdefinition\",\n validity_period=\"P1D\",\n managed_storage_account_id=example_managed_storage_account.id,\n sas_template_uri=example_get_account_sas.sas,\n sas_type=\"account\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleGetAccountSAS = Azure.Storage.GetAccountSAS.Invoke(new()\n {\n ConnectionString = exampleAccount.PrimaryConnectionString,\n HttpsOnly = true,\n ResourceTypes = new Azure.Storage.Inputs.GetAccountSASResourceTypesInputArgs\n {\n Service = true,\n Container = false,\n Object = false,\n },\n Services = new Azure.Storage.Inputs.GetAccountSASServicesInputArgs\n {\n Blob = true,\n Queue = false,\n Table = false,\n File = false,\n },\n Start = \"2021-04-30T00:00:00Z\",\n Expiry = \"2023-04-30T00:00:00Z\",\n Permissions = new Azure.Storage.Inputs.GetAccountSASPermissionsInputArgs\n {\n Read = true,\n Write = true,\n Delete = false,\n List = false,\n Add = true,\n Create = true,\n Update = false,\n Process = false,\n Tag = false,\n Filter = false,\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvault\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n \"Delete\",\n },\n StoragePermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n },\n },\n },\n });\n\n var exampleManagedStorageAccount = new Azure.KeyVault.ManagedStorageAccount(\"example\", new()\n {\n Name = \"examplemanagedstorage\",\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n StorageAccountKey = \"key1\",\n RegenerateKeyAutomatically = false,\n RegenerationPeriod = \"P1D\",\n });\n\n var exampleManagedStorageAccountSasTokenDefinition = new Azure.KeyVault.ManagedStorageAccountSasTokenDefinition(\"example\", new()\n {\n Name = \"examplesasdefinition\",\n ValidityPeriod = \"P1D\",\n ManagedStorageAccountId = exampleManagedStorageAccount.Id,\n SasTemplateUri = exampleGetAccountSAS.Apply(getAccountSASResult =\u003e getAccountSASResult.Sas),\n SasType = \"account\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetAccountSAS := storage.GetAccountSASOutput(ctx, storage.GetAccountSASOutputArgs{\n\t\t\tConnectionString: exampleAccount.PrimaryConnectionString,\n\t\t\tHttpsOnly: pulumi.Bool(true),\n\t\t\tResourceTypes: \u0026storage.GetAccountSASResourceTypesArgs{\n\t\t\t\tService: pulumi.Bool(true),\n\t\t\t\tContainer: pulumi.Bool(false),\n\t\t\t\tObject: pulumi.Bool(false),\n\t\t\t},\n\t\t\tServices: \u0026storage.GetAccountSASServicesArgs{\n\t\t\t\tBlob: pulumi.Bool(true),\n\t\t\t\tQueue: pulumi.Bool(false),\n\t\t\t\tTable: pulumi.Bool(false),\n\t\t\t\tFile: pulumi.Bool(false),\n\t\t\t},\n\t\t\tStart: pulumi.String(\"2021-04-30T00:00:00Z\"),\n\t\t\tExpiry: pulumi.String(\"2023-04-30T00:00:00Z\"),\n\t\t\tPermissions: \u0026storage.GetAccountSASPermissionsArgs{\n\t\t\t\tRead: pulumi.Bool(true),\n\t\t\t\tWrite: pulumi.Bool(true),\n\t\t\t\tDelete: pulumi.Bool(false),\n\t\t\t\tList: pulumi.Bool(false),\n\t\t\t\tAdd: pulumi.Bool(true),\n\t\t\t\tCreate: pulumi.Bool(true),\n\t\t\t\tUpdate: pulumi.Bool(false),\n\t\t\t\tProcess: pulumi.Bool(false),\n\t\t\t\tTag: pulumi.Bool(false),\n\t\t\t\tFilter: pulumi.Bool(false),\n\t\t\t},\n\t\t}, nil)\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvault\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.String(example.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(example.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(example.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t},\n\t\t\t\t\tStoragePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"SetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"GetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteSAS\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"RegenerateKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleManagedStorageAccount, err := keyvault.NewManagedStorageAccount(ctx, \"example\", \u0026keyvault.ManagedStorageAccountArgs{\n\t\t\tName: pulumi.String(\"examplemanagedstorage\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tStorageAccountKey: pulumi.String(\"key1\"),\n\t\t\tRegenerateKeyAutomatically: pulumi.Bool(false),\n\t\t\tRegenerationPeriod: pulumi.String(\"P1D\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewManagedStorageAccountSasTokenDefinition(ctx, \"example\", \u0026keyvault.ManagedStorageAccountSasTokenDefinitionArgs{\n\t\t\tName: pulumi.String(\"examplesasdefinition\"),\n\t\t\tValidityPeriod: pulumi.String(\"P1D\"),\n\t\t\tManagedStorageAccountId: exampleManagedStorageAccount.ID(),\n\t\t\tSasTemplateUri: pulumi.String(exampleGetAccountSAS.ApplyT(func(exampleGetAccountSAS storage.GetAccountSASResult) (*string, error) {\n\t\t\t\treturn \u0026exampleGetAccountSAS.Sas, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tSasType: pulumi.String(\"account\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.StorageFunctions;\nimport com.pulumi.azure.storage.inputs.GetAccountSASArgs;\nimport com.pulumi.azure.storage.inputs.GetAccountSASResourceTypesArgs;\nimport com.pulumi.azure.storage.inputs.GetAccountSASServicesArgs;\nimport com.pulumi.azure.storage.inputs.GetAccountSASPermissionsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.ManagedStorageAccount;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountArgs;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountSasTokenDefinition;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountSasTokenDefinitionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n final var exampleGetAccountSAS = StorageFunctions.getAccountSAS(GetAccountSASArgs.builder()\n .connectionString(exampleAccount.primaryConnectionString())\n .httpsOnly(true)\n .resourceTypes(GetAccountSASResourceTypesArgs.builder()\n .service(true)\n .container(false)\n .object(false)\n .build())\n .services(GetAccountSASServicesArgs.builder()\n .blob(true)\n .queue(false)\n .table(false)\n .file(false)\n .build())\n .start(\"2021-04-30T00:00:00Z\")\n .expiry(\"2023-04-30T00:00:00Z\")\n .permissions(GetAccountSASPermissionsArgs.builder()\n .read(true)\n .write(true)\n .delete(false)\n .list(false)\n .add(true)\n .create(true)\n .update(false)\n .process(false)\n .tag(false)\n .filter(false)\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvault\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions( \n \"Get\",\n \"Delete\")\n .storagePermissions( \n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\")\n .build())\n .build());\n\n var exampleManagedStorageAccount = new ManagedStorageAccount(\"exampleManagedStorageAccount\", ManagedStorageAccountArgs.builder()\n .name(\"examplemanagedstorage\")\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .storageAccountKey(\"key1\")\n .regenerateKeyAutomatically(false)\n .regenerationPeriod(\"P1D\")\n .build());\n\n var exampleManagedStorageAccountSasTokenDefinition = new ManagedStorageAccountSasTokenDefinition(\"exampleManagedStorageAccountSasTokenDefinition\", ManagedStorageAccountSasTokenDefinitionArgs.builder()\n .name(\"examplesasdefinition\")\n .validityPeriod(\"P1D\")\n .managedStorageAccountId(exampleManagedStorageAccount.id())\n .sasTemplateUri(exampleGetAccountSAS.applyValue(getAccountSASResult -\u003e getAccountSASResult).applyValue(exampleGetAccountSAS -\u003e exampleGetAccountSAS.applyValue(getAccountSASResult -\u003e getAccountSASResult.sas())))\n .sasType(\"account\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvault\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${example.tenantId}\n skuName: standard\n accessPolicies:\n - tenantId: ${example.tenantId}\n objectId: ${example.objectId}\n secretPermissions:\n - Get\n - Delete\n storagePermissions:\n - Get\n - List\n - Set\n - SetSAS\n - GetSAS\n - DeleteSAS\n - Update\n - RegenerateKey\n exampleManagedStorageAccount:\n type: azure:keyvault:ManagedStorageAccount\n name: example\n properties:\n name: examplemanagedstorage\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n storageAccountKey: key1\n regenerateKeyAutomatically: false\n regenerationPeriod: P1D\n exampleManagedStorageAccountSasTokenDefinition:\n type: azure:keyvault:ManagedStorageAccountSasTokenDefinition\n name: example\n properties:\n name: examplesasdefinition\n validityPeriod: P1D\n managedStorageAccountId: ${exampleManagedStorageAccount.id}\n sasTemplateUri: ${exampleGetAccountSAS.sas}\n sasType: account\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetAccountSAS:\n fn::invoke:\n Function: azure:storage:getAccountSAS\n Arguments:\n connectionString: ${exampleAccount.primaryConnectionString}\n httpsOnly: true\n resourceTypes:\n service: true\n container: false\n object: false\n services:\n blob: true\n queue: false\n table: false\n file: false\n start: 2021-04-30T00:00:00Z\n expiry: 2023-04-30T00:00:00Z\n permissions:\n read: true\n write: true\n delete: false\n list: false\n add: true\n create: true\n update: false\n process: false\n tag: false\n filter: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vaults can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/managedStorageAccountSasTokenDefinition:ManagedStorageAccountSasTokenDefinition example https://example-keyvault.vault.azure.net/storage/exampleStorageAcc01/sas/exampleSasDefinition01\n```\n\n", + "description": "Manages a Key Vault Managed Storage Account SAS Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleGetAccountSAS = azure.storage.getAccountSASOutput({\n connectionString: exampleAccount.primaryConnectionString,\n httpsOnly: true,\n resourceTypes: {\n service: true,\n container: false,\n object: false,\n },\n services: {\n blob: true,\n queue: false,\n table: false,\n file: false,\n },\n start: \"2021-04-30T00:00:00Z\",\n expiry: \"2023-04-30T00:00:00Z\",\n permissions: {\n read: true,\n write: true,\n \"delete\": false,\n list: false,\n add: true,\n create: true,\n update: false,\n process: false,\n tag: false,\n filter: false,\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvault\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: example.then(example =\u003e example.tenantId),\n skuName: \"standard\",\n accessPolicies: [{\n tenantId: example.then(example =\u003e example.tenantId),\n objectId: example.then(example =\u003e example.objectId),\n secretPermissions: [\n \"Get\",\n \"Delete\",\n ],\n storagePermissions: [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }],\n});\nconst exampleManagedStorageAccount = new azure.keyvault.ManagedStorageAccount(\"example\", {\n name: \"examplemanagedstorage\",\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n storageAccountKey: \"key1\",\n regenerateKeyAutomatically: false,\n regenerationPeriod: \"P1D\",\n});\nconst exampleManagedStorageAccountSasTokenDefinition = new azure.keyvault.ManagedStorageAccountSasTokenDefinition(\"example\", {\n name: \"examplesasdefinition\",\n validityPeriod: \"P1D\",\n managedStorageAccountId: exampleManagedStorageAccount.id,\n sasTemplateUri: exampleGetAccountSAS.apply(exampleGetAccountSAS =\u003e exampleGetAccountSAS.sas),\n sasType: \"account\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.get_client_config()\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_get_account_sas = azure.storage.get_account_sas_output(connection_string=example_account.primary_connection_string,\n https_only=True,\n resource_types={\n \"service\": True,\n \"container\": False,\n \"object\": False,\n },\n services={\n \"blob\": True,\n \"queue\": False,\n \"table\": False,\n \"file\": False,\n },\n start=\"2021-04-30T00:00:00Z\",\n expiry=\"2023-04-30T00:00:00Z\",\n permissions={\n \"read\": True,\n \"write\": True,\n \"delete\": False,\n \"list\": False,\n \"add\": True,\n \"create\": True,\n \"update\": False,\n \"process\": False,\n \"tag\": False,\n \"filter\": False,\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvault\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n tenant_id=example.tenant_id,\n sku_name=\"standard\",\n access_policies=[{\n \"tenant_id\": example.tenant_id,\n \"object_id\": example.object_id,\n \"secret_permissions\": [\n \"Get\",\n \"Delete\",\n ],\n \"storage_permissions\": [\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n ],\n }])\nexample_managed_storage_account = azure.keyvault.ManagedStorageAccount(\"example\",\n name=\"examplemanagedstorage\",\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n storage_account_key=\"key1\",\n regenerate_key_automatically=False,\n regeneration_period=\"P1D\")\nexample_managed_storage_account_sas_token_definition = azure.keyvault.ManagedStorageAccountSasTokenDefinition(\"example\",\n name=\"examplesasdefinition\",\n validity_period=\"P1D\",\n managed_storage_account_id=example_managed_storage_account.id,\n sas_template_uri=example_get_account_sas.sas,\n sas_type=\"account\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleGetAccountSAS = Azure.Storage.GetAccountSAS.Invoke(new()\n {\n ConnectionString = exampleAccount.PrimaryConnectionString,\n HttpsOnly = true,\n ResourceTypes = new Azure.Storage.Inputs.GetAccountSASResourceTypesInputArgs\n {\n Service = true,\n Container = false,\n Object = false,\n },\n Services = new Azure.Storage.Inputs.GetAccountSASServicesInputArgs\n {\n Blob = true,\n Queue = false,\n Table = false,\n File = false,\n },\n Start = \"2021-04-30T00:00:00Z\",\n Expiry = \"2023-04-30T00:00:00Z\",\n Permissions = new Azure.Storage.Inputs.GetAccountSASPermissionsInputArgs\n {\n Read = true,\n Write = true,\n Delete = false,\n List = false,\n Add = true,\n Create = true,\n Update = false,\n Process = false,\n Tag = false,\n Filter = false,\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvault\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n \"Delete\",\n },\n StoragePermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\",\n },\n },\n },\n });\n\n var exampleManagedStorageAccount = new Azure.KeyVault.ManagedStorageAccount(\"example\", new()\n {\n Name = \"examplemanagedstorage\",\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n StorageAccountKey = \"key1\",\n RegenerateKeyAutomatically = false,\n RegenerationPeriod = \"P1D\",\n });\n\n var exampleManagedStorageAccountSasTokenDefinition = new Azure.KeyVault.ManagedStorageAccountSasTokenDefinition(\"example\", new()\n {\n Name = \"examplesasdefinition\",\n ValidityPeriod = \"P1D\",\n ManagedStorageAccountId = exampleManagedStorageAccount.Id,\n SasTemplateUri = exampleGetAccountSAS.Apply(getAccountSASResult =\u003e getAccountSASResult.Sas),\n SasType = \"account\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetAccountSAS := storage.GetAccountSASOutput(ctx, storage.GetAccountSASOutputArgs{\n\t\t\tConnectionString: exampleAccount.PrimaryConnectionString,\n\t\t\tHttpsOnly: pulumi.Bool(true),\n\t\t\tResourceTypes: \u0026storage.GetAccountSASResourceTypesArgs{\n\t\t\t\tService: pulumi.Bool(true),\n\t\t\t\tContainer: pulumi.Bool(false),\n\t\t\t\tObject: pulumi.Bool(false),\n\t\t\t},\n\t\t\tServices: \u0026storage.GetAccountSASServicesArgs{\n\t\t\t\tBlob: pulumi.Bool(true),\n\t\t\t\tQueue: pulumi.Bool(false),\n\t\t\t\tTable: pulumi.Bool(false),\n\t\t\t\tFile: pulumi.Bool(false),\n\t\t\t},\n\t\t\tStart: pulumi.String(\"2021-04-30T00:00:00Z\"),\n\t\t\tExpiry: pulumi.String(\"2023-04-30T00:00:00Z\"),\n\t\t\tPermissions: \u0026storage.GetAccountSASPermissionsArgs{\n\t\t\t\tRead: pulumi.Bool(true),\n\t\t\t\tWrite: pulumi.Bool(true),\n\t\t\t\tDelete: pulumi.Bool(false),\n\t\t\t\tList: pulumi.Bool(false),\n\t\t\t\tAdd: pulumi.Bool(true),\n\t\t\t\tCreate: pulumi.Bool(true),\n\t\t\t\tUpdate: pulumi.Bool(false),\n\t\t\t\tProcess: pulumi.Bool(false),\n\t\t\t\tTag: pulumi.Bool(false),\n\t\t\t\tFilter: pulumi.Bool(false),\n\t\t\t},\n\t\t}, nil)\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvault\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.String(example.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(example.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(example.ObjectId),\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t},\n\t\t\t\t\tStoragePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"SetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"GetSAS\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteSAS\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"RegenerateKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleManagedStorageAccount, err := keyvault.NewManagedStorageAccount(ctx, \"example\", \u0026keyvault.ManagedStorageAccountArgs{\n\t\t\tName: pulumi.String(\"examplemanagedstorage\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tStorageAccountKey: pulumi.String(\"key1\"),\n\t\t\tRegenerateKeyAutomatically: pulumi.Bool(false),\n\t\t\tRegenerationPeriod: pulumi.String(\"P1D\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewManagedStorageAccountSasTokenDefinition(ctx, \"example\", \u0026keyvault.ManagedStorageAccountSasTokenDefinitionArgs{\n\t\t\tName: pulumi.String(\"examplesasdefinition\"),\n\t\t\tValidityPeriod: pulumi.String(\"P1D\"),\n\t\t\tManagedStorageAccountId: exampleManagedStorageAccount.ID(),\n\t\t\tSasTemplateUri: pulumi.String(exampleGetAccountSAS.ApplyT(func(exampleGetAccountSAS storage.GetAccountSASResult) (*string, error) {\n\t\t\t\treturn \u0026exampleGetAccountSAS.Sas, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tSasType: pulumi.String(\"account\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.StorageFunctions;\nimport com.pulumi.azure.storage.inputs.GetAccountSASArgs;\nimport com.pulumi.azure.storage.inputs.GetAccountSASResourceTypesArgs;\nimport com.pulumi.azure.storage.inputs.GetAccountSASServicesArgs;\nimport com.pulumi.azure.storage.inputs.GetAccountSASPermissionsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.ManagedStorageAccount;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountArgs;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountSasTokenDefinition;\nimport com.pulumi.azure.keyvault.ManagedStorageAccountSasTokenDefinitionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n final var exampleGetAccountSAS = StorageFunctions.getAccountSAS(GetAccountSASArgs.builder()\n .connectionString(exampleAccount.primaryConnectionString())\n .httpsOnly(true)\n .resourceTypes(GetAccountSASResourceTypesArgs.builder()\n .service(true)\n .container(false)\n .object(false)\n .build())\n .services(GetAccountSASServicesArgs.builder()\n .blob(true)\n .queue(false)\n .table(false)\n .file(false)\n .build())\n .start(\"2021-04-30T00:00:00Z\")\n .expiry(\"2023-04-30T00:00:00Z\")\n .permissions(GetAccountSASPermissionsArgs.builder()\n .read(true)\n .write(true)\n .delete(false)\n .list(false)\n .add(true)\n .create(true)\n .update(false)\n .process(false)\n .tag(false)\n .filter(false)\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvault\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions( \n \"Get\",\n \"Delete\")\n .storagePermissions( \n \"Get\",\n \"List\",\n \"Set\",\n \"SetSAS\",\n \"GetSAS\",\n \"DeleteSAS\",\n \"Update\",\n \"RegenerateKey\")\n .build())\n .build());\n\n var exampleManagedStorageAccount = new ManagedStorageAccount(\"exampleManagedStorageAccount\", ManagedStorageAccountArgs.builder()\n .name(\"examplemanagedstorage\")\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .storageAccountKey(\"key1\")\n .regenerateKeyAutomatically(false)\n .regenerationPeriod(\"P1D\")\n .build());\n\n var exampleManagedStorageAccountSasTokenDefinition = new ManagedStorageAccountSasTokenDefinition(\"exampleManagedStorageAccountSasTokenDefinition\", ManagedStorageAccountSasTokenDefinitionArgs.builder()\n .name(\"examplesasdefinition\")\n .validityPeriod(\"P1D\")\n .managedStorageAccountId(exampleManagedStorageAccount.id())\n .sasTemplateUri(exampleGetAccountSAS.applyValue(getAccountSASResult -\u003e getAccountSASResult).applyValue(exampleGetAccountSAS -\u003e exampleGetAccountSAS.applyValue(getAccountSASResult -\u003e getAccountSASResult.sas())))\n .sasType(\"account\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvault\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${example.tenantId}\n skuName: standard\n accessPolicies:\n - tenantId: ${example.tenantId}\n objectId: ${example.objectId}\n secretPermissions:\n - Get\n - Delete\n storagePermissions:\n - Get\n - List\n - Set\n - SetSAS\n - GetSAS\n - DeleteSAS\n - Update\n - RegenerateKey\n exampleManagedStorageAccount:\n type: azure:keyvault:ManagedStorageAccount\n name: example\n properties:\n name: examplemanagedstorage\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n storageAccountKey: key1\n regenerateKeyAutomatically: false\n regenerationPeriod: P1D\n exampleManagedStorageAccountSasTokenDefinition:\n type: azure:keyvault:ManagedStorageAccountSasTokenDefinition\n name: example\n properties:\n name: examplesasdefinition\n validityPeriod: P1D\n managedStorageAccountId: ${exampleManagedStorageAccount.id}\n sasTemplateUri: ${exampleGetAccountSAS.sas}\n sasType: account\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetAccountSAS:\n fn::invoke:\n Function: azure:storage:getAccountSAS\n Arguments:\n connectionString: ${exampleAccount.primaryConnectionString}\n httpsOnly: true\n resourceTypes:\n service: true\n container: false\n object: false\n services:\n blob: true\n queue: false\n table: false\n file: false\n start: 2021-04-30T00:00:00Z\n expiry: 2023-04-30T00:00:00Z\n permissions:\n read: true\n write: true\n delete: false\n list: false\n add: true\n create: true\n update: false\n process: false\n tag: false\n filter: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vaults can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/managedStorageAccountSasTokenDefinition:ManagedStorageAccountSasTokenDefinition example https://example-keyvault.vault.azure.net/storage/exampleStorageAcc01/sas/exampleSasDefinition01\n```\n\n", "properties": { "managedStorageAccountId": { "type": "string", @@ -195767,7 +195767,7 @@ } }, "azure:keyvault/secret:Secret": { - "description": "Manages a Key Vault Secret.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }],\n});\nconst exampleSecret = new azure.keyvault.Secret(\"example\", {\n name: \"secret-sauce\",\n value: \"szechuan\",\n keyVaultId: exampleKeyVault.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }])\nexample_secret = azure.keyvault.Secret(\"example\",\n name=\"secret-sauce\",\n value=\"szechuan\",\n key_vault_id=example_key_vault.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n },\n });\n\n var exampleSecret = new Azure.KeyVault.Secret(\"example\", new()\n {\n Name = \"secret-sauce\",\n Value = \"szechuan\",\n KeyVaultId = exampleKeyVault.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewSecret(ctx, \"example\", \u0026keyvault.SecretArgs{\n\t\t\tName: pulumi.String(\"secret-sauce\"),\n\t\t\tValue: pulumi.String(\"szechuan\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Secret;\nimport com.pulumi.azure.keyvault.SecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build())\n .build());\n\n var exampleSecret = new Secret(\"exampleSecret\", SecretArgs.builder()\n .name(\"secret-sauce\")\n .value(\"szechuan\")\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n exampleSecret:\n type: azure:keyvault:Secret\n name: example\n properties:\n name: secret-sauce\n value: szechuan\n keyVaultId: ${exampleKeyVault.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Secrets which are Enabled can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/secret:Secret example \"https://example-keyvault.vault.azure.net/secrets/example/fdf067c93bbb4b22bff4d8b7a9a56217\"\n```\n\n", + "description": "Manages a Key Vault Secret.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n ],\n secretPermissions: [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }],\n});\nconst exampleSecret = new azure.keyvault.Secret(\"example\", {\n name: \"secret-sauce\",\n value: \"szechuan\",\n keyVaultId: exampleKeyVault.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n ],\n \"secret_permissions\": [\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n ],\n }])\nexample_secret = azure.keyvault.Secret(\"example\",\n name=\"secret-sauce\",\n value=\"szechuan\",\n key_vault_id=example_key_vault.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\",\n },\n },\n },\n });\n\n var exampleSecret = new Azure.KeyVault.Secret(\"example\", new()\n {\n Name = \"secret-sauce\",\n Value = \"szechuan\",\n KeyVaultId = exampleKeyVault.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewSecret(ctx, \"example\", \u0026keyvault.SecretArgs{\n\t\t\tName: pulumi.String(\"secret-sauce\"),\n\t\t\tValue: pulumi.String(\"szechuan\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Secret;\nimport com.pulumi.azure.keyvault.SecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\")\n .secretPermissions( \n \"Set\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"Recover\")\n .build())\n .build());\n\n var exampleSecret = new Secret(\"exampleSecret\", SecretArgs.builder()\n .name(\"secret-sauce\")\n .value(\"szechuan\")\n .keyVaultId(exampleKeyVault.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n secretPermissions:\n - Set\n - Get\n - Delete\n - Purge\n - Recover\n exampleSecret:\n type: azure:keyvault:Secret\n name: example\n properties:\n name: secret-sauce\n value: szechuan\n keyVaultId: ${exampleKeyVault.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKey Vault Secrets which are Enabled can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:keyvault/secret:Secret example \"https://example-keyvault.vault.azure.net/secrets/example/fdf067c93bbb4b22bff4d8b7a9a56217\"\n```\n\n", "properties": { "contentType": { "type": "string", @@ -196433,7 +196433,7 @@ } }, "azure:kusto/clusterCustomerManagedKey:ClusterCustomerManagedKey": { - "description": "Manages a Customer Managed Key for a Kusto Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleCluster = new azure.kusto.Cluster(\"example\", {\n name: \"kustocluster\",\n location: example.location,\n resourceGroupName: example.name,\n sku: {\n name: \"Standard_D13_v2\",\n capacity: 2,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst cluster = new azure.keyvault.AccessPolicy(\"cluster\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleCluster.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Recover\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"tfex-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n client,\n cluster,\n ],\n});\nconst exampleClusterCustomerManagedKey = new azure.kusto.ClusterCustomerManagedKey(\"example\", {\n clusterId: exampleCluster.id,\n keyVaultId: exampleKeyVault.id,\n keyName: exampleKey.name,\n keyVersion: exampleKey.version,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_cluster = azure.kusto.Cluster(\"example\",\n name=\"kustocluster\",\n location=example.location,\n resource_group_name=example.name,\n sku={\n \"name\": \"Standard_D13_v2\",\n \"capacity\": 2,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\ncluster = azure.keyvault.AccessPolicy(\"cluster\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_cluster.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Recover\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"tfex-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n cluster,\n ]))\nexample_cluster_customer_managed_key = azure.kusto.ClusterCustomerManagedKey(\"example\",\n cluster_id=example_cluster.id,\n key_vault_id=example_key_vault.id,\n key_name=example_key.name,\n key_version=example_key.version)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleCluster = new Azure.Kusto.Cluster(\"example\", new()\n {\n Name = \"kustocluster\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = new Azure.Kusto.Inputs.ClusterSkuArgs\n {\n Name = \"Standard_D13_v2\",\n Capacity = 2,\n },\n Identity = new Azure.Kusto.Inputs.ClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var cluster = new Azure.KeyVault.AccessPolicy(\"cluster\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleCluster.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Recover\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"tfex-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n cluster,\n },\n });\n\n var exampleClusterCustomerManagedKey = new Azure.Kusto.ClusterCustomerManagedKey(\"example\", new()\n {\n ClusterId = exampleCluster.Id,\n KeyVaultId = exampleKeyVault.Id,\n KeyName = exampleKey.Name,\n KeyVersion = exampleKey.Version,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/kusto\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := kusto.NewCluster(ctx, \"example\", \u0026kusto.ClusterArgs{\n\t\t\tName: pulumi.String(\"kustocluster\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: \u0026kusto.ClusterSkuArgs{\n\t\t\t\tName: pulumi.String(\"Standard_D13_v2\"),\n\t\t\t\tCapacity: pulumi.Int(2),\n\t\t\t},\n\t\t\tIdentity: \u0026kusto.ClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcluster, err := keyvault.NewAccessPolicy(ctx, \"cluster\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(exampleCluster.Identity.ApplyT(func(identity kusto.ClusterIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"tfex-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tcluster,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kusto.NewClusterCustomerManagedKey(ctx, \"example\", \u0026kusto.ClusterCustomerManagedKeyArgs{\n\t\t\tClusterId: exampleCluster.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyName: exampleKey.Name,\n\t\t\tKeyVersion: exampleKey.Version,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.kusto.Cluster;\nimport com.pulumi.azure.kusto.ClusterArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterSkuArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterIdentityArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.kusto.ClusterCustomerManagedKey;\nimport com.pulumi.azure.kusto.ClusterCustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"kustocluster\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(ClusterSkuArgs.builder()\n .name(\"Standard_D13_v2\")\n .capacity(2)\n .build())\n .identity(ClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var cluster = new AccessPolicy(\"cluster\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleCluster.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Recover\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"tfex-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n cluster)\n .build());\n\n var exampleClusterCustomerManagedKey = new ClusterCustomerManagedKey(\"exampleClusterCustomerManagedKey\", ClusterCustomerManagedKeyArgs.builder()\n .clusterId(exampleCluster.id())\n .keyVaultId(exampleKeyVault.id())\n .keyName(exampleKey.name())\n .keyVersion(exampleKey.version())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n cluster:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleCluster.identity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - List\n - Create\n - Delete\n - Recover\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: tfex-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${client}\n - ${cluster}\n exampleCluster:\n type: azure:kusto:Cluster\n name: example\n properties:\n name: kustocluster\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku:\n name: Standard_D13_v2\n capacity: 2\n identity:\n type: SystemAssigned\n exampleClusterCustomerManagedKey:\n type: azure:kusto:ClusterCustomerManagedKey\n name: example\n properties:\n clusterId: ${exampleCluster.id}\n keyVaultId: ${exampleKeyVault.id}\n keyName: ${exampleKey.name}\n keyVersion: ${exampleKey.version}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustomer Managed Keys for a Kusto Cluster can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:kusto/clusterCustomerManagedKey:ClusterCustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Kusto/clusters/cluster1\n```\n\n", + "description": "Manages a Customer Managed Key for a Kusto Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleCluster = new azure.kusto.Cluster(\"example\", {\n name: \"kustocluster\",\n location: example.location,\n resourceGroupName: example.name,\n sku: {\n name: \"Standard_D13_v2\",\n capacity: 2,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst cluster = new azure.keyvault.AccessPolicy(\"cluster\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleCluster.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Recover\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"tfex-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n client,\n cluster,\n ],\n});\nconst exampleClusterCustomerManagedKey = new azure.kusto.ClusterCustomerManagedKey(\"example\", {\n clusterId: exampleCluster.id,\n keyVaultId: exampleKeyVault.id,\n keyName: exampleKey.name,\n keyVersion: exampleKey.version,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_cluster = azure.kusto.Cluster(\"example\",\n name=\"kustocluster\",\n location=example.location,\n resource_group_name=example.name,\n sku={\n \"name\": \"Standard_D13_v2\",\n \"capacity\": 2,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\ncluster = azure.keyvault.AccessPolicy(\"cluster\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_cluster.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Recover\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"tfex-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n cluster,\n ]))\nexample_cluster_customer_managed_key = azure.kusto.ClusterCustomerManagedKey(\"example\",\n cluster_id=example_cluster.id,\n key_vault_id=example_key_vault.id,\n key_name=example_key.name,\n key_version=example_key.version)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleCluster = new Azure.Kusto.Cluster(\"example\", new()\n {\n Name = \"kustocluster\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = new Azure.Kusto.Inputs.ClusterSkuArgs\n {\n Name = \"Standard_D13_v2\",\n Capacity = 2,\n },\n Identity = new Azure.Kusto.Inputs.ClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var cluster = new Azure.KeyVault.AccessPolicy(\"cluster\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleCluster.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Recover\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"tfex-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n cluster,\n },\n });\n\n var exampleClusterCustomerManagedKey = new Azure.Kusto.ClusterCustomerManagedKey(\"example\", new()\n {\n ClusterId = exampleCluster.Id,\n KeyVaultId = exampleKeyVault.Id,\n KeyName = exampleKey.Name,\n KeyVersion = exampleKey.Version,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/kusto\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := kusto.NewCluster(ctx, \"example\", \u0026kusto.ClusterArgs{\n\t\t\tName: pulumi.String(\"kustocluster\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: \u0026kusto.ClusterSkuArgs{\n\t\t\t\tName: pulumi.String(\"Standard_D13_v2\"),\n\t\t\t\tCapacity: pulumi.Int(2),\n\t\t\t},\n\t\t\tIdentity: \u0026kusto.ClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcluster, err := keyvault.NewAccessPolicy(ctx, \"cluster\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(exampleCluster.Identity.ApplyT(func(identity kusto.ClusterIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"tfex-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tcluster,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kusto.NewClusterCustomerManagedKey(ctx, \"example\", \u0026kusto.ClusterCustomerManagedKeyArgs{\n\t\t\tClusterId: exampleCluster.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyName: exampleKey.Name,\n\t\t\tKeyVersion: exampleKey.Version,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.kusto.Cluster;\nimport com.pulumi.azure.kusto.ClusterArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterSkuArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterIdentityArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.kusto.ClusterCustomerManagedKey;\nimport com.pulumi.azure.kusto.ClusterCustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"kustocluster\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(ClusterSkuArgs.builder()\n .name(\"Standard_D13_v2\")\n .capacity(2)\n .build())\n .identity(ClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var cluster = new AccessPolicy(\"cluster\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleCluster.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Recover\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"tfex-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n cluster)\n .build());\n\n var exampleClusterCustomerManagedKey = new ClusterCustomerManagedKey(\"exampleClusterCustomerManagedKey\", ClusterCustomerManagedKeyArgs.builder()\n .clusterId(exampleCluster.id())\n .keyVaultId(exampleKeyVault.id())\n .keyName(exampleKey.name())\n .keyVersion(exampleKey.version())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n cluster:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleCluster.identity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - List\n - Create\n - Delete\n - Recover\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: tfex-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${client}\n - ${cluster}\n exampleCluster:\n type: azure:kusto:Cluster\n name: example\n properties:\n name: kustocluster\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku:\n name: Standard_D13_v2\n capacity: 2\n identity:\n type: SystemAssigned\n exampleClusterCustomerManagedKey:\n type: azure:kusto:ClusterCustomerManagedKey\n name: example\n properties:\n clusterId: ${exampleCluster.id}\n keyVaultId: ${exampleKeyVault.id}\n keyName: ${exampleKey.name}\n keyVersion: ${exampleKey.version}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustomer Managed Keys for a Kusto Cluster can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:kusto/clusterCustomerManagedKey:ClusterCustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Kusto/clusters/cluster1\n```\n\n", "properties": { "clusterId": { "type": "string", @@ -196518,7 +196518,7 @@ } }, "azure:kusto/clusterManagedPrivateEndpoint:ClusterManagedPrivateEndpoint": { - "description": "Manages a Managed Private Endpoint for a Kusto Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.kusto.Cluster(\"example\", {\n name: \"examplekc\",\n location: example.location,\n resourceGroupName: example.name,\n sku: {\n name: \"Dev(No SLA)_Standard_D11_v2\",\n capacity: 1,\n },\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleClusterManagedPrivateEndpoint = new azure.kusto.ClusterManagedPrivateEndpoint(\"example\", {\n name: \"examplempe\",\n resourceGroupName: example.name,\n clusterName: exampleCluster.name,\n privateLinkResourceId: exampleAccount.id,\n privateLinkResourceRegion: exampleAccount.location,\n groupId: \"blob\",\n requestMessage: \"Please Approve\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_cluster = azure.kusto.Cluster(\"example\",\n name=\"examplekc\",\n location=example.location,\n resource_group_name=example.name,\n sku={\n \"name\": \"Dev(No SLA)_Standard_D11_v2\",\n \"capacity\": 1,\n })\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_cluster_managed_private_endpoint = azure.kusto.ClusterManagedPrivateEndpoint(\"example\",\n name=\"examplempe\",\n resource_group_name=example.name,\n cluster_name=example_cluster.name,\n private_link_resource_id=example_account.id,\n private_link_resource_region=example_account.location,\n group_id=\"blob\",\n request_message=\"Please Approve\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.Kusto.Cluster(\"example\", new()\n {\n Name = \"examplekc\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = new Azure.Kusto.Inputs.ClusterSkuArgs\n {\n Name = \"Dev(No SLA)_Standard_D11_v2\",\n Capacity = 1,\n },\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleClusterManagedPrivateEndpoint = new Azure.Kusto.ClusterManagedPrivateEndpoint(\"example\", new()\n {\n Name = \"examplempe\",\n ResourceGroupName = example.Name,\n ClusterName = exampleCluster.Name,\n PrivateLinkResourceId = exampleAccount.Id,\n PrivateLinkResourceRegion = exampleAccount.Location,\n GroupId = \"blob\",\n RequestMessage = \"Please Approve\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/kusto\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := kusto.NewCluster(ctx, \"example\", \u0026kusto.ClusterArgs{\n\t\t\tName: pulumi.String(\"examplekc\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: \u0026kusto.ClusterSkuArgs{\n\t\t\t\tName: pulumi.String(\"Dev(No SLA)_Standard_D11_v2\"),\n\t\t\t\tCapacity: pulumi.Int(1),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kusto.NewClusterManagedPrivateEndpoint(ctx, \"example\", \u0026kusto.ClusterManagedPrivateEndpointArgs{\n\t\t\tName: pulumi.String(\"examplempe\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tClusterName: exampleCluster.Name,\n\t\t\tPrivateLinkResourceId: exampleAccount.ID(),\n\t\t\tPrivateLinkResourceRegion: exampleAccount.Location,\n\t\t\tGroupId: pulumi.String(\"blob\"),\n\t\t\tRequestMessage: pulumi.String(\"Please Approve\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.kusto.Cluster;\nimport com.pulumi.azure.kusto.ClusterArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterSkuArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.kusto.ClusterManagedPrivateEndpoint;\nimport com.pulumi.azure.kusto.ClusterManagedPrivateEndpointArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"examplekc\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(ClusterSkuArgs.builder()\n .name(\"Dev(No SLA)_Standard_D11_v2\")\n .capacity(1)\n .build())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleClusterManagedPrivateEndpoint = new ClusterManagedPrivateEndpoint(\"exampleClusterManagedPrivateEndpoint\", ClusterManagedPrivateEndpointArgs.builder()\n .name(\"examplempe\")\n .resourceGroupName(example.name())\n .clusterName(exampleCluster.name())\n .privateLinkResourceId(exampleAccount.id())\n .privateLinkResourceRegion(exampleAccount.location())\n .groupId(\"blob\")\n .requestMessage(\"Please Approve\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleCluster:\n type: azure:kusto:Cluster\n name: example\n properties:\n name: examplekc\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku:\n name: Dev(No SLA)_Standard_D11_v2\n capacity: 1\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleClusterManagedPrivateEndpoint:\n type: azure:kusto:ClusterManagedPrivateEndpoint\n name: example\n properties:\n name: examplempe\n resourceGroupName: ${example.name}\n clusterName: ${exampleCluster.name}\n privateLinkResourceId: ${exampleAccount.id}\n privateLinkResourceRegion: ${exampleAccount.location}\n groupId: blob\n requestMessage: Please Approve\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManaged Private Endpoint for a Kusto Cluster can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:kusto/clusterManagedPrivateEndpoint:ClusterManagedPrivateEndpoint example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Kusto/clusters/cluster1/managedPrivateEndpoints/managedPrivateEndpoint1\n```\n\n", + "description": "Manages a Managed Private Endpoint for a Kusto Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.kusto.Cluster(\"example\", {\n name: \"examplekc\",\n location: example.location,\n resourceGroupName: example.name,\n sku: {\n name: \"Dev(No SLA)_Standard_D11_v2\",\n capacity: 1,\n },\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleClusterManagedPrivateEndpoint = new azure.kusto.ClusterManagedPrivateEndpoint(\"example\", {\n name: \"examplempe\",\n resourceGroupName: example.name,\n clusterName: exampleCluster.name,\n privateLinkResourceId: exampleAccount.id,\n privateLinkResourceRegion: exampleAccount.location,\n groupId: \"blob\",\n requestMessage: \"Please Approve\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_cluster = azure.kusto.Cluster(\"example\",\n name=\"examplekc\",\n location=example.location,\n resource_group_name=example.name,\n sku={\n \"name\": \"Dev(No SLA)_Standard_D11_v2\",\n \"capacity\": 1,\n })\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_cluster_managed_private_endpoint = azure.kusto.ClusterManagedPrivateEndpoint(\"example\",\n name=\"examplempe\",\n resource_group_name=example.name,\n cluster_name=example_cluster.name,\n private_link_resource_id=example_account.id,\n private_link_resource_region=example_account.location,\n group_id=\"blob\",\n request_message=\"Please Approve\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.Kusto.Cluster(\"example\", new()\n {\n Name = \"examplekc\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = new Azure.Kusto.Inputs.ClusterSkuArgs\n {\n Name = \"Dev(No SLA)_Standard_D11_v2\",\n Capacity = 1,\n },\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleClusterManagedPrivateEndpoint = new Azure.Kusto.ClusterManagedPrivateEndpoint(\"example\", new()\n {\n Name = \"examplempe\",\n ResourceGroupName = example.Name,\n ClusterName = exampleCluster.Name,\n PrivateLinkResourceId = exampleAccount.Id,\n PrivateLinkResourceRegion = exampleAccount.Location,\n GroupId = \"blob\",\n RequestMessage = \"Please Approve\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/kusto\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := kusto.NewCluster(ctx, \"example\", \u0026kusto.ClusterArgs{\n\t\t\tName: pulumi.String(\"examplekc\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: \u0026kusto.ClusterSkuArgs{\n\t\t\t\tName: pulumi.String(\"Dev(No SLA)_Standard_D11_v2\"),\n\t\t\t\tCapacity: pulumi.Int(1),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kusto.NewClusterManagedPrivateEndpoint(ctx, \"example\", \u0026kusto.ClusterManagedPrivateEndpointArgs{\n\t\t\tName: pulumi.String(\"examplempe\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tClusterName: exampleCluster.Name,\n\t\t\tPrivateLinkResourceId: exampleAccount.ID(),\n\t\t\tPrivateLinkResourceRegion: exampleAccount.Location,\n\t\t\tGroupId: pulumi.String(\"blob\"),\n\t\t\tRequestMessage: pulumi.String(\"Please Approve\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.kusto.Cluster;\nimport com.pulumi.azure.kusto.ClusterArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterSkuArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.kusto.ClusterManagedPrivateEndpoint;\nimport com.pulumi.azure.kusto.ClusterManagedPrivateEndpointArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"examplekc\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(ClusterSkuArgs.builder()\n .name(\"Dev(No SLA)_Standard_D11_v2\")\n .capacity(1)\n .build())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleClusterManagedPrivateEndpoint = new ClusterManagedPrivateEndpoint(\"exampleClusterManagedPrivateEndpoint\", ClusterManagedPrivateEndpointArgs.builder()\n .name(\"examplempe\")\n .resourceGroupName(example.name())\n .clusterName(exampleCluster.name())\n .privateLinkResourceId(exampleAccount.id())\n .privateLinkResourceRegion(exampleAccount.location())\n .groupId(\"blob\")\n .requestMessage(\"Please Approve\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleCluster:\n type: azure:kusto:Cluster\n name: example\n properties:\n name: examplekc\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku:\n name: Dev(No SLA)_Standard_D11_v2\n capacity: 1\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleClusterManagedPrivateEndpoint:\n type: azure:kusto:ClusterManagedPrivateEndpoint\n name: example\n properties:\n name: examplempe\n resourceGroupName: ${example.name}\n clusterName: ${exampleCluster.name}\n privateLinkResourceId: ${exampleAccount.id}\n privateLinkResourceRegion: ${exampleAccount.location}\n groupId: blob\n requestMessage: Please Approve\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManaged Private Endpoint for a Kusto Cluster can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:kusto/clusterManagedPrivateEndpoint:ClusterManagedPrivateEndpoint example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Kusto/clusters/cluster1/managedPrivateEndpoints/managedPrivateEndpoint1\n```\n\n", "properties": { "clusterName": { "type": "string", @@ -196640,7 +196640,7 @@ } }, "azure:kusto/clusterPrincipalAssignment:ClusterPrincipalAssignment": { - "description": "Manages a Kusto Cluster Principal Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"KustoRG\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.kusto.Cluster(\"example\", {\n name: \"kustocluster\",\n location: example.location,\n resourceGroupName: example.name,\n sku: {\n name: \"Standard_D13_v2\",\n capacity: 2,\n },\n});\nconst exampleClusterPrincipalAssignment = new azure.kusto.ClusterPrincipalAssignment(\"example\", {\n name: \"KustoPrincipalAssignment\",\n resourceGroupName: example.name,\n clusterName: exampleCluster.name,\n tenantId: current.then(current =\u003e current.tenantId),\n principalId: current.then(current =\u003e current.clientId),\n principalType: \"App\",\n role: \"AllDatabasesAdmin\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"KustoRG\",\n location=\"West Europe\")\nexample_cluster = azure.kusto.Cluster(\"example\",\n name=\"kustocluster\",\n location=example.location,\n resource_group_name=example.name,\n sku={\n \"name\": \"Standard_D13_v2\",\n \"capacity\": 2,\n })\nexample_cluster_principal_assignment = azure.kusto.ClusterPrincipalAssignment(\"example\",\n name=\"KustoPrincipalAssignment\",\n resource_group_name=example.name,\n cluster_name=example_cluster.name,\n tenant_id=current.tenant_id,\n principal_id=current.client_id,\n principal_type=\"App\",\n role=\"AllDatabasesAdmin\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"KustoRG\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.Kusto.Cluster(\"example\", new()\n {\n Name = \"kustocluster\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = new Azure.Kusto.Inputs.ClusterSkuArgs\n {\n Name = \"Standard_D13_v2\",\n Capacity = 2,\n },\n });\n\n var exampleClusterPrincipalAssignment = new Azure.Kusto.ClusterPrincipalAssignment(\"example\", new()\n {\n Name = \"KustoPrincipalAssignment\",\n ResourceGroupName = example.Name,\n ClusterName = exampleCluster.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n PrincipalType = \"App\",\n Role = \"AllDatabasesAdmin\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/kusto\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"KustoRG\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := kusto.NewCluster(ctx, \"example\", \u0026kusto.ClusterArgs{\n\t\t\tName: pulumi.String(\"kustocluster\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: \u0026kusto.ClusterSkuArgs{\n\t\t\t\tName: pulumi.String(\"Standard_D13_v2\"),\n\t\t\t\tCapacity: pulumi.Int(2),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kusto.NewClusterPrincipalAssignment(ctx, \"example\", \u0026kusto.ClusterPrincipalAssignmentArgs{\n\t\t\tName: pulumi.String(\"KustoPrincipalAssignment\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tClusterName: exampleCluster.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tPrincipalId: pulumi.String(current.ClientId),\n\t\t\tPrincipalType: pulumi.String(\"App\"),\n\t\t\tRole: pulumi.String(\"AllDatabasesAdmin\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.kusto.Cluster;\nimport com.pulumi.azure.kusto.ClusterArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterSkuArgs;\nimport com.pulumi.azure.kusto.ClusterPrincipalAssignment;\nimport com.pulumi.azure.kusto.ClusterPrincipalAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"KustoRG\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"kustocluster\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(ClusterSkuArgs.builder()\n .name(\"Standard_D13_v2\")\n .capacity(2)\n .build())\n .build());\n\n var exampleClusterPrincipalAssignment = new ClusterPrincipalAssignment(\"exampleClusterPrincipalAssignment\", ClusterPrincipalAssignmentArgs.builder()\n .name(\"KustoPrincipalAssignment\")\n .resourceGroupName(example.name())\n .clusterName(exampleCluster.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .principalType(\"App\")\n .role(\"AllDatabasesAdmin\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: KustoRG\n location: West Europe\n exampleCluster:\n type: azure:kusto:Cluster\n name: example\n properties:\n name: kustocluster\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku:\n name: Standard_D13_v2\n capacity: 2\n exampleClusterPrincipalAssignment:\n type: azure:kusto:ClusterPrincipalAssignment\n name: example\n properties:\n name: KustoPrincipalAssignment\n resourceGroupName: ${example.name}\n clusterName: ${exampleCluster.name}\n tenantId: ${current.tenantId}\n principalId: ${current.clientId}\n principalType: App\n role: AllDatabasesAdmin\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Explorer Cluster Principal Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:kusto/clusterPrincipalAssignment:ClusterPrincipalAssignment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Kusto/clusters/cluster1/principalAssignments/assignment1\n```\n\n", + "description": "Manages a Kusto Cluster Principal Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"KustoRG\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.kusto.Cluster(\"example\", {\n name: \"kustocluster\",\n location: example.location,\n resourceGroupName: example.name,\n sku: {\n name: \"Standard_D13_v2\",\n capacity: 2,\n },\n});\nconst exampleClusterPrincipalAssignment = new azure.kusto.ClusterPrincipalAssignment(\"example\", {\n name: \"KustoPrincipalAssignment\",\n resourceGroupName: example.name,\n clusterName: exampleCluster.name,\n tenantId: current.then(current =\u003e current.tenantId),\n principalId: current.then(current =\u003e current.clientId),\n principalType: \"App\",\n role: \"AllDatabasesAdmin\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"KustoRG\",\n location=\"West Europe\")\nexample_cluster = azure.kusto.Cluster(\"example\",\n name=\"kustocluster\",\n location=example.location,\n resource_group_name=example.name,\n sku={\n \"name\": \"Standard_D13_v2\",\n \"capacity\": 2,\n })\nexample_cluster_principal_assignment = azure.kusto.ClusterPrincipalAssignment(\"example\",\n name=\"KustoPrincipalAssignment\",\n resource_group_name=example.name,\n cluster_name=example_cluster.name,\n tenant_id=current.tenant_id,\n principal_id=current.client_id,\n principal_type=\"App\",\n role=\"AllDatabasesAdmin\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"KustoRG\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.Kusto.Cluster(\"example\", new()\n {\n Name = \"kustocluster\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = new Azure.Kusto.Inputs.ClusterSkuArgs\n {\n Name = \"Standard_D13_v2\",\n Capacity = 2,\n },\n });\n\n var exampleClusterPrincipalAssignment = new Azure.Kusto.ClusterPrincipalAssignment(\"example\", new()\n {\n Name = \"KustoPrincipalAssignment\",\n ResourceGroupName = example.Name,\n ClusterName = exampleCluster.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n PrincipalType = \"App\",\n Role = \"AllDatabasesAdmin\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/kusto\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"KustoRG\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := kusto.NewCluster(ctx, \"example\", \u0026kusto.ClusterArgs{\n\t\t\tName: pulumi.String(\"kustocluster\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: \u0026kusto.ClusterSkuArgs{\n\t\t\t\tName: pulumi.String(\"Standard_D13_v2\"),\n\t\t\t\tCapacity: pulumi.Int(2),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kusto.NewClusterPrincipalAssignment(ctx, \"example\", \u0026kusto.ClusterPrincipalAssignmentArgs{\n\t\t\tName: pulumi.String(\"KustoPrincipalAssignment\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tClusterName: exampleCluster.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tPrincipalId: pulumi.String(current.ClientId),\n\t\t\tPrincipalType: pulumi.String(\"App\"),\n\t\t\tRole: pulumi.String(\"AllDatabasesAdmin\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.kusto.Cluster;\nimport com.pulumi.azure.kusto.ClusterArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterSkuArgs;\nimport com.pulumi.azure.kusto.ClusterPrincipalAssignment;\nimport com.pulumi.azure.kusto.ClusterPrincipalAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"KustoRG\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"kustocluster\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(ClusterSkuArgs.builder()\n .name(\"Standard_D13_v2\")\n .capacity(2)\n .build())\n .build());\n\n var exampleClusterPrincipalAssignment = new ClusterPrincipalAssignment(\"exampleClusterPrincipalAssignment\", ClusterPrincipalAssignmentArgs.builder()\n .name(\"KustoPrincipalAssignment\")\n .resourceGroupName(example.name())\n .clusterName(exampleCluster.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .principalType(\"App\")\n .role(\"AllDatabasesAdmin\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: KustoRG\n location: West Europe\n exampleCluster:\n type: azure:kusto:Cluster\n name: example\n properties:\n name: kustocluster\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku:\n name: Standard_D13_v2\n capacity: 2\n exampleClusterPrincipalAssignment:\n type: azure:kusto:ClusterPrincipalAssignment\n name: example\n properties:\n name: KustoPrincipalAssignment\n resourceGroupName: ${example.name}\n clusterName: ${exampleCluster.name}\n tenantId: ${current.tenantId}\n principalId: ${current.clientId}\n principalType: App\n role: AllDatabasesAdmin\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nData Explorer Cluster Principal Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:kusto/clusterPrincipalAssignment:ClusterPrincipalAssignment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Kusto/clusters/cluster1/principalAssignments/assignment1\n```\n\n", "properties": { "clusterName": { "type": "string", @@ -197037,7 +197037,7 @@ } }, "azure:kusto/databasePrincipalAssignment:DatabasePrincipalAssignment": { - "description": "Manages a Kusto (also known as Azure Data Explorer) Database Principal Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"KustoRG\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.kusto.Cluster(\"example\", {\n name: \"kustocluster\",\n location: example.location,\n resourceGroupName: example.name,\n sku: {\n name: \"Standard_D13_v2\",\n capacity: 2,\n },\n});\nconst exampleDatabase = new azure.kusto.Database(\"example\", {\n name: \"KustoDatabase\",\n resourceGroupName: example.name,\n location: example.location,\n clusterName: exampleCluster.name,\n hotCachePeriod: \"P7D\",\n softDeletePeriod: \"P31D\",\n});\nconst exampleDatabasePrincipalAssignment = new azure.kusto.DatabasePrincipalAssignment(\"example\", {\n name: \"KustoPrincipalAssignment\",\n resourceGroupName: example.name,\n clusterName: exampleCluster.name,\n databaseName: exampleDatabase.name,\n tenantId: current.then(current =\u003e current.tenantId),\n principalId: current.then(current =\u003e current.clientId),\n principalType: \"App\",\n role: \"Viewer\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"KustoRG\",\n location=\"West Europe\")\nexample_cluster = azure.kusto.Cluster(\"example\",\n name=\"kustocluster\",\n location=example.location,\n resource_group_name=example.name,\n sku={\n \"name\": \"Standard_D13_v2\",\n \"capacity\": 2,\n })\nexample_database = azure.kusto.Database(\"example\",\n name=\"KustoDatabase\",\n resource_group_name=example.name,\n location=example.location,\n cluster_name=example_cluster.name,\n hot_cache_period=\"P7D\",\n soft_delete_period=\"P31D\")\nexample_database_principal_assignment = azure.kusto.DatabasePrincipalAssignment(\"example\",\n name=\"KustoPrincipalAssignment\",\n resource_group_name=example.name,\n cluster_name=example_cluster.name,\n database_name=example_database.name,\n tenant_id=current.tenant_id,\n principal_id=current.client_id,\n principal_type=\"App\",\n role=\"Viewer\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"KustoRG\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.Kusto.Cluster(\"example\", new()\n {\n Name = \"kustocluster\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = new Azure.Kusto.Inputs.ClusterSkuArgs\n {\n Name = \"Standard_D13_v2\",\n Capacity = 2,\n },\n });\n\n var exampleDatabase = new Azure.Kusto.Database(\"example\", new()\n {\n Name = \"KustoDatabase\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n ClusterName = exampleCluster.Name,\n HotCachePeriod = \"P7D\",\n SoftDeletePeriod = \"P31D\",\n });\n\n var exampleDatabasePrincipalAssignment = new Azure.Kusto.DatabasePrincipalAssignment(\"example\", new()\n {\n Name = \"KustoPrincipalAssignment\",\n ResourceGroupName = example.Name,\n ClusterName = exampleCluster.Name,\n DatabaseName = exampleDatabase.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n PrincipalType = \"App\",\n Role = \"Viewer\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/kusto\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"KustoRG\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := kusto.NewCluster(ctx, \"example\", \u0026kusto.ClusterArgs{\n\t\t\tName: pulumi.String(\"kustocluster\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: \u0026kusto.ClusterSkuArgs{\n\t\t\t\tName: pulumi.String(\"Standard_D13_v2\"),\n\t\t\t\tCapacity: pulumi.Int(2),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDatabase, err := kusto.NewDatabase(ctx, \"example\", \u0026kusto.DatabaseArgs{\n\t\t\tName: pulumi.String(\"KustoDatabase\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tClusterName: exampleCluster.Name,\n\t\t\tHotCachePeriod: pulumi.String(\"P7D\"),\n\t\t\tSoftDeletePeriod: pulumi.String(\"P31D\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kusto.NewDatabasePrincipalAssignment(ctx, \"example\", \u0026kusto.DatabasePrincipalAssignmentArgs{\n\t\t\tName: pulumi.String(\"KustoPrincipalAssignment\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tClusterName: exampleCluster.Name,\n\t\t\tDatabaseName: exampleDatabase.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tPrincipalId: pulumi.String(current.ClientId),\n\t\t\tPrincipalType: pulumi.String(\"App\"),\n\t\t\tRole: pulumi.String(\"Viewer\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.kusto.Cluster;\nimport com.pulumi.azure.kusto.ClusterArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterSkuArgs;\nimport com.pulumi.azure.kusto.Database;\nimport com.pulumi.azure.kusto.DatabaseArgs;\nimport com.pulumi.azure.kusto.DatabasePrincipalAssignment;\nimport com.pulumi.azure.kusto.DatabasePrincipalAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"KustoRG\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"kustocluster\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(ClusterSkuArgs.builder()\n .name(\"Standard_D13_v2\")\n .capacity(2)\n .build())\n .build());\n\n var exampleDatabase = new Database(\"exampleDatabase\", DatabaseArgs.builder()\n .name(\"KustoDatabase\")\n .resourceGroupName(example.name())\n .location(example.location())\n .clusterName(exampleCluster.name())\n .hotCachePeriod(\"P7D\")\n .softDeletePeriod(\"P31D\")\n .build());\n\n var exampleDatabasePrincipalAssignment = new DatabasePrincipalAssignment(\"exampleDatabasePrincipalAssignment\", DatabasePrincipalAssignmentArgs.builder()\n .name(\"KustoPrincipalAssignment\")\n .resourceGroupName(example.name())\n .clusterName(exampleCluster.name())\n .databaseName(exampleDatabase.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .principalType(\"App\")\n .role(\"Viewer\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: KustoRG\n location: West Europe\n exampleCluster:\n type: azure:kusto:Cluster\n name: example\n properties:\n name: kustocluster\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku:\n name: Standard_D13_v2\n capacity: 2\n exampleDatabase:\n type: azure:kusto:Database\n name: example\n properties:\n name: KustoDatabase\n resourceGroupName: ${example.name}\n location: ${example.location}\n clusterName: ${exampleCluster.name}\n hotCachePeriod: P7D\n softDeletePeriod: P31D\n exampleDatabasePrincipalAssignment:\n type: azure:kusto:DatabasePrincipalAssignment\n name: example\n properties:\n name: KustoPrincipalAssignment\n resourceGroupName: ${example.name}\n clusterName: ${exampleCluster.name}\n databaseName: ${exampleDatabase.name}\n tenantId: ${current.tenantId}\n principalId: ${current.clientId}\n principalType: App\n role: Viewer\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKusto Database Principal Assignment can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:kusto/databasePrincipalAssignment:DatabasePrincipalAssignment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Kusto/clusters/cluster1/databases/database1/principalAssignments/assignment1\n```\n\n", + "description": "Manages a Kusto (also known as Azure Data Explorer) Database Principal Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"KustoRG\",\n location: \"West Europe\",\n});\nconst exampleCluster = new azure.kusto.Cluster(\"example\", {\n name: \"kustocluster\",\n location: example.location,\n resourceGroupName: example.name,\n sku: {\n name: \"Standard_D13_v2\",\n capacity: 2,\n },\n});\nconst exampleDatabase = new azure.kusto.Database(\"example\", {\n name: \"KustoDatabase\",\n resourceGroupName: example.name,\n location: example.location,\n clusterName: exampleCluster.name,\n hotCachePeriod: \"P7D\",\n softDeletePeriod: \"P31D\",\n});\nconst exampleDatabasePrincipalAssignment = new azure.kusto.DatabasePrincipalAssignment(\"example\", {\n name: \"KustoPrincipalAssignment\",\n resourceGroupName: example.name,\n clusterName: exampleCluster.name,\n databaseName: exampleDatabase.name,\n tenantId: current.then(current =\u003e current.tenantId),\n principalId: current.then(current =\u003e current.clientId),\n principalType: \"App\",\n role: \"Viewer\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"KustoRG\",\n location=\"West Europe\")\nexample_cluster = azure.kusto.Cluster(\"example\",\n name=\"kustocluster\",\n location=example.location,\n resource_group_name=example.name,\n sku={\n \"name\": \"Standard_D13_v2\",\n \"capacity\": 2,\n })\nexample_database = azure.kusto.Database(\"example\",\n name=\"KustoDatabase\",\n resource_group_name=example.name,\n location=example.location,\n cluster_name=example_cluster.name,\n hot_cache_period=\"P7D\",\n soft_delete_period=\"P31D\")\nexample_database_principal_assignment = azure.kusto.DatabasePrincipalAssignment(\"example\",\n name=\"KustoPrincipalAssignment\",\n resource_group_name=example.name,\n cluster_name=example_cluster.name,\n database_name=example_database.name,\n tenant_id=current.tenant_id,\n principal_id=current.client_id,\n principal_type=\"App\",\n role=\"Viewer\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"KustoRG\",\n Location = \"West Europe\",\n });\n\n var exampleCluster = new Azure.Kusto.Cluster(\"example\", new()\n {\n Name = \"kustocluster\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = new Azure.Kusto.Inputs.ClusterSkuArgs\n {\n Name = \"Standard_D13_v2\",\n Capacity = 2,\n },\n });\n\n var exampleDatabase = new Azure.Kusto.Database(\"example\", new()\n {\n Name = \"KustoDatabase\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n ClusterName = exampleCluster.Name,\n HotCachePeriod = \"P7D\",\n SoftDeletePeriod = \"P31D\",\n });\n\n var exampleDatabasePrincipalAssignment = new Azure.Kusto.DatabasePrincipalAssignment(\"example\", new()\n {\n Name = \"KustoPrincipalAssignment\",\n ResourceGroupName = example.Name,\n ClusterName = exampleCluster.Name,\n DatabaseName = exampleDatabase.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n PrincipalType = \"App\",\n Role = \"Viewer\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/kusto\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"KustoRG\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := kusto.NewCluster(ctx, \"example\", \u0026kusto.ClusterArgs{\n\t\t\tName: pulumi.String(\"kustocluster\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: \u0026kusto.ClusterSkuArgs{\n\t\t\t\tName: pulumi.String(\"Standard_D13_v2\"),\n\t\t\t\tCapacity: pulumi.Int(2),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDatabase, err := kusto.NewDatabase(ctx, \"example\", \u0026kusto.DatabaseArgs{\n\t\t\tName: pulumi.String(\"KustoDatabase\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tClusterName: exampleCluster.Name,\n\t\t\tHotCachePeriod: pulumi.String(\"P7D\"),\n\t\t\tSoftDeletePeriod: pulumi.String(\"P31D\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kusto.NewDatabasePrincipalAssignment(ctx, \"example\", \u0026kusto.DatabasePrincipalAssignmentArgs{\n\t\t\tName: pulumi.String(\"KustoPrincipalAssignment\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tClusterName: exampleCluster.Name,\n\t\t\tDatabaseName: exampleDatabase.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tPrincipalId: pulumi.String(current.ClientId),\n\t\t\tPrincipalType: pulumi.String(\"App\"),\n\t\t\tRole: pulumi.String(\"Viewer\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.kusto.Cluster;\nimport com.pulumi.azure.kusto.ClusterArgs;\nimport com.pulumi.azure.kusto.inputs.ClusterSkuArgs;\nimport com.pulumi.azure.kusto.Database;\nimport com.pulumi.azure.kusto.DatabaseArgs;\nimport com.pulumi.azure.kusto.DatabasePrincipalAssignment;\nimport com.pulumi.azure.kusto.DatabasePrincipalAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"KustoRG\")\n .location(\"West Europe\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"kustocluster\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(ClusterSkuArgs.builder()\n .name(\"Standard_D13_v2\")\n .capacity(2)\n .build())\n .build());\n\n var exampleDatabase = new Database(\"exampleDatabase\", DatabaseArgs.builder()\n .name(\"KustoDatabase\")\n .resourceGroupName(example.name())\n .location(example.location())\n .clusterName(exampleCluster.name())\n .hotCachePeriod(\"P7D\")\n .softDeletePeriod(\"P31D\")\n .build());\n\n var exampleDatabasePrincipalAssignment = new DatabasePrincipalAssignment(\"exampleDatabasePrincipalAssignment\", DatabasePrincipalAssignmentArgs.builder()\n .name(\"KustoPrincipalAssignment\")\n .resourceGroupName(example.name())\n .clusterName(exampleCluster.name())\n .databaseName(exampleDatabase.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()))\n .principalType(\"App\")\n .role(\"Viewer\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: KustoRG\n location: West Europe\n exampleCluster:\n type: azure:kusto:Cluster\n name: example\n properties:\n name: kustocluster\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku:\n name: Standard_D13_v2\n capacity: 2\n exampleDatabase:\n type: azure:kusto:Database\n name: example\n properties:\n name: KustoDatabase\n resourceGroupName: ${example.name}\n location: ${example.location}\n clusterName: ${exampleCluster.name}\n hotCachePeriod: P7D\n softDeletePeriod: P31D\n exampleDatabasePrincipalAssignment:\n type: azure:kusto:DatabasePrincipalAssignment\n name: example\n properties:\n name: KustoPrincipalAssignment\n resourceGroupName: ${example.name}\n clusterName: ${exampleCluster.name}\n databaseName: ${exampleDatabase.name}\n tenantId: ${current.tenantId}\n principalId: ${current.clientId}\n principalType: App\n role: Viewer\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nKusto Database Principal Assignment can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:kusto/databasePrincipalAssignment:DatabasePrincipalAssignment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Kusto/clusters/cluster1/databases/database1/principalAssignments/assignment1\n```\n\n", "properties": { "clusterName": { "type": "string", @@ -199285,7 +199285,7 @@ } }, "azure:lighthouse/assignment:Assignment": { - "description": "Manages a [Lighthouse](https://docs.microsoft.com/azure/lighthouse) Assignment to a subscription, or to a resource group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = new azure.lighthouse.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n lighthouseDefinitionId: \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.lighthouse.Assignment(\"example\",\n scope=primary.id,\n lighthouse_definition_id=\"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Lighthouse.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n LighthouseDefinitionId = \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/lighthouse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lighthouse.NewAssignment(ctx, \"example\", \u0026lighthouse.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tLighthouseDefinitionId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.lighthouse.Assignment;\nimport com.pulumi.azure.lighthouse.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var example = new Assignment(\"example\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .lighthouseDefinitionId(\"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:lighthouse:Assignment\n properties:\n scope: ${primary.id}\n lighthouseDefinitionId: /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLighthouse Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:lighthouse/assignment:Assignment example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationAssignments/00000000-0000-0000-0000-000000000000\n```\n\n", + "description": "Manages a [Lighthouse](https://docs.microsoft.com/azure/lighthouse) Assignment to a subscription, or to a resource group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = new azure.lighthouse.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n lighthouseDefinitionId: \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.lighthouse.Assignment(\"example\",\n scope=primary.id,\n lighthouse_definition_id=\"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Lighthouse.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n LighthouseDefinitionId = \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/lighthouse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lighthouse.NewAssignment(ctx, \"example\", \u0026lighthouse.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tLighthouseDefinitionId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.lighthouse.Assignment;\nimport com.pulumi.azure.lighthouse.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var example = new Assignment(\"example\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .lighthouseDefinitionId(\"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:lighthouse:Assignment\n properties:\n scope: ${primary.id}\n lighthouseDefinitionId: /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationDefinitions/00000000-0000-0000-0000-000000000000\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLighthouse Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:lighthouse/assignment:Assignment example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ManagedServices/registrationAssignments/00000000-0000-0000-0000-000000000000\n```\n\n", "properties": { "lighthouseDefinitionId": { "type": "string", @@ -199750,7 +199750,7 @@ } }, "azure:loganalytics/clusterCustomerManagedKey:ClusterCustomerManagedKey": { - "description": "Manages a Log Analytics Cluster Customer Managed Key.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleCluster = new azure.loganalytics.Cluster(\"example\", {\n name: \"example-cluster\",\n resourceGroupName: example.name,\n location: example.location,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"keyvaultkeyexample\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Set\"],\n },\n {\n tenantId: exampleCluster.identity.apply(identity =\u003e identity.tenantId),\n objectId: exampleCluster.identity.apply(identity =\u003e identity.principalId),\n keyPermissions: [\n \"Get\",\n \"Unwrapkey\",\n \"Wrapkey\",\n ],\n },\n ],\n tags: {\n environment: \"Production\",\n },\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"generated-certificate\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n});\nconst exampleClusterCustomerManagedKey = new azure.loganalytics.ClusterCustomerManagedKey(\"example\", {\n logAnalyticsClusterId: exampleCluster.id,\n keyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_cluster = azure.loganalytics.Cluster(\"example\",\n name=\"example-cluster\",\n resource_group_name=example.name,\n location=example.location,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"keyvaultkeyexample\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n \"GetRotationPolicy\",\n ],\n \"secret_permissions\": [\"Set\"],\n },\n {\n \"tenant_id\": example_cluster.identity.tenant_id,\n \"object_id\": example_cluster.identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"Unwrapkey\",\n \"Wrapkey\",\n ],\n },\n ],\n tags={\n \"environment\": \"Production\",\n })\nexample_key = azure.keyvault.Key(\"example\",\n name=\"generated-certificate\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ])\nexample_cluster_customer_managed_key = azure.loganalytics.ClusterCustomerManagedKey(\"example\",\n log_analytics_cluster_id=example_cluster.id,\n key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleCluster = new Azure.LogAnalytics.Cluster(\"example\", new()\n {\n Name = \"example-cluster\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Identity = new Azure.LogAnalytics.Inputs.ClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"keyvaultkeyexample\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleCluster.Identity.Apply(identity =\u003e identity.TenantId),\n ObjectId = exampleCluster.Identity.Apply(identity =\u003e identity.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Unwrapkey\",\n \"Wrapkey\",\n },\n },\n },\n Tags = \n {\n { \"environment\", \"Production\" },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"generated-certificate\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n });\n\n var exampleClusterCustomerManagedKey = new Azure.LogAnalytics.ClusterCustomerManagedKey(\"example\", new()\n {\n LogAnalyticsClusterId = exampleCluster.Id,\n KeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/loganalytics\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := loganalytics.NewCluster(ctx, \"example\", \u0026loganalytics.ClusterArgs{\n\t\t\tName: pulumi.String(\"example-cluster\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tIdentity: \u0026loganalytics.ClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"keyvaultkeyexample\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleCluster.Identity.ApplyT(func(identity loganalytics.ClusterIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleCluster.Identity.ApplyT(func(identity loganalytics.ClusterIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Unwrapkey\"),\n\t\t\t\t\t\tpulumi.String(\"Wrapkey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"generated-certificate\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = loganalytics.NewClusterCustomerManagedKey(ctx, \"example\", \u0026loganalytics.ClusterCustomerManagedKeyArgs{\n\t\t\tLogAnalyticsClusterId: exampleCluster.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.loganalytics.Cluster;\nimport com.pulumi.azure.loganalytics.ClusterArgs;\nimport com.pulumi.azure.loganalytics.inputs.ClusterIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.loganalytics.ClusterCustomerManagedKey;\nimport com.pulumi.azure.loganalytics.ClusterCustomerManagedKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"example-cluster\")\n .resourceGroupName(example.name())\n .location(example.location())\n .identity(ClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"keyvaultkeyexample\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Set\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleCluster.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleCluster.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"Unwrapkey\",\n \"Wrapkey\")\n .build())\n .tags(Map.of(\"environment\", \"Production\"))\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"generated-certificate\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build());\n\n var exampleClusterCustomerManagedKey = new ClusterCustomerManagedKey(\"exampleClusterCustomerManagedKey\", ClusterCustomerManagedKeyArgs.builder()\n .logAnalyticsClusterId(exampleCluster.id())\n .keyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleCluster:\n type: azure:loganalytics:Cluster\n name: example\n properties:\n name: example-cluster\n resourceGroupName: ${example.name}\n location: ${example.location}\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: keyvaultkeyexample\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - GetRotationPolicy\n secretPermissions:\n - Set\n - tenantId: ${exampleCluster.identity.tenantId}\n objectId: ${exampleCluster.identity.principalId}\n keyPermissions:\n - Get\n - Unwrapkey\n - Wrapkey\n tags:\n environment: Production\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: generated-certificate\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n exampleClusterCustomerManagedKey:\n type: azure:loganalytics:ClusterCustomerManagedKey\n name: example\n properties:\n logAnalyticsClusterId: ${exampleCluster.id}\n keyVaultKeyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLog Analytics Cluster Customer Managed Keys can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:loganalytics/clusterCustomerManagedKey:ClusterCustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.OperationalInsights/clusters/cluster1\n```\n\n", + "description": "Manages a Log Analytics Cluster Customer Managed Key.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleCluster = new azure.loganalytics.Cluster(\"example\", {\n name: \"example-cluster\",\n resourceGroupName: example.name,\n location: example.location,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"keyvaultkeyexample\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Set\"],\n },\n {\n tenantId: exampleCluster.identity.apply(identity =\u003e identity.tenantId),\n objectId: exampleCluster.identity.apply(identity =\u003e identity.principalId),\n keyPermissions: [\n \"Get\",\n \"Unwrapkey\",\n \"Wrapkey\",\n ],\n },\n ],\n tags: {\n environment: \"Production\",\n },\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"generated-certificate\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n});\nconst exampleClusterCustomerManagedKey = new azure.loganalytics.ClusterCustomerManagedKey(\"example\", {\n logAnalyticsClusterId: exampleCluster.id,\n keyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_cluster = azure.loganalytics.Cluster(\"example\",\n name=\"example-cluster\",\n resource_group_name=example.name,\n location=example.location,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"keyvaultkeyexample\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Create\",\n \"Get\",\n \"GetRotationPolicy\",\n ],\n \"secret_permissions\": [\"Set\"],\n },\n {\n \"tenant_id\": example_cluster.identity.tenant_id,\n \"object_id\": example_cluster.identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"Unwrapkey\",\n \"Wrapkey\",\n ],\n },\n ],\n tags={\n \"environment\": \"Production\",\n })\nexample_key = azure.keyvault.Key(\"example\",\n name=\"generated-certificate\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ])\nexample_cluster_customer_managed_key = azure.loganalytics.ClusterCustomerManagedKey(\"example\",\n log_analytics_cluster_id=example_cluster.id,\n key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleCluster = new Azure.LogAnalytics.Cluster(\"example\", new()\n {\n Name = \"example-cluster\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Identity = new Azure.LogAnalytics.Inputs.ClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"keyvaultkeyexample\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleCluster.Identity.Apply(identity =\u003e identity.TenantId),\n ObjectId = exampleCluster.Identity.Apply(identity =\u003e identity.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Unwrapkey\",\n \"Wrapkey\",\n },\n },\n },\n Tags = \n {\n { \"environment\", \"Production\" },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"generated-certificate\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n });\n\n var exampleClusterCustomerManagedKey = new Azure.LogAnalytics.ClusterCustomerManagedKey(\"example\", new()\n {\n LogAnalyticsClusterId = exampleCluster.Id,\n KeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/loganalytics\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := loganalytics.NewCluster(ctx, \"example\", \u0026loganalytics.ClusterArgs{\n\t\t\tName: pulumi.String(\"example-cluster\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tIdentity: \u0026loganalytics.ClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"keyvaultkeyexample\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleCluster.Identity.ApplyT(func(identity loganalytics.ClusterIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleCluster.Identity.ApplyT(func(identity loganalytics.ClusterIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Unwrapkey\"),\n\t\t\t\t\t\tpulumi.String(\"Wrapkey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"generated-certificate\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = loganalytics.NewClusterCustomerManagedKey(ctx, \"example\", \u0026loganalytics.ClusterCustomerManagedKeyArgs{\n\t\t\tLogAnalyticsClusterId: exampleCluster.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.loganalytics.Cluster;\nimport com.pulumi.azure.loganalytics.ClusterArgs;\nimport com.pulumi.azure.loganalytics.inputs.ClusterIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.loganalytics.ClusterCustomerManagedKey;\nimport com.pulumi.azure.loganalytics.ClusterCustomerManagedKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"example-cluster\")\n .resourceGroupName(example.name())\n .location(example.location())\n .identity(ClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"keyvaultkeyexample\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Set\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleCluster.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleCluster.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"Unwrapkey\",\n \"Wrapkey\")\n .build())\n .tags(Map.of(\"environment\", \"Production\"))\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"generated-certificate\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build());\n\n var exampleClusterCustomerManagedKey = new ClusterCustomerManagedKey(\"exampleClusterCustomerManagedKey\", ClusterCustomerManagedKeyArgs.builder()\n .logAnalyticsClusterId(exampleCluster.id())\n .keyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleCluster:\n type: azure:loganalytics:Cluster\n name: example\n properties:\n name: example-cluster\n resourceGroupName: ${example.name}\n location: ${example.location}\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: keyvaultkeyexample\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - GetRotationPolicy\n secretPermissions:\n - Set\n - tenantId: ${exampleCluster.identity.tenantId}\n objectId: ${exampleCluster.identity.principalId}\n keyPermissions:\n - Get\n - Unwrapkey\n - Wrapkey\n tags:\n environment: Production\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: generated-certificate\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n exampleClusterCustomerManagedKey:\n type: azure:loganalytics:ClusterCustomerManagedKey\n name: example\n properties:\n logAnalyticsClusterId: ${exampleCluster.id}\n keyVaultKeyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLog Analytics Cluster Customer Managed Keys can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:loganalytics/clusterCustomerManagedKey:ClusterCustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.OperationalInsights/clusters/cluster1\n```\n\n", "properties": { "keyVaultKeyId": { "type": "string", @@ -202930,7 +202930,7 @@ } }, "azure:machinelearning/computeCluster:ComputeCluster": { - "description": "Manages a Machine Learning Compute Cluster.\n**NOTE:** At this point in time the resource cannot be updated (not supported by the backend Azure Go SDK). Therefore it can only be created and deleted, not updated. At the moment, there is also no possibility to specify ssh User Account Credentials to ssh into the compute cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"west europe\",\n tags: {\n stage: \"example\",\n },\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-kv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-mlw\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.1.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.1.0.0/24\"],\n});\nconst test = new azure.machinelearning.ComputeCluster(\"test\", {\n name: \"example\",\n location: example.location,\n vmPriority: \"LowPriority\",\n vmSize: \"Standard_DS2_v2\",\n machineLearningWorkspaceId: exampleWorkspace.id,\n subnetResourceId: exampleSubnet.id,\n scaleSettings: {\n minNodeCount: 0,\n maxNodeCount: 1,\n scaleDownNodesAfterIdleDuration: \"PT30S\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"west europe\",\n tags={\n \"stage\": \"example\",\n })\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-kv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-mlw\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.1.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.1.0.0/24\"])\ntest = azure.machinelearning.ComputeCluster(\"test\",\n name=\"example\",\n location=example.location,\n vm_priority=\"LowPriority\",\n vm_size=\"Standard_DS2_v2\",\n machine_learning_workspace_id=example_workspace.id,\n subnet_resource_id=example_subnet.id,\n scale_settings={\n \"min_node_count\": 0,\n \"max_node_count\": 1,\n \"scale_down_nodes_after_idle_duration\": \"PT30S\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"west europe\",\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-kv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-mlw\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.1.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.1.0.0/24\",\n },\n });\n\n var test = new Azure.MachineLearning.ComputeCluster(\"test\", new()\n {\n Name = \"example\",\n Location = example.Location,\n VmPriority = \"LowPriority\",\n VmSize = \"Standard_DS2_v2\",\n MachineLearningWorkspaceId = exampleWorkspace.Id,\n SubnetResourceId = exampleSubnet.Id,\n ScaleSettings = new Azure.MachineLearning.Inputs.ComputeClusterScaleSettingsArgs\n {\n MinNodeCount = 0,\n MaxNodeCount = 1,\n ScaleDownNodesAfterIdleDuration = \"PT30S\",\n },\n Identity = new Azure.MachineLearning.Inputs.ComputeClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"west europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-kv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-mlw\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewComputeCluster(ctx, \"test\", \u0026machinelearning.ComputeClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tVmPriority: pulumi.String(\"LowPriority\"),\n\t\t\tVmSize: pulumi.String(\"Standard_DS2_v2\"),\n\t\t\tMachineLearningWorkspaceId: exampleWorkspace.ID(),\n\t\t\tSubnetResourceId: exampleSubnet.ID(),\n\t\t\tScaleSettings: \u0026machinelearning.ComputeClusterScaleSettingsArgs{\n\t\t\t\tMinNodeCount: pulumi.Int(0),\n\t\t\t\tMaxNodeCount: pulumi.Int(1),\n\t\t\t\tScaleDownNodesAfterIdleDuration: pulumi.String(\"PT30S\"),\n\t\t\t},\n\t\t\tIdentity: \u0026machinelearning.ComputeClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.machinelearning.ComputeCluster;\nimport com.pulumi.azure.machinelearning.ComputeClusterArgs;\nimport com.pulumi.azure.machinelearning.inputs.ComputeClusterScaleSettingsArgs;\nimport com.pulumi.azure.machinelearning.inputs.ComputeClusterIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"west europe\")\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-kv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-mlw\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.1.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.1.0.0/24\")\n .build());\n\n var test = new ComputeCluster(\"test\", ComputeClusterArgs.builder()\n .name(\"example\")\n .location(example.location())\n .vmPriority(\"LowPriority\")\n .vmSize(\"Standard_DS2_v2\")\n .machineLearningWorkspaceId(exampleWorkspace.id())\n .subnetResourceId(exampleSubnet.id())\n .scaleSettings(ComputeClusterScaleSettingsArgs.builder()\n .minNodeCount(0)\n .maxNodeCount(1)\n .scaleDownNodesAfterIdleDuration(\"PT30S\")\n .build())\n .identity(ComputeClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: west europe\n tags:\n stage: example\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-kv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: LRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-mlw\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.1.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.1.0.0/24\n test:\n type: azure:machinelearning:ComputeCluster\n properties:\n name: example\n location: ${example.location}\n vmPriority: LowPriority\n vmSize: Standard_DS2_v2\n machineLearningWorkspaceId: ${exampleWorkspace.id}\n subnetResourceId: ${exampleSubnet.id}\n scaleSettings:\n minNodeCount: 0\n maxNodeCount: 1\n scaleDownNodesAfterIdleDuration: PT30S\n identity:\n type: SystemAssigned\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Compute Clusters can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/computeCluster:ComputeCluster example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.MachineLearningServices/workspaces/workspace1/computes/cluster1\n```\n\n", + "description": "Manages a Machine Learning Compute Cluster.\n**NOTE:** At this point in time the resource cannot be updated (not supported by the backend Azure Go SDK). Therefore it can only be created and deleted, not updated. At the moment, there is also no possibility to specify ssh User Account Credentials to ssh into the compute cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"west europe\",\n tags: {\n stage: \"example\",\n },\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-kv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-mlw\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.1.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.1.0.0/24\"],\n});\nconst test = new azure.machinelearning.ComputeCluster(\"test\", {\n name: \"example\",\n location: example.location,\n vmPriority: \"LowPriority\",\n vmSize: \"Standard_DS2_v2\",\n machineLearningWorkspaceId: exampleWorkspace.id,\n subnetResourceId: exampleSubnet.id,\n scaleSettings: {\n minNodeCount: 0,\n maxNodeCount: 1,\n scaleDownNodesAfterIdleDuration: \"PT30S\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"west europe\",\n tags={\n \"stage\": \"example\",\n })\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-kv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-mlw\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.1.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.1.0.0/24\"])\ntest = azure.machinelearning.ComputeCluster(\"test\",\n name=\"example\",\n location=example.location,\n vm_priority=\"LowPriority\",\n vm_size=\"Standard_DS2_v2\",\n machine_learning_workspace_id=example_workspace.id,\n subnet_resource_id=example_subnet.id,\n scale_settings={\n \"min_node_count\": 0,\n \"max_node_count\": 1,\n \"scale_down_nodes_after_idle_duration\": \"PT30S\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"west europe\",\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-kv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-mlw\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.1.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.1.0.0/24\",\n },\n });\n\n var test = new Azure.MachineLearning.ComputeCluster(\"test\", new()\n {\n Name = \"example\",\n Location = example.Location,\n VmPriority = \"LowPriority\",\n VmSize = \"Standard_DS2_v2\",\n MachineLearningWorkspaceId = exampleWorkspace.Id,\n SubnetResourceId = exampleSubnet.Id,\n ScaleSettings = new Azure.MachineLearning.Inputs.ComputeClusterScaleSettingsArgs\n {\n MinNodeCount = 0,\n MaxNodeCount = 1,\n ScaleDownNodesAfterIdleDuration = \"PT30S\",\n },\n Identity = new Azure.MachineLearning.Inputs.ComputeClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"west europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-kv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-mlw\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewComputeCluster(ctx, \"test\", \u0026machinelearning.ComputeClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tVmPriority: pulumi.String(\"LowPriority\"),\n\t\t\tVmSize: pulumi.String(\"Standard_DS2_v2\"),\n\t\t\tMachineLearningWorkspaceId: exampleWorkspace.ID(),\n\t\t\tSubnetResourceId: exampleSubnet.ID(),\n\t\t\tScaleSettings: \u0026machinelearning.ComputeClusterScaleSettingsArgs{\n\t\t\t\tMinNodeCount: pulumi.Int(0),\n\t\t\t\tMaxNodeCount: pulumi.Int(1),\n\t\t\t\tScaleDownNodesAfterIdleDuration: pulumi.String(\"PT30S\"),\n\t\t\t},\n\t\t\tIdentity: \u0026machinelearning.ComputeClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.machinelearning.ComputeCluster;\nimport com.pulumi.azure.machinelearning.ComputeClusterArgs;\nimport com.pulumi.azure.machinelearning.inputs.ComputeClusterScaleSettingsArgs;\nimport com.pulumi.azure.machinelearning.inputs.ComputeClusterIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"west europe\")\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-kv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-mlw\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.1.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.1.0.0/24\")\n .build());\n\n var test = new ComputeCluster(\"test\", ComputeClusterArgs.builder()\n .name(\"example\")\n .location(example.location())\n .vmPriority(\"LowPriority\")\n .vmSize(\"Standard_DS2_v2\")\n .machineLearningWorkspaceId(exampleWorkspace.id())\n .subnetResourceId(exampleSubnet.id())\n .scaleSettings(ComputeClusterScaleSettingsArgs.builder()\n .minNodeCount(0)\n .maxNodeCount(1)\n .scaleDownNodesAfterIdleDuration(\"PT30S\")\n .build())\n .identity(ComputeClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: west europe\n tags:\n stage: example\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-kv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: LRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-mlw\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.1.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.1.0.0/24\n test:\n type: azure:machinelearning:ComputeCluster\n properties:\n name: example\n location: ${example.location}\n vmPriority: LowPriority\n vmSize: Standard_DS2_v2\n machineLearningWorkspaceId: ${exampleWorkspace.id}\n subnetResourceId: ${exampleSubnet.id}\n scaleSettings:\n minNodeCount: 0\n maxNodeCount: 1\n scaleDownNodesAfterIdleDuration: PT30S\n identity:\n type: SystemAssigned\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Compute Clusters can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/computeCluster:ComputeCluster example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.MachineLearningServices/workspaces/workspace1/computes/cluster1\n```\n\n", "properties": { "description": { "type": "string", @@ -203160,7 +203160,7 @@ } }, "azure:machinelearning/computeInstance:ComputeInstance": { - "description": "Manages a Machine Learning Compute Instance.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"west europe\",\n tags: {\n stage: \"example\",\n },\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-kv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-mlw\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.1.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.1.0.0/24\"],\n});\nconst config = new pulumi.Config();\nconst sshKey = config.get(\"sshKey\") || \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\";\nconst exampleComputeInstance = new azure.machinelearning.ComputeInstance(\"example\", {\n name: \"example\",\n machineLearningWorkspaceId: exampleWorkspace.id,\n virtualMachineSize: \"STANDARD_DS2_V2\",\n authorizationType: \"personal\",\n ssh: {\n publicKey: sshKey,\n },\n subnetResourceId: exampleSubnet.id,\n description: \"foo\",\n tags: {\n foo: \"bar\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"west europe\",\n tags={\n \"stage\": \"example\",\n })\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-kv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-mlw\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.1.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.1.0.0/24\"])\nconfig = pulumi.Config()\nssh_key = config.get(\"sshKey\")\nif ssh_key is None:\n ssh_key = \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\"\nexample_compute_instance = azure.machinelearning.ComputeInstance(\"example\",\n name=\"example\",\n machine_learning_workspace_id=example_workspace.id,\n virtual_machine_size=\"STANDARD_DS2_V2\",\n authorization_type=\"personal\",\n ssh={\n \"public_key\": ssh_key,\n },\n subnet_resource_id=example_subnet.id,\n description=\"foo\",\n tags={\n \"foo\": \"bar\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"west europe\",\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-kv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-mlw\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.1.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.1.0.0/24\",\n },\n });\n\n var config = new Config();\n var sshKey = config.Get(\"sshKey\") ?? \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\";\n var exampleComputeInstance = new Azure.MachineLearning.ComputeInstance(\"example\", new()\n {\n Name = \"example\",\n MachineLearningWorkspaceId = exampleWorkspace.Id,\n VirtualMachineSize = \"STANDARD_DS2_V2\",\n AuthorizationType = \"personal\",\n Ssh = new Azure.MachineLearning.Inputs.ComputeInstanceSshArgs\n {\n PublicKey = sshKey,\n },\n SubnetResourceId = exampleSubnet.Id,\n Description = \"foo\",\n Tags = \n {\n { \"foo\", \"bar\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"west europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-kv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-mlw\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcfg := config.New(ctx, \"\")\n\t\tsshKey := \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\"\n\t\tif param := cfg.Get(\"sshKey\"); param != \"\" {\n\t\t\tsshKey = param\n\t\t}\n\t\t_, err = machinelearning.NewComputeInstance(ctx, \"example\", \u0026machinelearning.ComputeInstanceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tMachineLearningWorkspaceId: exampleWorkspace.ID(),\n\t\t\tVirtualMachineSize: pulumi.String(\"STANDARD_DS2_V2\"),\n\t\t\tAuthorizationType: pulumi.String(\"personal\"),\n\t\t\tSsh: \u0026machinelearning.ComputeInstanceSshArgs{\n\t\t\t\tPublicKey: pulumi.String(sshKey),\n\t\t\t},\n\t\t\tSubnetResourceId: exampleSubnet.ID(),\n\t\t\tDescription: pulumi.String(\"foo\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"foo\": pulumi.String(\"bar\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.machinelearning.ComputeInstance;\nimport com.pulumi.azure.machinelearning.ComputeInstanceArgs;\nimport com.pulumi.azure.machinelearning.inputs.ComputeInstanceSshArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"west europe\")\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-kv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-mlw\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.1.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.1.0.0/24\")\n .build());\n\n final var sshKey = config.get(\"sshKey\").orElse(\"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\");\n var exampleComputeInstance = new ComputeInstance(\"exampleComputeInstance\", ComputeInstanceArgs.builder()\n .name(\"example\")\n .machineLearningWorkspaceId(exampleWorkspace.id())\n .virtualMachineSize(\"STANDARD_DS2_V2\")\n .authorizationType(\"personal\")\n .ssh(ComputeInstanceSshArgs.builder()\n .publicKey(sshKey)\n .build())\n .subnetResourceId(exampleSubnet.id())\n .description(\"foo\")\n .tags(Map.of(\"foo\", \"bar\"))\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n sshKey:\n type: string\n default: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: west europe\n tags:\n stage: example\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-kv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: LRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-mlw\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.1.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.1.0.0/24\n exampleComputeInstance:\n type: azure:machinelearning:ComputeInstance\n name: example\n properties:\n name: example\n machineLearningWorkspaceId: ${exampleWorkspace.id}\n virtualMachineSize: STANDARD_DS2_V2\n authorizationType: personal\n ssh:\n publicKey: ${sshKey}\n subnetResourceId: ${exampleSubnet.id}\n description: foo\n tags:\n foo: bar\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Compute Instances can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/computeInstance:ComputeInstance example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.MachineLearningServices/workspaces/workspace1/computes/compute1\n```\n\n", + "description": "Manages a Machine Learning Compute Instance.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"west europe\",\n tags: {\n stage: \"example\",\n },\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-kv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-mlw\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.1.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.1.0.0/24\"],\n});\nconst config = new pulumi.Config();\nconst sshKey = config.get(\"sshKey\") || \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\";\nconst exampleComputeInstance = new azure.machinelearning.ComputeInstance(\"example\", {\n name: \"example\",\n machineLearningWorkspaceId: exampleWorkspace.id,\n virtualMachineSize: \"STANDARD_DS2_V2\",\n authorizationType: \"personal\",\n ssh: {\n publicKey: sshKey,\n },\n subnetResourceId: exampleSubnet.id,\n description: \"foo\",\n tags: {\n foo: \"bar\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"west europe\",\n tags={\n \"stage\": \"example\",\n })\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-kv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-mlw\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.1.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.1.0.0/24\"])\nconfig = pulumi.Config()\nssh_key = config.get(\"sshKey\")\nif ssh_key is None:\n ssh_key = \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\"\nexample_compute_instance = azure.machinelearning.ComputeInstance(\"example\",\n name=\"example\",\n machine_learning_workspace_id=example_workspace.id,\n virtual_machine_size=\"STANDARD_DS2_V2\",\n authorization_type=\"personal\",\n ssh={\n \"public_key\": ssh_key,\n },\n subnet_resource_id=example_subnet.id,\n description=\"foo\",\n tags={\n \"foo\": \"bar\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"west europe\",\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-kv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-mlw\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.1.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.1.0.0/24\",\n },\n });\n\n var config = new Config();\n var sshKey = config.Get(\"sshKey\") ?? \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\";\n var exampleComputeInstance = new Azure.MachineLearning.ComputeInstance(\"example\", new()\n {\n Name = \"example\",\n MachineLearningWorkspaceId = exampleWorkspace.Id,\n VirtualMachineSize = \"STANDARD_DS2_V2\",\n AuthorizationType = \"personal\",\n Ssh = new Azure.MachineLearning.Inputs.ComputeInstanceSshArgs\n {\n PublicKey = sshKey,\n },\n SubnetResourceId = exampleSubnet.Id,\n Description = \"foo\",\n Tags = \n {\n { \"foo\", \"bar\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"west europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-kv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-mlw\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcfg := config.New(ctx, \"\")\n\t\tsshKey := \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\"\n\t\tif param := cfg.Get(\"sshKey\"); param != \"\" {\n\t\t\tsshKey = param\n\t\t}\n\t\t_, err = machinelearning.NewComputeInstance(ctx, \"example\", \u0026machinelearning.ComputeInstanceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tMachineLearningWorkspaceId: exampleWorkspace.ID(),\n\t\t\tVirtualMachineSize: pulumi.String(\"STANDARD_DS2_V2\"),\n\t\t\tAuthorizationType: pulumi.String(\"personal\"),\n\t\t\tSsh: \u0026machinelearning.ComputeInstanceSshArgs{\n\t\t\t\tPublicKey: pulumi.String(sshKey),\n\t\t\t},\n\t\t\tSubnetResourceId: exampleSubnet.ID(),\n\t\t\tDescription: pulumi.String(\"foo\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"foo\": pulumi.String(\"bar\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.machinelearning.ComputeInstance;\nimport com.pulumi.azure.machinelearning.ComputeInstanceArgs;\nimport com.pulumi.azure.machinelearning.inputs.ComputeInstanceSshArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"west europe\")\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-kv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-mlw\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.1.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.1.0.0/24\")\n .build());\n\n final var sshKey = config.get(\"sshKey\").orElse(\"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\");\n var exampleComputeInstance = new ComputeInstance(\"exampleComputeInstance\", ComputeInstanceArgs.builder()\n .name(\"example\")\n .machineLearningWorkspaceId(exampleWorkspace.id())\n .virtualMachineSize(\"STANDARD_DS2_V2\")\n .authorizationType(\"personal\")\n .ssh(ComputeInstanceSshArgs.builder()\n .publicKey(sshKey)\n .build())\n .subnetResourceId(exampleSubnet.id())\n .description(\"foo\")\n .tags(Map.of(\"foo\", \"bar\"))\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n sshKey:\n type: string\n default: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: west europe\n tags:\n stage: example\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-kv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: LRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-mlw\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.1.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.1.0.0/24\n exampleComputeInstance:\n type: azure:machinelearning:ComputeInstance\n name: example\n properties:\n name: example\n machineLearningWorkspaceId: ${exampleWorkspace.id}\n virtualMachineSize: STANDARD_DS2_V2\n authorizationType: personal\n ssh:\n publicKey: ${sshKey}\n subnetResourceId: ${exampleSubnet.id}\n description: foo\n tags:\n foo: bar\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Compute Instances can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/computeInstance:ComputeInstance example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.MachineLearningServices/workspaces/workspace1/computes/compute1\n```\n\n", "properties": { "assignToUser": { "$ref": "#/types/azure:machinelearning/ComputeInstanceAssignToUser:ComputeInstanceAssignToUser", @@ -203359,7 +203359,7 @@ } }, "azure:machinelearning/datastoreBlobstorage:DatastoreBlobstorage": { - "description": "Manages a Machine Learning Blob Storage DataStore.\n\n## Example Usage\n\n### With Azure Blob\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"workspace-example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"workspaceexamplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"workspacestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleContainer = new azure.storage.Container(\"example\", {\n name: \"example-container\",\n storageAccountName: exampleAccount.name,\n containerAccessType: \"private\",\n});\nconst exampleDatastoreBlobstorage = new azure.machinelearning.DatastoreBlobstorage(\"example\", {\n name: \"example-datastore\",\n workspaceId: exampleWorkspace.id,\n storageContainerId: exampleContainer.resourceManagerId,\n accountKey: exampleAccount.primaryAccessKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"workspace-example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"workspaceexamplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_account = azure.storage.Account(\"example\",\n name=\"workspacestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_container = azure.storage.Container(\"example\",\n name=\"example-container\",\n storage_account_name=example_account.name,\n container_access_type=\"private\")\nexample_datastore_blobstorage = azure.machinelearning.DatastoreBlobstorage(\"example\",\n name=\"example-datastore\",\n workspace_id=example_workspace.id,\n storage_container_id=example_container.resource_manager_id,\n account_key=example_account.primary_access_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"workspace-example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"workspaceexamplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"workspacestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleContainer = new Azure.Storage.Container(\"example\", new()\n {\n Name = \"example-container\",\n StorageAccountName = exampleAccount.Name,\n ContainerAccessType = \"private\",\n });\n\n var exampleDatastoreBlobstorage = new Azure.MachineLearning.DatastoreBlobstorage(\"example\", new()\n {\n Name = \"example-datastore\",\n WorkspaceId = exampleWorkspace.Id,\n StorageContainerId = exampleContainer.ResourceManagerId,\n AccountKey = exampleAccount.PrimaryAccessKey,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"workspace-example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"workspacestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleContainer, err := storage.NewContainer(ctx, \"example\", \u0026storage.ContainerArgs{\n\t\t\tName: pulumi.String(\"example-container\"),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tContainerAccessType: pulumi.String(\"private\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewDatastoreBlobstorage(ctx, \"example\", \u0026machinelearning.DatastoreBlobstorageArgs{\n\t\t\tName: pulumi.String(\"example-datastore\"),\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tStorageContainerId: exampleContainer.ResourceManagerId,\n\t\t\tAccountKey: exampleAccount.PrimaryAccessKey,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.storage.Container;\nimport com.pulumi.azure.storage.ContainerArgs;\nimport com.pulumi.azure.machinelearning.DatastoreBlobstorage;\nimport com.pulumi.azure.machinelearning.DatastoreBlobstorageArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"workspace-example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"workspaceexamplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"workspacestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleContainer = new Container(\"exampleContainer\", ContainerArgs.builder()\n .name(\"example-container\")\n .storageAccountName(exampleAccount.name())\n .containerAccessType(\"private\")\n .build());\n\n var exampleDatastoreBlobstorage = new DatastoreBlobstorage(\"exampleDatastoreBlobstorage\", DatastoreBlobstorageArgs.builder()\n .name(\"example-datastore\")\n .workspaceId(exampleWorkspace.id())\n .storageContainerId(exampleContainer.resourceManagerId())\n .accountKey(exampleAccount.primaryAccessKey())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: workspace-example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: workspaceexamplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: workspacestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleContainer:\n type: azure:storage:Container\n name: example\n properties:\n name: example-container\n storageAccountName: ${exampleAccount.name}\n containerAccessType: private\n exampleDatastoreBlobstorage:\n type: azure:machinelearning:DatastoreBlobstorage\n name: example\n properties:\n name: example-datastore\n workspaceId: ${exampleWorkspace.id}\n storageContainerId: ${exampleContainer.resourceManagerId}\n accountKey: ${exampleAccount.primaryAccessKey}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning DataStores can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/datastoreBlobstorage:DatastoreBlobstorage example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.MachineLearningServices/workspaces/mlw1/dataStores/datastore1\n```\n\n", + "description": "Manages a Machine Learning Blob Storage DataStore.\n\n## Example Usage\n\n### With Azure Blob\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"workspace-example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"workspaceexamplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"workspacestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleContainer = new azure.storage.Container(\"example\", {\n name: \"example-container\",\n storageAccountName: exampleAccount.name,\n containerAccessType: \"private\",\n});\nconst exampleDatastoreBlobstorage = new azure.machinelearning.DatastoreBlobstorage(\"example\", {\n name: \"example-datastore\",\n workspaceId: exampleWorkspace.id,\n storageContainerId: exampleContainer.resourceManagerId,\n accountKey: exampleAccount.primaryAccessKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"workspace-example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"workspaceexamplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_account = azure.storage.Account(\"example\",\n name=\"workspacestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_container = azure.storage.Container(\"example\",\n name=\"example-container\",\n storage_account_name=example_account.name,\n container_access_type=\"private\")\nexample_datastore_blobstorage = azure.machinelearning.DatastoreBlobstorage(\"example\",\n name=\"example-datastore\",\n workspace_id=example_workspace.id,\n storage_container_id=example_container.resource_manager_id,\n account_key=example_account.primary_access_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"workspace-example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"workspaceexamplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"workspacestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleContainer = new Azure.Storage.Container(\"example\", new()\n {\n Name = \"example-container\",\n StorageAccountName = exampleAccount.Name,\n ContainerAccessType = \"private\",\n });\n\n var exampleDatastoreBlobstorage = new Azure.MachineLearning.DatastoreBlobstorage(\"example\", new()\n {\n Name = \"example-datastore\",\n WorkspaceId = exampleWorkspace.Id,\n StorageContainerId = exampleContainer.ResourceManagerId,\n AccountKey = exampleAccount.PrimaryAccessKey,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"workspace-example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"workspacestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleContainer, err := storage.NewContainer(ctx, \"example\", \u0026storage.ContainerArgs{\n\t\t\tName: pulumi.String(\"example-container\"),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tContainerAccessType: pulumi.String(\"private\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewDatastoreBlobstorage(ctx, \"example\", \u0026machinelearning.DatastoreBlobstorageArgs{\n\t\t\tName: pulumi.String(\"example-datastore\"),\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tStorageContainerId: exampleContainer.ResourceManagerId,\n\t\t\tAccountKey: exampleAccount.PrimaryAccessKey,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.storage.Container;\nimport com.pulumi.azure.storage.ContainerArgs;\nimport com.pulumi.azure.machinelearning.DatastoreBlobstorage;\nimport com.pulumi.azure.machinelearning.DatastoreBlobstorageArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"workspace-example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"workspaceexamplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"workspacestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleContainer = new Container(\"exampleContainer\", ContainerArgs.builder()\n .name(\"example-container\")\n .storageAccountName(exampleAccount.name())\n .containerAccessType(\"private\")\n .build());\n\n var exampleDatastoreBlobstorage = new DatastoreBlobstorage(\"exampleDatastoreBlobstorage\", DatastoreBlobstorageArgs.builder()\n .name(\"example-datastore\")\n .workspaceId(exampleWorkspace.id())\n .storageContainerId(exampleContainer.resourceManagerId())\n .accountKey(exampleAccount.primaryAccessKey())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: workspace-example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: workspaceexamplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: workspacestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleContainer:\n type: azure:storage:Container\n name: example\n properties:\n name: example-container\n storageAccountName: ${exampleAccount.name}\n containerAccessType: private\n exampleDatastoreBlobstorage:\n type: azure:machinelearning:DatastoreBlobstorage\n name: example\n properties:\n name: example-datastore\n workspaceId: ${exampleWorkspace.id}\n storageContainerId: ${exampleContainer.resourceManagerId}\n accountKey: ${exampleAccount.primaryAccessKey}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning DataStores can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/datastoreBlobstorage:DatastoreBlobstorage example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.MachineLearningServices/workspaces/mlw1/dataStores/datastore1\n```\n\n", "properties": { "accountKey": { "type": "string", @@ -203514,7 +203514,7 @@ } }, "azure:machinelearning/datastoreDatalakeGen2:DatastoreDatalakeGen2": { - "description": "Manages a Machine Learning Data Lake Gen2 DataStore.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"workspace-example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"workspaceexamplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"workspacestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleContainer = new azure.storage.Container(\"example\", {\n name: \"example-container\",\n storageAccountName: exampleAccount.name,\n containerAccessType: \"private\",\n});\nconst exampleDatastoreDatalakeGen2 = new azure.machinelearning.DatastoreDatalakeGen2(\"example\", {\n name: \"example-datastore\",\n workspaceId: exampleWorkspace.id,\n storageContainerId: exampleContainer.resourceManagerId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"workspace-example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"workspaceexamplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_account = azure.storage.Account(\"example\",\n name=\"workspacestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_container = azure.storage.Container(\"example\",\n name=\"example-container\",\n storage_account_name=example_account.name,\n container_access_type=\"private\")\nexample_datastore_datalake_gen2 = azure.machinelearning.DatastoreDatalakeGen2(\"example\",\n name=\"example-datastore\",\n workspace_id=example_workspace.id,\n storage_container_id=example_container.resource_manager_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"workspace-example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"workspaceexamplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"workspacestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleContainer = new Azure.Storage.Container(\"example\", new()\n {\n Name = \"example-container\",\n StorageAccountName = exampleAccount.Name,\n ContainerAccessType = \"private\",\n });\n\n var exampleDatastoreDatalakeGen2 = new Azure.MachineLearning.DatastoreDatalakeGen2(\"example\", new()\n {\n Name = \"example-datastore\",\n WorkspaceId = exampleWorkspace.Id,\n StorageContainerId = exampleContainer.ResourceManagerId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"workspace-example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"workspacestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleContainer, err := storage.NewContainer(ctx, \"example\", \u0026storage.ContainerArgs{\n\t\t\tName: pulumi.String(\"example-container\"),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tContainerAccessType: pulumi.String(\"private\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewDatastoreDatalakeGen2(ctx, \"example\", \u0026machinelearning.DatastoreDatalakeGen2Args{\n\t\t\tName: pulumi.String(\"example-datastore\"),\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tStorageContainerId: exampleContainer.ResourceManagerId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.storage.Container;\nimport com.pulumi.azure.storage.ContainerArgs;\nimport com.pulumi.azure.machinelearning.DatastoreDatalakeGen2;\nimport com.pulumi.azure.machinelearning.DatastoreDatalakeGen2Args;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"workspace-example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"workspaceexamplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"workspacestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleContainer = new Container(\"exampleContainer\", ContainerArgs.builder()\n .name(\"example-container\")\n .storageAccountName(exampleAccount.name())\n .containerAccessType(\"private\")\n .build());\n\n var exampleDatastoreDatalakeGen2 = new DatastoreDatalakeGen2(\"exampleDatastoreDatalakeGen2\", DatastoreDatalakeGen2Args.builder()\n .name(\"example-datastore\")\n .workspaceId(exampleWorkspace.id())\n .storageContainerId(exampleContainer.resourceManagerId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: workspace-example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: workspaceexamplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: workspacestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleContainer:\n type: azure:storage:Container\n name: example\n properties:\n name: example-container\n storageAccountName: ${exampleAccount.name}\n containerAccessType: private\n exampleDatastoreDatalakeGen2:\n type: azure:machinelearning:DatastoreDatalakeGen2\n name: example\n properties:\n name: example-datastore\n workspaceId: ${exampleWorkspace.id}\n storageContainerId: ${exampleContainer.resourceManagerId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning DataStores can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/datastoreDatalakeGen2:DatastoreDatalakeGen2 example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.MachineLearningServices/workspaces/mlw1/dataStores/datastore1\n```\n\n", + "description": "Manages a Machine Learning Data Lake Gen2 DataStore.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"workspace-example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"workspaceexamplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"workspacestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleContainer = new azure.storage.Container(\"example\", {\n name: \"example-container\",\n storageAccountName: exampleAccount.name,\n containerAccessType: \"private\",\n});\nconst exampleDatastoreDatalakeGen2 = new azure.machinelearning.DatastoreDatalakeGen2(\"example\", {\n name: \"example-datastore\",\n workspaceId: exampleWorkspace.id,\n storageContainerId: exampleContainer.resourceManagerId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"workspace-example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"workspaceexamplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_account = azure.storage.Account(\"example\",\n name=\"workspacestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_container = azure.storage.Container(\"example\",\n name=\"example-container\",\n storage_account_name=example_account.name,\n container_access_type=\"private\")\nexample_datastore_datalake_gen2 = azure.machinelearning.DatastoreDatalakeGen2(\"example\",\n name=\"example-datastore\",\n workspace_id=example_workspace.id,\n storage_container_id=example_container.resource_manager_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"workspace-example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"workspaceexamplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"workspacestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleContainer = new Azure.Storage.Container(\"example\", new()\n {\n Name = \"example-container\",\n StorageAccountName = exampleAccount.Name,\n ContainerAccessType = \"private\",\n });\n\n var exampleDatastoreDatalakeGen2 = new Azure.MachineLearning.DatastoreDatalakeGen2(\"example\", new()\n {\n Name = \"example-datastore\",\n WorkspaceId = exampleWorkspace.Id,\n StorageContainerId = exampleContainer.ResourceManagerId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"workspace-example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"workspacestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleContainer, err := storage.NewContainer(ctx, \"example\", \u0026storage.ContainerArgs{\n\t\t\tName: pulumi.String(\"example-container\"),\n\t\t\tStorageAccountName: exampleAccount.Name,\n\t\t\tContainerAccessType: pulumi.String(\"private\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewDatastoreDatalakeGen2(ctx, \"example\", \u0026machinelearning.DatastoreDatalakeGen2Args{\n\t\t\tName: pulumi.String(\"example-datastore\"),\n\t\t\tWorkspaceId: exampleWorkspace.ID(),\n\t\t\tStorageContainerId: exampleContainer.ResourceManagerId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.storage.Container;\nimport com.pulumi.azure.storage.ContainerArgs;\nimport com.pulumi.azure.machinelearning.DatastoreDatalakeGen2;\nimport com.pulumi.azure.machinelearning.DatastoreDatalakeGen2Args;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"workspace-example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"workspaceexamplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"workspacestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleContainer = new Container(\"exampleContainer\", ContainerArgs.builder()\n .name(\"example-container\")\n .storageAccountName(exampleAccount.name())\n .containerAccessType(\"private\")\n .build());\n\n var exampleDatastoreDatalakeGen2 = new DatastoreDatalakeGen2(\"exampleDatastoreDatalakeGen2\", DatastoreDatalakeGen2Args.builder()\n .name(\"example-datastore\")\n .workspaceId(exampleWorkspace.id())\n .storageContainerId(exampleContainer.resourceManagerId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: workspace-example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: workspaceexamplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: workspacestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleContainer:\n type: azure:storage:Container\n name: example\n properties:\n name: example-container\n storageAccountName: ${exampleAccount.name}\n containerAccessType: private\n exampleDatastoreDatalakeGen2:\n type: azure:machinelearning:DatastoreDatalakeGen2\n name: example\n properties:\n name: example-datastore\n workspaceId: ${exampleWorkspace.id}\n storageContainerId: ${exampleContainer.resourceManagerId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning DataStores can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/datastoreDatalakeGen2:DatastoreDatalakeGen2 example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.MachineLearningServices/workspaces/mlw1/dataStores/datastore1\n```\n\n", "properties": { "authorityUrl": { "type": "string", @@ -203839,7 +203839,7 @@ } }, "azure:machinelearning/inferenceCluster:InferenceCluster": { - "description": "Manages a Machine Learning Inference Cluster.\n\n\u003e **NOTE:** The Machine Learning Inference Cluster resource is used to attach an existing AKS cluster to the Machine Learning Workspace, it doesn't create the AKS cluster itself. Therefore it can only be created and deleted, not updated. Any change to the configuration will recreate the resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"west europe\",\n tags: {\n stage: \"example\",\n },\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-kv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-mlw\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.1.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.1.0.0/24\"],\n});\nconst exampleKubernetesCluster = new azure.containerservice.KubernetesCluster(\"example\", {\n name: \"example-aks\",\n location: example.location,\n resourceGroupName: example.name,\n dnsPrefixPrivateCluster: \"prefix\",\n defaultNodePool: {\n name: \"default\",\n nodeCount: 3,\n vmSize: \"Standard_D3_v2\",\n vnetSubnetId: exampleSubnet.id,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleInferenceCluster = new azure.machinelearning.InferenceCluster(\"example\", {\n name: \"example\",\n location: example.location,\n clusterPurpose: \"FastProd\",\n kubernetesClusterId: exampleKubernetesCluster.id,\n description: \"This is an example cluster used with Terraform\",\n machineLearningWorkspaceId: exampleWorkspace.id,\n tags: {\n stage: \"example\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"west europe\",\n tags={\n \"stage\": \"example\",\n })\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-kv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-mlw\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.1.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.1.0.0/24\"])\nexample_kubernetes_cluster = azure.containerservice.KubernetesCluster(\"example\",\n name=\"example-aks\",\n location=example.location,\n resource_group_name=example.name,\n dns_prefix_private_cluster=\"prefix\",\n default_node_pool={\n \"name\": \"default\",\n \"node_count\": 3,\n \"vm_size\": \"Standard_D3_v2\",\n \"vnet_subnet_id\": example_subnet.id,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_inference_cluster = azure.machinelearning.InferenceCluster(\"example\",\n name=\"example\",\n location=example.location,\n cluster_purpose=\"FastProd\",\n kubernetes_cluster_id=example_kubernetes_cluster.id,\n description=\"This is an example cluster used with Terraform\",\n machine_learning_workspace_id=example_workspace.id,\n tags={\n \"stage\": \"example\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"west europe\",\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-kv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-mlw\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.1.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.1.0.0/24\",\n },\n });\n\n var exampleKubernetesCluster = new Azure.ContainerService.KubernetesCluster(\"example\", new()\n {\n Name = \"example-aks\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n DnsPrefixPrivateCluster = \"prefix\",\n DefaultNodePool = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolArgs\n {\n Name = \"default\",\n NodeCount = 3,\n VmSize = \"Standard_D3_v2\",\n VnetSubnetId = exampleSubnet.Id,\n },\n Identity = new Azure.ContainerService.Inputs.KubernetesClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleInferenceCluster = new Azure.MachineLearning.InferenceCluster(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ClusterPurpose = \"FastProd\",\n KubernetesClusterId = exampleKubernetesCluster.Id,\n Description = \"This is an example cluster used with Terraform\",\n MachineLearningWorkspaceId = exampleWorkspace.Id,\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"west europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-kv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-mlw\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesCluster, err := containerservice.NewKubernetesCluster(ctx, \"example\", \u0026containerservice.KubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example-aks\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tDnsPrefixPrivateCluster: pulumi.String(\"prefix\"),\n\t\t\tDefaultNodePool: \u0026containerservice.KubernetesClusterDefaultNodePoolArgs{\n\t\t\t\tName: pulumi.String(\"default\"),\n\t\t\t\tNodeCount: pulumi.Int(3),\n\t\t\t\tVmSize: pulumi.String(\"Standard_D3_v2\"),\n\t\t\t\tVnetSubnetId: exampleSubnet.ID(),\n\t\t\t},\n\t\t\tIdentity: \u0026containerservice.KubernetesClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewInferenceCluster(ctx, \"example\", \u0026machinelearning.InferenceClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tClusterPurpose: pulumi.String(\"FastProd\"),\n\t\t\tKubernetesClusterId: exampleKubernetesCluster.ID(),\n\t\t\tDescription: pulumi.String(\"This is an example cluster used with Terraform\"),\n\t\t\tMachineLearningWorkspaceId: exampleWorkspace.ID(),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.containerservice.KubernetesCluster;\nimport com.pulumi.azure.containerservice.KubernetesClusterArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;\nimport com.pulumi.azure.machinelearning.InferenceCluster;\nimport com.pulumi.azure.machinelearning.InferenceClusterArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"west europe\")\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-kv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-mlw\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.1.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.1.0.0/24\")\n .build());\n\n var exampleKubernetesCluster = new KubernetesCluster(\"exampleKubernetesCluster\", KubernetesClusterArgs.builder()\n .name(\"example-aks\")\n .location(example.location())\n .resourceGroupName(example.name())\n .dnsPrefixPrivateCluster(\"prefix\")\n .defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()\n .name(\"default\")\n .nodeCount(3)\n .vmSize(\"Standard_D3_v2\")\n .vnetSubnetId(exampleSubnet.id())\n .build())\n .identity(KubernetesClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleInferenceCluster = new InferenceCluster(\"exampleInferenceCluster\", InferenceClusterArgs.builder()\n .name(\"example\")\n .location(example.location())\n .clusterPurpose(\"FastProd\")\n .kubernetesClusterId(exampleKubernetesCluster.id())\n .description(\"This is an example cluster used with Terraform\")\n .machineLearningWorkspaceId(exampleWorkspace.id())\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: west europe\n tags:\n stage: example\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-kv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: LRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-mlw\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.1.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.1.0.0/24\n exampleKubernetesCluster:\n type: azure:containerservice:KubernetesCluster\n name: example\n properties:\n name: example-aks\n location: ${example.location}\n resourceGroupName: ${example.name}\n dnsPrefixPrivateCluster: prefix\n defaultNodePool:\n name: default\n nodeCount: 3\n vmSize: Standard_D3_v2\n vnetSubnetId: ${exampleSubnet.id}\n identity:\n type: SystemAssigned\n exampleInferenceCluster:\n type: azure:machinelearning:InferenceCluster\n name: example\n properties:\n name: example\n location: ${example.location}\n clusterPurpose: FastProd\n kubernetesClusterId: ${exampleKubernetesCluster.id}\n description: This is an example cluster used with Terraform\n machineLearningWorkspaceId: ${exampleWorkspace.id}\n tags:\n stage: example\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Inference Clusters can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/inferenceCluster:InferenceCluster example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.MachineLearningServices/workspaces/workspace1/computes/cluster1\n```\n\n", + "description": "Manages a Machine Learning Inference Cluster.\n\n\u003e **NOTE:** The Machine Learning Inference Cluster resource is used to attach an existing AKS cluster to the Machine Learning Workspace, it doesn't create the AKS cluster itself. Therefore it can only be created and deleted, not updated. Any change to the configuration will recreate the resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"west europe\",\n tags: {\n stage: \"example\",\n },\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-kv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-mlw\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.1.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.1.0.0/24\"],\n});\nconst exampleKubernetesCluster = new azure.containerservice.KubernetesCluster(\"example\", {\n name: \"example-aks\",\n location: example.location,\n resourceGroupName: example.name,\n dnsPrefixPrivateCluster: \"prefix\",\n defaultNodePool: {\n name: \"default\",\n nodeCount: 3,\n vmSize: \"Standard_D3_v2\",\n vnetSubnetId: exampleSubnet.id,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleInferenceCluster = new azure.machinelearning.InferenceCluster(\"example\", {\n name: \"example\",\n location: example.location,\n clusterPurpose: \"FastProd\",\n kubernetesClusterId: exampleKubernetesCluster.id,\n description: \"This is an example cluster used with Terraform\",\n machineLearningWorkspaceId: exampleWorkspace.id,\n tags: {\n stage: \"example\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"west europe\",\n tags={\n \"stage\": \"example\",\n })\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-kv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-mlw\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.1.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.1.0.0/24\"])\nexample_kubernetes_cluster = azure.containerservice.KubernetesCluster(\"example\",\n name=\"example-aks\",\n location=example.location,\n resource_group_name=example.name,\n dns_prefix_private_cluster=\"prefix\",\n default_node_pool={\n \"name\": \"default\",\n \"node_count\": 3,\n \"vm_size\": \"Standard_D3_v2\",\n \"vnet_subnet_id\": example_subnet.id,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_inference_cluster = azure.machinelearning.InferenceCluster(\"example\",\n name=\"example\",\n location=example.location,\n cluster_purpose=\"FastProd\",\n kubernetes_cluster_id=example_kubernetes_cluster.id,\n description=\"This is an example cluster used with Terraform\",\n machine_learning_workspace_id=example_workspace.id,\n tags={\n \"stage\": \"example\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"west europe\",\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-kv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-mlw\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.1.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.1.0.0/24\",\n },\n });\n\n var exampleKubernetesCluster = new Azure.ContainerService.KubernetesCluster(\"example\", new()\n {\n Name = \"example-aks\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n DnsPrefixPrivateCluster = \"prefix\",\n DefaultNodePool = new Azure.ContainerService.Inputs.KubernetesClusterDefaultNodePoolArgs\n {\n Name = \"default\",\n NodeCount = 3,\n VmSize = \"Standard_D3_v2\",\n VnetSubnetId = exampleSubnet.Id,\n },\n Identity = new Azure.ContainerService.Inputs.KubernetesClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleInferenceCluster = new Azure.MachineLearning.InferenceCluster(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ClusterPurpose = \"FastProd\",\n KubernetesClusterId = exampleKubernetesCluster.Id,\n Description = \"This is an example cluster used with Terraform\",\n MachineLearningWorkspaceId = exampleWorkspace.Id,\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/containerservice\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"west europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-kv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-mlw\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.1.0.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKubernetesCluster, err := containerservice.NewKubernetesCluster(ctx, \"example\", \u0026containerservice.KubernetesClusterArgs{\n\t\t\tName: pulumi.String(\"example-aks\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tDnsPrefixPrivateCluster: pulumi.String(\"prefix\"),\n\t\t\tDefaultNodePool: \u0026containerservice.KubernetesClusterDefaultNodePoolArgs{\n\t\t\t\tName: pulumi.String(\"default\"),\n\t\t\t\tNodeCount: pulumi.Int(3),\n\t\t\t\tVmSize: pulumi.String(\"Standard_D3_v2\"),\n\t\t\t\tVnetSubnetId: exampleSubnet.ID(),\n\t\t\t},\n\t\t\tIdentity: \u0026containerservice.KubernetesClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewInferenceCluster(ctx, \"example\", \u0026machinelearning.InferenceClusterArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tClusterPurpose: pulumi.String(\"FastProd\"),\n\t\t\tKubernetesClusterId: exampleKubernetesCluster.ID(),\n\t\t\tDescription: pulumi.String(\"This is an example cluster used with Terraform\"),\n\t\t\tMachineLearningWorkspaceId: exampleWorkspace.ID(),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.containerservice.KubernetesCluster;\nimport com.pulumi.azure.containerservice.KubernetesClusterArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;\nimport com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;\nimport com.pulumi.azure.machinelearning.InferenceCluster;\nimport com.pulumi.azure.machinelearning.InferenceClusterArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"west europe\")\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-kv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-mlw\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.1.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.1.0.0/24\")\n .build());\n\n var exampleKubernetesCluster = new KubernetesCluster(\"exampleKubernetesCluster\", KubernetesClusterArgs.builder()\n .name(\"example-aks\")\n .location(example.location())\n .resourceGroupName(example.name())\n .dnsPrefixPrivateCluster(\"prefix\")\n .defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()\n .name(\"default\")\n .nodeCount(3)\n .vmSize(\"Standard_D3_v2\")\n .vnetSubnetId(exampleSubnet.id())\n .build())\n .identity(KubernetesClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleInferenceCluster = new InferenceCluster(\"exampleInferenceCluster\", InferenceClusterArgs.builder()\n .name(\"example\")\n .location(example.location())\n .clusterPurpose(\"FastProd\")\n .kubernetesClusterId(exampleKubernetesCluster.id())\n .description(\"This is an example cluster used with Terraform\")\n .machineLearningWorkspaceId(exampleWorkspace.id())\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: west europe\n tags:\n stage: example\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-kv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: LRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-mlw\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.1.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.1.0.0/24\n exampleKubernetesCluster:\n type: azure:containerservice:KubernetesCluster\n name: example\n properties:\n name: example-aks\n location: ${example.location}\n resourceGroupName: ${example.name}\n dnsPrefixPrivateCluster: prefix\n defaultNodePool:\n name: default\n nodeCount: 3\n vmSize: Standard_D3_v2\n vnetSubnetId: ${exampleSubnet.id}\n identity:\n type: SystemAssigned\n exampleInferenceCluster:\n type: azure:machinelearning:InferenceCluster\n name: example\n properties:\n name: example\n location: ${example.location}\n clusterPurpose: FastProd\n kubernetesClusterId: ${exampleKubernetesCluster.id}\n description: This is an example cluster used with Terraform\n machineLearningWorkspaceId: ${exampleWorkspace.id}\n tags:\n stage: example\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Inference Clusters can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/inferenceCluster:InferenceCluster example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.MachineLearningServices/workspaces/workspace1/computes/cluster1\n```\n\n", "properties": { "clusterPurpose": { "type": "string", @@ -203997,7 +203997,7 @@ } }, "azure:machinelearning/synapseSpark:SynapseSpark": { - "description": "Manages the linked service to link an Azure Machine learning workspace to an Azure Synapse workspace.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"west europe\",\n tags: {\n stage: \"example\",\n },\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-kv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-mlw\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst exampleWorkspace2 = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleSparkPool = new azure.synapse.SparkPool(\"example\", {\n name: \"example\",\n synapseWorkspaceId: exampleWorkspace2.id,\n nodeSizeFamily: \"MemoryOptimized\",\n nodeSize: \"Small\",\n nodeCount: 3,\n});\nconst exampleSynapseSpark = new azure.machinelearning.SynapseSpark(\"example\", {\n name: \"example\",\n machineLearningWorkspaceId: exampleWorkspace.id,\n location: example.location,\n synapseSparkPoolId: exampleSparkPool.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"west europe\",\n tags={\n \"stage\": \"example\",\n })\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-kv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-mlw\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\nexample_workspace2 = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_spark_pool = azure.synapse.SparkPool(\"example\",\n name=\"example\",\n synapse_workspace_id=example_workspace2.id,\n node_size_family=\"MemoryOptimized\",\n node_size=\"Small\",\n node_count=3)\nexample_synapse_spark = azure.machinelearning.SynapseSpark(\"example\",\n name=\"example\",\n machine_learning_workspace_id=example_workspace.id,\n location=example.location,\n synapse_spark_pool_id=example_spark_pool.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"west europe\",\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-kv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-mlw\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var exampleWorkspace2 = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleSparkPool = new Azure.Synapse.SparkPool(\"example\", new()\n {\n Name = \"example\",\n SynapseWorkspaceId = exampleWorkspace2.Id,\n NodeSizeFamily = \"MemoryOptimized\",\n NodeSize = \"Small\",\n NodeCount = 3,\n });\n\n var exampleSynapseSpark = new Azure.MachineLearning.SynapseSpark(\"example\", new()\n {\n Name = \"example\",\n MachineLearningWorkspaceId = exampleWorkspace.Id,\n Location = example.Location,\n SynapseSparkPoolId = exampleSparkPool.Id,\n Identity = new Azure.MachineLearning.Inputs.SynapseSparkIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"west europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-kv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-mlw\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace2, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSparkPool, err := synapse.NewSparkPool(ctx, \"example\", \u0026synapse.SparkPoolArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tSynapseWorkspaceId: exampleWorkspace2.ID(),\n\t\t\tNodeSizeFamily: pulumi.String(\"MemoryOptimized\"),\n\t\t\tNodeSize: pulumi.String(\"Small\"),\n\t\t\tNodeCount: pulumi.Int(3),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewSynapseSpark(ctx, \"example\", \u0026machinelearning.SynapseSparkArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tMachineLearningWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLocation: example.Location,\n\t\t\tSynapseSparkPoolId: exampleSparkPool.ID(),\n\t\t\tIdentity: \u0026machinelearning.SynapseSparkIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.SparkPool;\nimport com.pulumi.azure.synapse.SparkPoolArgs;\nimport com.pulumi.azure.machinelearning.SynapseSpark;\nimport com.pulumi.azure.machinelearning.SynapseSparkArgs;\nimport com.pulumi.azure.machinelearning.inputs.SynapseSparkIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"west europe\")\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-kv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-mlw\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n var exampleWorkspace2 = new Workspace(\"exampleWorkspace2\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleSparkPool = new SparkPool(\"exampleSparkPool\", SparkPoolArgs.builder()\n .name(\"example\")\n .synapseWorkspaceId(exampleWorkspace2.id())\n .nodeSizeFamily(\"MemoryOptimized\")\n .nodeSize(\"Small\")\n .nodeCount(3)\n .build());\n\n var exampleSynapseSpark = new SynapseSpark(\"exampleSynapseSpark\", SynapseSparkArgs.builder()\n .name(\"example\")\n .machineLearningWorkspaceId(exampleWorkspace.id())\n .location(example.location())\n .synapseSparkPoolId(exampleSparkPool.id())\n .identity(SynapseSparkIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: west europe\n tags:\n stage: example\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-kv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: LRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-mlw\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleWorkspace2:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n exampleSparkPool:\n type: azure:synapse:SparkPool\n name: example\n properties:\n name: example\n synapseWorkspaceId: ${exampleWorkspace2.id}\n nodeSizeFamily: MemoryOptimized\n nodeSize: Small\n nodeCount: 3\n exampleSynapseSpark:\n type: azure:machinelearning:SynapseSpark\n name: example\n properties:\n name: example\n machineLearningWorkspaceId: ${exampleWorkspace.id}\n location: ${example.location}\n synapseSparkPoolId: ${exampleSparkPool.id}\n identity:\n type: SystemAssigned\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Synapse Sparks can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/synapseSpark:SynapseSpark example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.MachineLearningServices/workspaces/workspace1/computes/compute1\n```\n\n", + "description": "Manages the linked service to link an Azure Machine learning workspace to an Azure Synapse workspace.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"west europe\",\n tags: {\n stage: \"example\",\n },\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-kv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplesa\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-mlw\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst exampleWorkspace2 = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleSparkPool = new azure.synapse.SparkPool(\"example\", {\n name: \"example\",\n synapseWorkspaceId: exampleWorkspace2.id,\n nodeSizeFamily: \"MemoryOptimized\",\n nodeSize: \"Small\",\n nodeCount: 3,\n});\nconst exampleSynapseSpark = new azure.machinelearning.SynapseSpark(\"example\", {\n name: \"example\",\n machineLearningWorkspaceId: exampleWorkspace.id,\n location: example.location,\n synapseSparkPoolId: exampleSparkPool.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"west europe\",\n tags={\n \"stage\": \"example\",\n })\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-kv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplesa\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-mlw\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\nexample_workspace2 = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_spark_pool = azure.synapse.SparkPool(\"example\",\n name=\"example\",\n synapse_workspace_id=example_workspace2.id,\n node_size_family=\"MemoryOptimized\",\n node_size=\"Small\",\n node_count=3)\nexample_synapse_spark = azure.machinelearning.SynapseSpark(\"example\",\n name=\"example\",\n machine_learning_workspace_id=example_workspace.id,\n location=example.location,\n synapse_spark_pool_id=example_spark_pool.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"west europe\",\n Tags = \n {\n { \"stage\", \"example\" },\n },\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-kv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplesa\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-mlw\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var exampleWorkspace2 = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleSparkPool = new Azure.Synapse.SparkPool(\"example\", new()\n {\n Name = \"example\",\n SynapseWorkspaceId = exampleWorkspace2.Id,\n NodeSizeFamily = \"MemoryOptimized\",\n NodeSize = \"Small\",\n NodeCount = 3,\n });\n\n var exampleSynapseSpark = new Azure.MachineLearning.SynapseSpark(\"example\", new()\n {\n Name = \"example\",\n MachineLearningWorkspaceId = exampleWorkspace.Id,\n Location = example.Location,\n SynapseSparkPoolId = exampleSparkPool.Id,\n Identity = new Azure.MachineLearning.Inputs.SynapseSparkIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"west europe\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"stage\": pulumi.String(\"example\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-kv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplesa\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-mlw\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace2, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSparkPool, err := synapse.NewSparkPool(ctx, \"example\", \u0026synapse.SparkPoolArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tSynapseWorkspaceId: exampleWorkspace2.ID(),\n\t\t\tNodeSizeFamily: pulumi.String(\"MemoryOptimized\"),\n\t\t\tNodeSize: pulumi.String(\"Small\"),\n\t\t\tNodeCount: pulumi.Int(3),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewSynapseSpark(ctx, \"example\", \u0026machinelearning.SynapseSparkArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tMachineLearningWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLocation: example.Location,\n\t\t\tSynapseSparkPoolId: exampleSparkPool.ID(),\n\t\t\tIdentity: \u0026machinelearning.SynapseSparkIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.SparkPool;\nimport com.pulumi.azure.synapse.SparkPoolArgs;\nimport com.pulumi.azure.machinelearning.SynapseSpark;\nimport com.pulumi.azure.machinelearning.SynapseSparkArgs;\nimport com.pulumi.azure.machinelearning.inputs.SynapseSparkIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"west europe\")\n .tags(Map.of(\"stage\", \"example\"))\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-kv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplesa\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-mlw\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n var exampleWorkspace2 = new Workspace(\"exampleWorkspace2\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleSparkPool = new SparkPool(\"exampleSparkPool\", SparkPoolArgs.builder()\n .name(\"example\")\n .synapseWorkspaceId(exampleWorkspace2.id())\n .nodeSizeFamily(\"MemoryOptimized\")\n .nodeSize(\"Small\")\n .nodeCount(3)\n .build());\n\n var exampleSynapseSpark = new SynapseSpark(\"exampleSynapseSpark\", SynapseSparkArgs.builder()\n .name(\"example\")\n .machineLearningWorkspaceId(exampleWorkspace.id())\n .location(example.location())\n .synapseSparkPoolId(exampleSparkPool.id())\n .identity(SynapseSparkIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: west europe\n tags:\n stage: example\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-kv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplesa\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: LRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-mlw\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleWorkspace2:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n exampleSparkPool:\n type: azure:synapse:SparkPool\n name: example\n properties:\n name: example\n synapseWorkspaceId: ${exampleWorkspace2.id}\n nodeSizeFamily: MemoryOptimized\n nodeSize: Small\n nodeCount: 3\n exampleSynapseSpark:\n type: azure:machinelearning:SynapseSpark\n name: example\n properties:\n name: example\n machineLearningWorkspaceId: ${exampleWorkspace.id}\n location: ${example.location}\n synapseSparkPoolId: ${exampleSparkPool.id}\n identity:\n type: SystemAssigned\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Synapse Sparks can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/synapseSpark:SynapseSpark example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.MachineLearningServices/workspaces/workspace1/computes/compute1\n```\n\n", "properties": { "description": { "type": "string", @@ -204141,7 +204141,7 @@ } }, "azure:machinelearning/workspace:Workspace": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"workspace-example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"workspaceexamplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"workspacestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"workspace-example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"workspaceexamplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_account = azure.storage.Account(\"example\",\n name=\"workspacestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"workspace-example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"workspaceexamplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"workspacestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"workspace-example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"workspacestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"workspace-example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"workspaceexamplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"workspacestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: workspace-example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: workspaceexamplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: workspacestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Data Encryption\n\n\u003e **NOTE:** The Key Vault must enable purge protection.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"workspace-example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"workspaceexamplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"workspacestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspaceexamplekeyvaultkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n exampleKeyVault,\n exampleAccessPolicy,\n ],\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n encryption: {\n keyVaultId: exampleKeyVault.id,\n keyId: exampleKey.id,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"workspace-example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"workspaceexamplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n purge_protection_enabled=True)\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_account = azure.storage.Account(\"example\",\n name=\"workspacestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspaceexamplekeyvaultkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n example_key_vault,\n example_access_policy,\n ]))\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n },\n encryption={\n \"key_vault_id\": example_key_vault.id,\n \"key_id\": example_key.id,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"workspace-example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"workspaceexamplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"workspacestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspaceexamplekeyvaultkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n exampleAccessPolicy,\n },\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Encryption = new Azure.MachineLearning.Inputs.WorkspaceEncryptionArgs\n {\n KeyVaultId = exampleKeyVault.Id,\n KeyId = exampleKey.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"workspace-example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccessPolicy, err := keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"workspacestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvaultkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t\texampleAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tEncryption: \u0026machinelearning.WorkspaceEncryptionArgs{\n\t\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\t\tKeyId: exampleKey.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceEncryptionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"workspace-example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"workspaceexamplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"workspacestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspaceexamplekeyvaultkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n exampleKeyVault,\n exampleAccessPolicy)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .encryption(WorkspaceEncryptionArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .keyId(exampleKey.id())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: workspace-example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: workspaceexamplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n purgeProtectionEnabled: true\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: workspacestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspaceexamplekeyvaultkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\n - ${exampleAccessPolicy}\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n encryption:\n keyVaultId: ${exampleKeyVault.id}\n keyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With User Assigned Identity And Data Encryption\n\n\u003e **NOTE:** The Key Vault must enable purge protection.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvalut\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n purgeProtectionEnabled: true,\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"example-identity\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst example_identity = new azure.keyvault.AccessPolicy(\"example-identity\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"WrapKey\",\n \"UnwrapKey\",\n \"Get\",\n \"Recover\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n \"Set\",\n \"Delete\",\n \"Recover\",\n \"Backup\",\n \"Restore\",\n ],\n});\nconst example_sp = new azure.keyvault.AccessPolicy(\"example-sp\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Recover\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst test = azuread.getServicePrincipal({\n displayName: \"Azure Cosmos DB\",\n});\nconst example_cosmosdb = new azure.keyvault.AccessPolicy(\"example-cosmosdb\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: test.then(test =\u003e test.objectId),\n keyPermissions: [\n \"Get\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n}, {\n dependsOn: [\n test,\n current,\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-keyvaultkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n exampleKeyVault,\n example_sp,\n ],\n});\nconst example_role1 = new azure.authorization.Assignment(\"example-role1\", {\n scope: exampleKeyVault.id,\n roleDefinitionName: \"Contributor\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst example_role2 = new azure.authorization.Assignment(\"example-role2\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Storage Blob Data Contributor\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst example_role3 = new azure.authorization.Assignment(\"example-role3\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Contributor\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst example_role4 = new azure.authorization.Assignment(\"example-role4\", {\n scope: exampleInsights.id,\n roleDefinitionName: \"Contributor\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n highBusinessImpact: true,\n primaryUserAssignedIdentity: exampleUserAssignedIdentity.id,\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n encryption: {\n userAssignedIdentityId: exampleUserAssignedIdentity.id,\n keyVaultId: exampleKeyVault.id,\n keyId: exampleKey.id,\n },\n}, {\n dependsOn: [\n example_role1,\n example_role2,\n example_role3,\n example_role4,\n example_cosmosdb,\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvalut\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n purge_protection_enabled=True)\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"example-identity\",\n location=example.location,\n resource_group_name=example.name)\nexample_identity = azure.keyvault.AccessPolicy(\"example-identity\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_user_assigned_identity.principal_id,\n key_permissions=[\n \"WrapKey\",\n \"UnwrapKey\",\n \"Get\",\n \"Recover\",\n ],\n secret_permissions=[\n \"Get\",\n \"List\",\n \"Set\",\n \"Delete\",\n \"Recover\",\n \"Backup\",\n \"Restore\",\n ])\nexample_sp = azure.keyvault.AccessPolicy(\"example-sp\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Recover\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\ntest = azuread.get_service_principal(display_name=\"Azure Cosmos DB\")\nexample_cosmosdb = azure.keyvault.AccessPolicy(\"example-cosmosdb\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=test.object_id,\n key_permissions=[\n \"Get\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n test,\n current,\n ]))\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-keyvaultkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n example_key_vault,\n example_sp,\n ]))\nexample_role1 = azure.authorization.Assignment(\"example-role1\",\n scope=example_key_vault.id,\n role_definition_name=\"Contributor\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_role2 = azure.authorization.Assignment(\"example-role2\",\n scope=example_account.id,\n role_definition_name=\"Storage Blob Data Contributor\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_role3 = azure.authorization.Assignment(\"example-role3\",\n scope=example_account.id,\n role_definition_name=\"Contributor\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_role4 = azure.authorization.Assignment(\"example-role4\",\n scope=example_insights.id,\n role_definition_name=\"Contributor\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n high_business_impact=True,\n primary_user_assigned_identity=example_user_assigned_identity.id,\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n encryption={\n \"user_assigned_identity_id\": example_user_assigned_identity.id,\n \"key_vault_id\": example_key_vault.id,\n \"key_id\": example_key.id,\n },\n opts = pulumi.ResourceOptions(depends_on=[\n example_role1,\n example_role2,\n example_role3,\n example_role4,\n example_cosmosdb,\n ]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvalut\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"example-identity\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var example_identity = new Azure.KeyVault.AccessPolicy(\"example-identity\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"WrapKey\",\n \"UnwrapKey\",\n \"Get\",\n \"Recover\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Set\",\n \"Delete\",\n \"Recover\",\n \"Backup\",\n \"Restore\",\n },\n });\n\n var example_sp = new Azure.KeyVault.AccessPolicy(\"example-sp\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Recover\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var test = AzureAD.GetServicePrincipal.Invoke(new()\n {\n DisplayName = \"Azure Cosmos DB\",\n });\n\n var example_cosmosdb = new Azure.KeyVault.AccessPolicy(\"example-cosmosdb\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = test.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n test,\n current,\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-keyvaultkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n example_sp,\n },\n });\n\n var example_role1 = new Azure.Authorization.Assignment(\"example-role1\", new()\n {\n Scope = exampleKeyVault.Id,\n RoleDefinitionName = \"Contributor\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var example_role2 = new Azure.Authorization.Assignment(\"example-role2\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Storage Blob Data Contributor\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var example_role3 = new Azure.Authorization.Assignment(\"example-role3\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Contributor\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var example_role4 = new Azure.Authorization.Assignment(\"example-role4\", new()\n {\n Scope = exampleInsights.Id,\n RoleDefinitionName = \"Contributor\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n HighBusinessImpact = true,\n PrimaryUserAssignedIdentity = exampleUserAssignedIdentity.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n Encryption = new Azure.MachineLearning.Inputs.WorkspaceEncryptionArgs\n {\n UserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n KeyVaultId = exampleKeyVault.Id,\n KeyId = exampleKey.Id,\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n example_role1,\n example_role2,\n example_role3,\n example_role4,\n example_cosmosdb,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvalut\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"example-identity\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-identity\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-sp\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttest, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Azure Cosmos DB\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-cosmosdb\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(test.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\ttest,\n\t\t\tcurrent,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-keyvaultkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t\texample_sp,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-role1\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleKeyVault.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Contributor\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-role2\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Storage Blob Data Contributor\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-role3\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Contributor\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-role4\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleInsights.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Contributor\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tHighBusinessImpact: pulumi.Bool(true),\n\t\t\tPrimaryUserAssignedIdentity: exampleUserAssignedIdentity.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEncryption: \u0026machinelearning.WorkspaceEncryptionArgs{\n\t\t\t\tUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\t\tKeyId: exampleKey.ID(),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texample_role1,\n\t\t\texample_role2,\n\t\t\texample_role3,\n\t\t\texample_role4,\n\t\t\texample_cosmosdb,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceEncryptionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvalut\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"example-identity\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var example_identity = new AccessPolicy(\"example-identity\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"WrapKey\",\n \"UnwrapKey\",\n \"Get\",\n \"Recover\")\n .secretPermissions( \n \"Get\",\n \"List\",\n \"Set\",\n \"Delete\",\n \"Recover\",\n \"Backup\",\n \"Restore\")\n .build());\n\n var example_sp = new AccessPolicy(\"example-sp\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Recover\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n final var test = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .displayName(\"Azure Cosmos DB\")\n .build());\n\n var example_cosmosdb = new AccessPolicy(\"example-cosmosdb\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(test.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n test.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult),\n current.applyValue(getClientConfigResult -\u003e getClientConfigResult))\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-keyvaultkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n exampleKeyVault,\n example_sp)\n .build());\n\n var example_role1 = new Assignment(\"example-role1\", AssignmentArgs.builder()\n .scope(exampleKeyVault.id())\n .roleDefinitionName(\"Contributor\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var example_role2 = new Assignment(\"example-role2\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Storage Blob Data Contributor\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var example_role3 = new Assignment(\"example-role3\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Contributor\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var example_role4 = new Assignment(\"example-role4\", AssignmentArgs.builder()\n .scope(exampleInsights.id())\n .roleDefinitionName(\"Contributor\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .highBusinessImpact(true)\n .primaryUserAssignedIdentity(exampleUserAssignedIdentity.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .encryption(WorkspaceEncryptionArgs.builder()\n .userAssignedIdentityId(exampleUserAssignedIdentity.id())\n .keyVaultId(exampleKeyVault.id())\n .keyId(exampleKey.id())\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n example_role1,\n example_role2,\n example_role3,\n example_role4,\n example_cosmosdb)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvalut\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n purgeProtectionEnabled: true\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: example-identity\n location: ${example.location}\n resourceGroupName: ${example.name}\n example-identity:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - WrapKey\n - UnwrapKey\n - Get\n - Recover\n secretPermissions:\n - Get\n - List\n - Set\n - Delete\n - Recover\n - Backup\n - Restore\n example-sp:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Recover\n - Delete\n - Purge\n - GetRotationPolicy\n example-cosmosdb:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${test.objectId}\n keyPermissions:\n - Get\n - Recover\n - UnwrapKey\n - WrapKey\n options:\n dependson:\n - ${test}\n - ${current}\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-keyvaultkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\n - ${[\"example-sp\"]}\n example-role1:\n type: azure:authorization:Assignment\n properties:\n scope: ${exampleKeyVault.id}\n roleDefinitionName: Contributor\n principalId: ${exampleUserAssignedIdentity.principalId}\n example-role2:\n type: azure:authorization:Assignment\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Storage Blob Data Contributor\n principalId: ${exampleUserAssignedIdentity.principalId}\n example-role3:\n type: azure:authorization:Assignment\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Contributor\n principalId: ${exampleUserAssignedIdentity.principalId}\n example-role4:\n type: azure:authorization:Assignment\n properties:\n scope: ${exampleInsights.id}\n roleDefinitionName: Contributor\n principalId: ${exampleUserAssignedIdentity.principalId}\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n highBusinessImpact: true\n primaryUserAssignedIdentity: ${exampleUserAssignedIdentity.id}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n encryption:\n userAssignedIdentityId: ${exampleUserAssignedIdentity.id}\n keyVaultId: ${exampleKeyVault.id}\n keyId: ${exampleKey.id}\n options:\n dependson:\n - ${[\"example-role1\"]}\n - ${[\"example-role2\"]}\n - ${[\"example-role3\"]}\n - ${[\"example-role4\"]}\n - ${[\"example-cosmosdb\"]}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n test:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n displayName: Azure Cosmos DB\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Workspace can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/workspace:Workspace example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.MachineLearningServices/workspaces/workspace1\n```\n\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"workspace-example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"workspaceexamplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"workspacestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"workspace-example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"workspaceexamplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\")\nexample_account = azure.storage.Account(\"example\",\n name=\"workspacestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"workspace-example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"workspaceexamplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"workspacestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"workspace-example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"workspacestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"workspace-example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"workspaceexamplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"workspacestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: workspace-example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: workspaceexamplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: workspacestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Data Encryption\n\n\u003e **NOTE:** The Key Vault must enable purge protection.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"workspace-example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"workspaceexamplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccessPolicy = new azure.keyvault.AccessPolicy(\"example\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"workspacestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspaceexamplekeyvaultkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n exampleKeyVault,\n exampleAccessPolicy,\n ],\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n identity: {\n type: \"SystemAssigned\",\n },\n encryption: {\n keyVaultId: exampleKeyVault.id,\n keyId: exampleKey.id,\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"workspace-example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"workspaceexamplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n purge_protection_enabled=True)\nexample_access_policy = azure.keyvault.AccessPolicy(\"example\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_account = azure.storage.Account(\"example\",\n name=\"workspacestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspaceexamplekeyvaultkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n example_key_vault,\n example_access_policy,\n ]))\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n identity={\n \"type\": \"SystemAssigned\",\n },\n encryption={\n \"key_vault_id\": example_key_vault.id,\n \"key_id\": example_key.id,\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"workspace-example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"workspaceexamplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccessPolicy = new Azure.KeyVault.AccessPolicy(\"example\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"workspacestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspaceexamplekeyvaultkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n exampleAccessPolicy,\n },\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Encryption = new Azure.MachineLearning.Inputs.WorkspaceEncryptionArgs\n {\n KeyVaultId = exampleKeyVault.Id,\n KeyId = exampleKey.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"workspace-example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccessPolicy, err := keyvault.NewAccessPolicy(ctx, \"example\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"workspacestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspaceexamplekeyvaultkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t\texampleAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tEncryption: \u0026machinelearning.WorkspaceEncryptionArgs{\n\t\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\t\tKeyId: exampleKey.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceEncryptionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"workspace-example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"workspaceexamplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccessPolicy = new AccessPolicy(\"exampleAccessPolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"workspacestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspaceexamplekeyvaultkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n exampleKeyVault,\n exampleAccessPolicy)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .encryption(WorkspaceEncryptionArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .keyId(exampleKey.id())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: workspace-example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: workspaceexamplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n purgeProtectionEnabled: true\n exampleAccessPolicy:\n type: azure:keyvault:AccessPolicy\n name: example\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: workspacestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspaceexamplekeyvaultkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\n - ${exampleAccessPolicy}\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n identity:\n type: SystemAssigned\n encryption:\n keyVaultId: ${exampleKeyVault.id}\n keyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With User Assigned Identity And Data Encryption\n\n\u003e **NOTE:** The Key Vault must enable purge protection.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleInsights = new azure.appinsights.Insights(\"example\", {\n name: \"example-ai\",\n location: example.location,\n resourceGroupName: example.name,\n applicationType: \"web\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageaccount\",\n location: example.location,\n resourceGroupName: example.name,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvalut\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n purgeProtectionEnabled: true,\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"example-identity\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst example_identity = new azure.keyvault.AccessPolicy(\"example-identity\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"WrapKey\",\n \"UnwrapKey\",\n \"Get\",\n \"Recover\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n \"Set\",\n \"Delete\",\n \"Recover\",\n \"Backup\",\n \"Restore\",\n ],\n});\nconst example_sp = new azure.keyvault.AccessPolicy(\"example-sp\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Recover\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst test = azuread.getServicePrincipal({\n displayName: \"Azure Cosmos DB\",\n});\nconst example_cosmosdb = new azure.keyvault.AccessPolicy(\"example-cosmosdb\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: test.then(test =\u003e test.objectId),\n keyPermissions: [\n \"Get\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n}, {\n dependsOn: [\n test,\n current,\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-keyvaultkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n exampleKeyVault,\n example_sp,\n ],\n});\nconst example_role1 = new azure.authorization.Assignment(\"example-role1\", {\n scope: exampleKeyVault.id,\n roleDefinitionName: \"Contributor\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst example_role2 = new azure.authorization.Assignment(\"example-role2\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Storage Blob Data Contributor\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst example_role3 = new azure.authorization.Assignment(\"example-role3\", {\n scope: exampleAccount.id,\n roleDefinitionName: \"Contributor\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst example_role4 = new azure.authorization.Assignment(\"example-role4\", {\n scope: exampleInsights.id,\n roleDefinitionName: \"Contributor\",\n principalId: exampleUserAssignedIdentity.principalId,\n});\nconst exampleWorkspace = new azure.machinelearning.Workspace(\"example\", {\n name: \"example-workspace\",\n location: example.location,\n resourceGroupName: example.name,\n applicationInsightsId: exampleInsights.id,\n keyVaultId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n highBusinessImpact: true,\n primaryUserAssignedIdentity: exampleUserAssignedIdentity.id,\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n encryption: {\n userAssignedIdentityId: exampleUserAssignedIdentity.id,\n keyVaultId: exampleKeyVault.id,\n keyId: exampleKey.id,\n },\n}, {\n dependsOn: [\n example_role1,\n example_role2,\n example_role3,\n example_role4,\n example_cosmosdb,\n ],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_insights = azure.appinsights.Insights(\"example\",\n name=\"example-ai\",\n location=example.location,\n resource_group_name=example.name,\n application_type=\"web\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageaccount\",\n location=example.location,\n resource_group_name=example.name,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvalut\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n purge_protection_enabled=True)\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"example-identity\",\n location=example.location,\n resource_group_name=example.name)\nexample_identity = azure.keyvault.AccessPolicy(\"example-identity\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_user_assigned_identity.principal_id,\n key_permissions=[\n \"WrapKey\",\n \"UnwrapKey\",\n \"Get\",\n \"Recover\",\n ],\n secret_permissions=[\n \"Get\",\n \"List\",\n \"Set\",\n \"Delete\",\n \"Recover\",\n \"Backup\",\n \"Restore\",\n ])\nexample_sp = azure.keyvault.AccessPolicy(\"example-sp\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Recover\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\ntest = azuread.get_service_principal(display_name=\"Azure Cosmos DB\")\nexample_cosmosdb = azure.keyvault.AccessPolicy(\"example-cosmosdb\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=test.object_id,\n key_permissions=[\n \"Get\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n test,\n current,\n ]))\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-keyvaultkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n example_key_vault,\n example_sp,\n ]))\nexample_role1 = azure.authorization.Assignment(\"example-role1\",\n scope=example_key_vault.id,\n role_definition_name=\"Contributor\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_role2 = azure.authorization.Assignment(\"example-role2\",\n scope=example_account.id,\n role_definition_name=\"Storage Blob Data Contributor\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_role3 = azure.authorization.Assignment(\"example-role3\",\n scope=example_account.id,\n role_definition_name=\"Contributor\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_role4 = azure.authorization.Assignment(\"example-role4\",\n scope=example_insights.id,\n role_definition_name=\"Contributor\",\n principal_id=example_user_assigned_identity.principal_id)\nexample_workspace = azure.machinelearning.Workspace(\"example\",\n name=\"example-workspace\",\n location=example.location,\n resource_group_name=example.name,\n application_insights_id=example_insights.id,\n key_vault_id=example_key_vault.id,\n storage_account_id=example_account.id,\n high_business_impact=True,\n primary_user_assigned_identity=example_user_assigned_identity.id,\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n encryption={\n \"user_assigned_identity_id\": example_user_assigned_identity.id,\n \"key_vault_id\": example_key_vault.id,\n \"key_id\": example_key.id,\n },\n opts = pulumi.ResourceOptions(depends_on=[\n example_role1,\n example_role2,\n example_role3,\n example_role4,\n example_cosmosdb,\n ]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleInsights = new Azure.AppInsights.Insights(\"example\", new()\n {\n Name = \"example-ai\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationType = \"web\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvalut\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"example-identity\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var example_identity = new Azure.KeyVault.AccessPolicy(\"example-identity\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"WrapKey\",\n \"UnwrapKey\",\n \"Get\",\n \"Recover\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Set\",\n \"Delete\",\n \"Recover\",\n \"Backup\",\n \"Restore\",\n },\n });\n\n var example_sp = new Azure.KeyVault.AccessPolicy(\"example-sp\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Recover\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var test = AzureAD.GetServicePrincipal.Invoke(new()\n {\n DisplayName = \"Azure Cosmos DB\",\n });\n\n var example_cosmosdb = new Azure.KeyVault.AccessPolicy(\"example-cosmosdb\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = test.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n test,\n current,\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-keyvaultkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n example_sp,\n },\n });\n\n var example_role1 = new Azure.Authorization.Assignment(\"example-role1\", new()\n {\n Scope = exampleKeyVault.Id,\n RoleDefinitionName = \"Contributor\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var example_role2 = new Azure.Authorization.Assignment(\"example-role2\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Storage Blob Data Contributor\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var example_role3 = new Azure.Authorization.Assignment(\"example-role3\", new()\n {\n Scope = exampleAccount.Id,\n RoleDefinitionName = \"Contributor\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var example_role4 = new Azure.Authorization.Assignment(\"example-role4\", new()\n {\n Scope = exampleInsights.Id,\n RoleDefinitionName = \"Contributor\",\n PrincipalId = exampleUserAssignedIdentity.PrincipalId,\n });\n\n var exampleWorkspace = new Azure.MachineLearning.Workspace(\"example\", new()\n {\n Name = \"example-workspace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ApplicationInsightsId = exampleInsights.Id,\n KeyVaultId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n HighBusinessImpact = true,\n PrimaryUserAssignedIdentity = exampleUserAssignedIdentity.Id,\n Identity = new Azure.MachineLearning.Inputs.WorkspaceIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n Encryption = new Azure.MachineLearning.Inputs.WorkspaceEncryptionArgs\n {\n UserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n KeyVaultId = exampleKeyVault.Id,\n KeyId = exampleKey.Id,\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n example_role1,\n example_role2,\n example_role3,\n example_role4,\n example_cosmosdb,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/appinsights\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/machinelearning\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleInsights, err := appinsights.NewInsights(ctx, \"example\", \u0026appinsights.InsightsArgs{\n\t\t\tName: pulumi.String(\"example-ai\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationType: pulumi.String(\"web\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvalut\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"example-identity\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-identity\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Backup\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-sp\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttest, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Azure Cosmos DB\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewAccessPolicy(ctx, \"example-cosmosdb\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(test.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\ttest,\n\t\t\tcurrent,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-keyvaultkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t\texample_sp,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-role1\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleKeyVault.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Contributor\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-role2\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Storage Blob Data Contributor\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-role3\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleAccount.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Contributor\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example-role4\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleInsights.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Contributor\"),\n\t\t\tPrincipalId: exampleUserAssignedIdentity.PrincipalId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = machinelearning.NewWorkspace(ctx, \"example\", \u0026machinelearning.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example-workspace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tApplicationInsightsId: exampleInsights.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tHighBusinessImpact: pulumi.Bool(true),\n\t\t\tPrimaryUserAssignedIdentity: exampleUserAssignedIdentity.ID(),\n\t\t\tIdentity: \u0026machinelearning.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEncryption: \u0026machinelearning.WorkspaceEncryptionArgs{\n\t\t\t\tUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\t\tKeyId: exampleKey.ID(),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texample_role1,\n\t\t\texample_role2,\n\t\t\texample_role3,\n\t\t\texample_role4,\n\t\t\texample_cosmosdb,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.appinsights.Insights;\nimport com.pulumi.azure.appinsights.InsightsArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.machinelearning.Workspace;\nimport com.pulumi.azure.machinelearning.WorkspaceArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.machinelearning.inputs.WorkspaceEncryptionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleInsights = new Insights(\"exampleInsights\", InsightsArgs.builder()\n .name(\"example-ai\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationType(\"web\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvalut\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"example-identity\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var example_identity = new AccessPolicy(\"example-identity\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"WrapKey\",\n \"UnwrapKey\",\n \"Get\",\n \"Recover\")\n .secretPermissions( \n \"Get\",\n \"List\",\n \"Set\",\n \"Delete\",\n \"Recover\",\n \"Backup\",\n \"Restore\")\n .build());\n\n var example_sp = new AccessPolicy(\"example-sp\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Recover\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n final var test = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .displayName(\"Azure Cosmos DB\")\n .build());\n\n var example_cosmosdb = new AccessPolicy(\"example-cosmosdb\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(test.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n test.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult),\n current.applyValue(getClientConfigResult -\u003e getClientConfigResult))\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-keyvaultkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n exampleKeyVault,\n example_sp)\n .build());\n\n var example_role1 = new Assignment(\"example-role1\", AssignmentArgs.builder()\n .scope(exampleKeyVault.id())\n .roleDefinitionName(\"Contributor\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var example_role2 = new Assignment(\"example-role2\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Storage Blob Data Contributor\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var example_role3 = new Assignment(\"example-role3\", AssignmentArgs.builder()\n .scope(exampleAccount.id())\n .roleDefinitionName(\"Contributor\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var example_role4 = new Assignment(\"example-role4\", AssignmentArgs.builder()\n .scope(exampleInsights.id())\n .roleDefinitionName(\"Contributor\")\n .principalId(exampleUserAssignedIdentity.principalId())\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example-workspace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .applicationInsightsId(exampleInsights.id())\n .keyVaultId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .highBusinessImpact(true)\n .primaryUserAssignedIdentity(exampleUserAssignedIdentity.id())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .encryption(WorkspaceEncryptionArgs.builder()\n .userAssignedIdentityId(exampleUserAssignedIdentity.id())\n .keyVaultId(exampleKeyVault.id())\n .keyId(exampleKey.id())\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n example_role1,\n example_role2,\n example_role3,\n example_role4,\n example_cosmosdb)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleInsights:\n type: azure:appinsights:Insights\n name: example\n properties:\n name: example-ai\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationType: web\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n accountTier: Standard\n accountReplicationType: GRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvalut\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n purgeProtectionEnabled: true\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: example-identity\n location: ${example.location}\n resourceGroupName: ${example.name}\n example-identity:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - WrapKey\n - UnwrapKey\n - Get\n - Recover\n secretPermissions:\n - Get\n - List\n - Set\n - Delete\n - Recover\n - Backup\n - Restore\n example-sp:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Recover\n - Delete\n - Purge\n - GetRotationPolicy\n example-cosmosdb:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${test.objectId}\n keyPermissions:\n - Get\n - Recover\n - UnwrapKey\n - WrapKey\n options:\n dependson:\n - ${test}\n - ${current}\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-keyvaultkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\n - ${[\"example-sp\"]}\n example-role1:\n type: azure:authorization:Assignment\n properties:\n scope: ${exampleKeyVault.id}\n roleDefinitionName: Contributor\n principalId: ${exampleUserAssignedIdentity.principalId}\n example-role2:\n type: azure:authorization:Assignment\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Storage Blob Data Contributor\n principalId: ${exampleUserAssignedIdentity.principalId}\n example-role3:\n type: azure:authorization:Assignment\n properties:\n scope: ${exampleAccount.id}\n roleDefinitionName: Contributor\n principalId: ${exampleUserAssignedIdentity.principalId}\n example-role4:\n type: azure:authorization:Assignment\n properties:\n scope: ${exampleInsights.id}\n roleDefinitionName: Contributor\n principalId: ${exampleUserAssignedIdentity.principalId}\n exampleWorkspace:\n type: azure:machinelearning:Workspace\n name: example\n properties:\n name: example-workspace\n location: ${example.location}\n resourceGroupName: ${example.name}\n applicationInsightsId: ${exampleInsights.id}\n keyVaultId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n highBusinessImpact: true\n primaryUserAssignedIdentity: ${exampleUserAssignedIdentity.id}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n encryption:\n userAssignedIdentityId: ${exampleUserAssignedIdentity.id}\n keyVaultId: ${exampleKeyVault.id}\n keyId: ${exampleKey.id}\n options:\n dependson:\n - ${[\"example-role1\"]}\n - ${[\"example-role2\"]}\n - ${[\"example-role3\"]}\n - ${[\"example-role4\"]}\n - ${[\"example-cosmosdb\"]}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n test:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n displayName: Azure Cosmos DB\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMachine Learning Workspace can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:machinelearning/workspace:Workspace example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.MachineLearningServices/workspaces/workspace1\n```\n\n", "properties": { "applicationInsightsId": { "type": "string", @@ -204901,7 +204901,7 @@ } }, "azure:managedapplication/application:Application": { - "description": "Manages a Managed Application.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Contributor\",\n});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleDefinition = new azure.managedapplication.Definition(\"example\", {\n name: \"examplemanagedapplicationdefinition\",\n location: example.location,\n resourceGroupName: example.name,\n lockLevel: \"ReadOnly\",\n packageFileUri: \"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n displayName: \"TestManagedAppDefinition\",\n description: \"Test Managed App Definition\",\n authorizations: [{\n servicePrincipalId: current.then(current =\u003e current.objectId),\n roleDefinitionId: Promise.all([builtin.then(builtin =\u003e std.split({\n separator: \"/\",\n text: builtin.id,\n })), builtin.then(builtin =\u003e std.split({\n separator: \"/\",\n text: builtin.id,\n })).then(invoke =\u003e invoke.result).length]).then(([invoke, length]) =\u003e invoke.result[length - 1]),\n }],\n});\nconst exampleApplication = new azure.managedapplication.Application(\"example\", {\n name: \"example-managedapplication\",\n location: example.location,\n resourceGroupName: example.name,\n kind: \"ServiceCatalog\",\n managedResourceGroupName: \"infrastructureGroup\",\n applicationDefinitionId: exampleDefinition.id,\n parameterValues: pulumi.jsonStringify({\n location: {\n value: example.location,\n },\n storageAccountNamePrefix: {\n value: \"storeNamePrefix\",\n },\n storageAccountType: {\n value: \"Standard_LRS\",\n },\n }),\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nbuiltin = azure.authorization.get_role_definition(name=\"Contributor\")\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_definition = azure.managedapplication.Definition(\"example\",\n name=\"examplemanagedapplicationdefinition\",\n location=example.location,\n resource_group_name=example.name,\n lock_level=\"ReadOnly\",\n package_file_uri=\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n display_name=\"TestManagedAppDefinition\",\n description=\"Test Managed App Definition\",\n authorizations=[{\n \"service_principal_id\": current.object_id,\n \"role_definition_id\": std.split(separator=\"/\",\n text=builtin.id).result[len(std.split(separator=\"/\",\n text=builtin.id).result) - 1],\n }])\nexample_application = azure.managedapplication.Application(\"example\",\n name=\"example-managedapplication\",\n location=example.location,\n resource_group_name=example.name,\n kind=\"ServiceCatalog\",\n managed_resource_group_name=\"infrastructureGroup\",\n application_definition_id=example_definition.id,\n parameter_values=pulumi.Output.json_dumps({\n \"location\": {\n \"value\": example.location,\n },\n \"storageAccountNamePrefix\": {\n \"value\": \"storeNamePrefix\",\n },\n \"storageAccountType\": {\n \"value\": \"Standard_LRS\",\n },\n }))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Contributor\",\n });\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleDefinition = new Azure.ManagedApplication.Definition(\"example\", new()\n {\n Name = \"examplemanagedapplicationdefinition\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n LockLevel = \"ReadOnly\",\n PackageFileUri = \"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n DisplayName = \"TestManagedAppDefinition\",\n Description = \"Test Managed App Definition\",\n Authorizations = new[]\n {\n new Azure.ManagedApplication.Inputs.DefinitionAuthorizationArgs\n {\n ServicePrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n RoleDefinitionId = Output.Tuple(Std.Split.Invoke(new()\n {\n Separator = \"/\",\n Text = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n }), Std.Split.Invoke(new()\n {\n Separator = \"/\",\n Text = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n }).Apply(invoke =\u003e invoke.Result).Length).Apply(values =\u003e\n {\n var invoke = values.Item1;\n var length = values.Item2;\n return invoke.Result[length - 1];\n }),\n },\n },\n });\n\n var exampleApplication = new Azure.ManagedApplication.Application(\"example\", new()\n {\n Name = \"example-managedapplication\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Kind = \"ServiceCatalog\",\n ManagedResourceGroupName = \"infrastructureGroup\",\n ApplicationDefinitionId = exampleDefinition.Id,\n ParameterValues = Output.JsonSerialize(Output.Create(new Dictionary\u003cstring, object?\u003e\n {\n [\"location\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"value\"] = example.Location,\n },\n [\"storageAccountNamePrefix\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"value\"] = \"storeNamePrefix\",\n },\n [\"storageAccountType\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"value\"] = \"Standard_LRS\",\n },\n })),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/managedapplication\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Contributor\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeSplit, err := std.Split(ctx, \u0026std.SplitArgs{\n\t\t\tSeparator: \"/\",\n\t\t\tText: builtin.Id,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeSplit1, err := std.Split(ctx, \u0026std.SplitArgs{\n\t\t\tSeparator: \"/\",\n\t\t\tText: builtin.Id,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDefinition, err := managedapplication.NewDefinition(ctx, \"example\", \u0026managedapplication.DefinitionArgs{\n\t\t\tName: pulumi.String(\"examplemanagedapplicationdefinition\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLockLevel: pulumi.String(\"ReadOnly\"),\n\t\t\tPackageFileUri: pulumi.String(\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\"),\n\t\t\tDisplayName: pulumi.String(\"TestManagedAppDefinition\"),\n\t\t\tDescription: pulumi.String(\"Test Managed App Definition\"),\n\t\t\tAuthorizations: managedapplication.DefinitionAuthorizationArray{\n\t\t\t\t\u0026managedapplication.DefinitionAuthorizationArgs{\n\t\t\t\t\tServicePrincipalId: pulumi.String(current.ObjectId),\n\t\t\t\t\tRoleDefinitionId: pulumi.String(invokeSplit.Result[float64(pulumi.Float64(len(invokeSplit1.Result))-1)]),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = managedapplication.NewApplication(ctx, \"example\", \u0026managedapplication.ApplicationArgs{\n\t\t\tName: pulumi.String(\"example-managedapplication\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tKind: pulumi.String(\"ServiceCatalog\"),\n\t\t\tManagedResourceGroupName: pulumi.String(\"infrastructureGroup\"),\n\t\t\tApplicationDefinitionId: exampleDefinition.ID(),\n\t\t\tParameterValues: example.Location.ApplyT(func(location string) (pulumi.String, error) {\n\t\t\t\tvar _zero pulumi.String\n\t\t\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\t\t\"location\": map[string]interface{}{\n\t\t\t\t\t\t\"value\": location,\n\t\t\t\t\t},\n\t\t\t\t\t\"storageAccountNamePrefix\": map[string]interface{}{\n\t\t\t\t\t\t\"value\": \"storeNamePrefix\",\n\t\t\t\t\t},\n\t\t\t\t\t\"storageAccountType\": map[string]interface{}{\n\t\t\t\t\t\t\"value\": \"Standard_LRS\",\n\t\t\t\t\t},\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn _zero, err\n\t\t\t\t}\n\t\t\t\tjson0 := string(tmpJSON0)\n\t\t\t\treturn pulumi.String(json0), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.managedapplication.Definition;\nimport com.pulumi.azure.managedapplication.DefinitionArgs;\nimport com.pulumi.azure.managedapplication.inputs.DefinitionAuthorizationArgs;\nimport com.pulumi.azure.managedapplication.Application;\nimport com.pulumi.azure.managedapplication.ApplicationArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Contributor\")\n .build());\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleDefinition = new Definition(\"exampleDefinition\", DefinitionArgs.builder()\n .name(\"examplemanagedapplicationdefinition\")\n .location(example.location())\n .resourceGroupName(example.name())\n .lockLevel(\"ReadOnly\")\n .packageFileUri(\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\")\n .displayName(\"TestManagedAppDefinition\")\n .description(\"Test Managed App Definition\")\n .authorizations(DefinitionAuthorizationArgs.builder()\n .servicePrincipalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .roleDefinitionId(StdFunctions.split(SplitArgs.builder()\n .separator(\"/\")\n .text(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()))\n .build()).result()[StdFunctions.split(SplitArgs.builder()\n .separator(\"/\")\n .text(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()))\n .build()).result().length() - 1])\n .build())\n .build());\n\n var exampleApplication = new Application(\"exampleApplication\", ApplicationArgs.builder()\n .name(\"example-managedapplication\")\n .location(example.location())\n .resourceGroupName(example.name())\n .kind(\"ServiceCatalog\")\n .managedResourceGroupName(\"infrastructureGroup\")\n .applicationDefinitionId(exampleDefinition.id())\n .parameterValues(example.location().applyValue(location -\u003e serializeJson(\n jsonObject(\n jsonProperty(\"location\", jsonObject(\n jsonProperty(\"value\", location)\n )),\n jsonProperty(\"storageAccountNamePrefix\", jsonObject(\n jsonProperty(\"value\", \"storeNamePrefix\")\n )),\n jsonProperty(\"storageAccountType\", jsonObject(\n jsonProperty(\"value\", \"Standard_LRS\")\n ))\n ))))\n .build());\n\n }\n}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManaged Application can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:managedapplication/application:Application example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Solutions/applications/app1\n```\n\n", + "description": "Manages a Managed Application.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Contributor\",\n});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleDefinition = new azure.managedapplication.Definition(\"example\", {\n name: \"examplemanagedapplicationdefinition\",\n location: example.location,\n resourceGroupName: example.name,\n lockLevel: \"ReadOnly\",\n packageFileUri: \"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n displayName: \"TestManagedAppDefinition\",\n description: \"Test Managed App Definition\",\n authorizations: [{\n servicePrincipalId: current.then(current =\u003e current.objectId),\n roleDefinitionId: Promise.all([builtin.then(builtin =\u003e std.split({\n separator: \"/\",\n text: builtin.id,\n })), builtin.then(builtin =\u003e std.split({\n separator: \"/\",\n text: builtin.id,\n })).then(invoke =\u003e invoke.result).length]).then(([invoke, length]) =\u003e invoke.result[length - 1]),\n }],\n});\nconst exampleApplication = new azure.managedapplication.Application(\"example\", {\n name: \"example-managedapplication\",\n location: example.location,\n resourceGroupName: example.name,\n kind: \"ServiceCatalog\",\n managedResourceGroupName: \"infrastructureGroup\",\n applicationDefinitionId: exampleDefinition.id,\n parameterValues: pulumi.jsonStringify({\n location: {\n value: example.location,\n },\n storageAccountNamePrefix: {\n value: \"storeNamePrefix\",\n },\n storageAccountType: {\n value: \"Standard_LRS\",\n },\n }),\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nbuiltin = azure.authorization.get_role_definition(name=\"Contributor\")\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_definition = azure.managedapplication.Definition(\"example\",\n name=\"examplemanagedapplicationdefinition\",\n location=example.location,\n resource_group_name=example.name,\n lock_level=\"ReadOnly\",\n package_file_uri=\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n display_name=\"TestManagedAppDefinition\",\n description=\"Test Managed App Definition\",\n authorizations=[{\n \"service_principal_id\": current.object_id,\n \"role_definition_id\": std.split(separator=\"/\",\n text=builtin.id).result[len(std.split(separator=\"/\",\n text=builtin.id).result) - 1],\n }])\nexample_application = azure.managedapplication.Application(\"example\",\n name=\"example-managedapplication\",\n location=example.location,\n resource_group_name=example.name,\n kind=\"ServiceCatalog\",\n managed_resource_group_name=\"infrastructureGroup\",\n application_definition_id=example_definition.id,\n parameter_values=pulumi.Output.json_dumps({\n \"location\": {\n \"value\": example.location,\n },\n \"storageAccountNamePrefix\": {\n \"value\": \"storeNamePrefix\",\n },\n \"storageAccountType\": {\n \"value\": \"Standard_LRS\",\n },\n }))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Contributor\",\n });\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleDefinition = new Azure.ManagedApplication.Definition(\"example\", new()\n {\n Name = \"examplemanagedapplicationdefinition\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n LockLevel = \"ReadOnly\",\n PackageFileUri = \"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n DisplayName = \"TestManagedAppDefinition\",\n Description = \"Test Managed App Definition\",\n Authorizations = new[]\n {\n new Azure.ManagedApplication.Inputs.DefinitionAuthorizationArgs\n {\n ServicePrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n RoleDefinitionId = Output.Tuple(Std.Split.Invoke(new()\n {\n Separator = \"/\",\n Text = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n }), Std.Split.Invoke(new()\n {\n Separator = \"/\",\n Text = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n }).Apply(invoke =\u003e invoke.Result).Length).Apply(values =\u003e\n {\n var invoke = values.Item1;\n var length = values.Item2;\n return invoke.Result[length - 1];\n }),\n },\n },\n });\n\n var exampleApplication = new Azure.ManagedApplication.Application(\"example\", new()\n {\n Name = \"example-managedapplication\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Kind = \"ServiceCatalog\",\n ManagedResourceGroupName = \"infrastructureGroup\",\n ApplicationDefinitionId = exampleDefinition.Id,\n ParameterValues = Output.JsonSerialize(Output.Create(new Dictionary\u003cstring, object?\u003e\n {\n [\"location\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"value\"] = example.Location,\n },\n [\"storageAccountNamePrefix\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"value\"] = \"storeNamePrefix\",\n },\n [\"storageAccountType\"] = new Dictionary\u003cstring, object?\u003e\n {\n [\"value\"] = \"Standard_LRS\",\n },\n })),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/managedapplication\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Contributor\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeSplit, err := std.Split(ctx, \u0026std.SplitArgs{\n\t\t\tSeparator: \"/\",\n\t\t\tText: builtin.Id,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeSplit1, err := std.Split(ctx, \u0026std.SplitArgs{\n\t\t\tSeparator: \"/\",\n\t\t\tText: builtin.Id,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDefinition, err := managedapplication.NewDefinition(ctx, \"example\", \u0026managedapplication.DefinitionArgs{\n\t\t\tName: pulumi.String(\"examplemanagedapplicationdefinition\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLockLevel: pulumi.String(\"ReadOnly\"),\n\t\t\tPackageFileUri: pulumi.String(\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\"),\n\t\t\tDisplayName: pulumi.String(\"TestManagedAppDefinition\"),\n\t\t\tDescription: pulumi.String(\"Test Managed App Definition\"),\n\t\t\tAuthorizations: managedapplication.DefinitionAuthorizationArray{\n\t\t\t\t\u0026managedapplication.DefinitionAuthorizationArgs{\n\t\t\t\t\tServicePrincipalId: pulumi.String(current.ObjectId),\n\t\t\t\t\tRoleDefinitionId: pulumi.String(invokeSplit.Result[float64(pulumi.Float64(len(invokeSplit1.Result))-1)]),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = managedapplication.NewApplication(ctx, \"example\", \u0026managedapplication.ApplicationArgs{\n\t\t\tName: pulumi.String(\"example-managedapplication\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tKind: pulumi.String(\"ServiceCatalog\"),\n\t\t\tManagedResourceGroupName: pulumi.String(\"infrastructureGroup\"),\n\t\t\tApplicationDefinitionId: exampleDefinition.ID(),\n\t\t\tParameterValues: example.Location.ApplyT(func(location string) (pulumi.String, error) {\n\t\t\t\tvar _zero pulumi.String\n\t\t\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\t\t\"location\": map[string]interface{}{\n\t\t\t\t\t\t\"value\": location,\n\t\t\t\t\t},\n\t\t\t\t\t\"storageAccountNamePrefix\": map[string]interface{}{\n\t\t\t\t\t\t\"value\": \"storeNamePrefix\",\n\t\t\t\t\t},\n\t\t\t\t\t\"storageAccountType\": map[string]interface{}{\n\t\t\t\t\t\t\"value\": \"Standard_LRS\",\n\t\t\t\t\t},\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn _zero, err\n\t\t\t\t}\n\t\t\t\tjson0 := string(tmpJSON0)\n\t\t\t\treturn pulumi.String(json0), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.managedapplication.Definition;\nimport com.pulumi.azure.managedapplication.DefinitionArgs;\nimport com.pulumi.azure.managedapplication.inputs.DefinitionAuthorizationArgs;\nimport com.pulumi.azure.managedapplication.Application;\nimport com.pulumi.azure.managedapplication.ApplicationArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Contributor\")\n .build());\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleDefinition = new Definition(\"exampleDefinition\", DefinitionArgs.builder()\n .name(\"examplemanagedapplicationdefinition\")\n .location(example.location())\n .resourceGroupName(example.name())\n .lockLevel(\"ReadOnly\")\n .packageFileUri(\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\")\n .displayName(\"TestManagedAppDefinition\")\n .description(\"Test Managed App Definition\")\n .authorizations(DefinitionAuthorizationArgs.builder()\n .servicePrincipalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .roleDefinitionId(StdFunctions.split(SplitArgs.builder()\n .separator(\"/\")\n .text(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()))\n .build()).result()[StdFunctions.split(SplitArgs.builder()\n .separator(\"/\")\n .text(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()))\n .build()).result().length() - 1])\n .build())\n .build());\n\n var exampleApplication = new Application(\"exampleApplication\", ApplicationArgs.builder()\n .name(\"example-managedapplication\")\n .location(example.location())\n .resourceGroupName(example.name())\n .kind(\"ServiceCatalog\")\n .managedResourceGroupName(\"infrastructureGroup\")\n .applicationDefinitionId(exampleDefinition.id())\n .parameterValues(example.location().applyValue(location -\u003e serializeJson(\n jsonObject(\n jsonProperty(\"location\", jsonObject(\n jsonProperty(\"value\", location)\n )),\n jsonProperty(\"storageAccountNamePrefix\", jsonObject(\n jsonProperty(\"value\", \"storeNamePrefix\")\n )),\n jsonProperty(\"storageAccountType\", jsonObject(\n jsonProperty(\"value\", \"Standard_LRS\")\n ))\n ))))\n .build());\n\n }\n}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManaged Application can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:managedapplication/application:Application example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Solutions/applications/app1\n```\n\n", "properties": { "applicationDefinitionId": { "type": "string", @@ -205071,7 +205071,7 @@ } }, "azure:managedapplication/definition:Definition": { - "description": "Manages a Managed Application Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleDefinition = new azure.managedapplication.Definition(\"example\", {\n name: \"examplemanagedapplicationdefinition\",\n location: example.location,\n resourceGroupName: example.name,\n lockLevel: \"ReadOnly\",\n packageFileUri: \"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n displayName: \"TestManagedApplicationDefinition\",\n description: \"Test Managed Application Definition\",\n authorizations: [{\n servicePrincipalId: current.then(current =\u003e current.objectId),\n roleDefinitionId: \"a094b430-dad3-424d-ae58-13f72fd72591\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_definition = azure.managedapplication.Definition(\"example\",\n name=\"examplemanagedapplicationdefinition\",\n location=example.location,\n resource_group_name=example.name,\n lock_level=\"ReadOnly\",\n package_file_uri=\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n display_name=\"TestManagedApplicationDefinition\",\n description=\"Test Managed Application Definition\",\n authorizations=[{\n \"service_principal_id\": current.object_id,\n \"role_definition_id\": \"a094b430-dad3-424d-ae58-13f72fd72591\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleDefinition = new Azure.ManagedApplication.Definition(\"example\", new()\n {\n Name = \"examplemanagedapplicationdefinition\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n LockLevel = \"ReadOnly\",\n PackageFileUri = \"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n DisplayName = \"TestManagedApplicationDefinition\",\n Description = \"Test Managed Application Definition\",\n Authorizations = new[]\n {\n new Azure.ManagedApplication.Inputs.DefinitionAuthorizationArgs\n {\n ServicePrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n RoleDefinitionId = \"a094b430-dad3-424d-ae58-13f72fd72591\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/managedapplication\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = managedapplication.NewDefinition(ctx, \"example\", \u0026managedapplication.DefinitionArgs{\n\t\t\tName: pulumi.String(\"examplemanagedapplicationdefinition\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLockLevel: pulumi.String(\"ReadOnly\"),\n\t\t\tPackageFileUri: pulumi.String(\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\"),\n\t\t\tDisplayName: pulumi.String(\"TestManagedApplicationDefinition\"),\n\t\t\tDescription: pulumi.String(\"Test Managed Application Definition\"),\n\t\t\tAuthorizations: managedapplication.DefinitionAuthorizationArray{\n\t\t\t\t\u0026managedapplication.DefinitionAuthorizationArgs{\n\t\t\t\t\tServicePrincipalId: pulumi.String(current.ObjectId),\n\t\t\t\t\tRoleDefinitionId: pulumi.String(\"a094b430-dad3-424d-ae58-13f72fd72591\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.managedapplication.Definition;\nimport com.pulumi.azure.managedapplication.DefinitionArgs;\nimport com.pulumi.azure.managedapplication.inputs.DefinitionAuthorizationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleDefinition = new Definition(\"exampleDefinition\", DefinitionArgs.builder()\n .name(\"examplemanagedapplicationdefinition\")\n .location(example.location())\n .resourceGroupName(example.name())\n .lockLevel(\"ReadOnly\")\n .packageFileUri(\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\")\n .displayName(\"TestManagedApplicationDefinition\")\n .description(\"Test Managed Application Definition\")\n .authorizations(DefinitionAuthorizationArgs.builder()\n .servicePrincipalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .roleDefinitionId(\"a094b430-dad3-424d-ae58-13f72fd72591\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleDefinition:\n type: azure:managedapplication:Definition\n name: example\n properties:\n name: examplemanagedapplicationdefinition\n location: ${example.location}\n resourceGroupName: ${example.name}\n lockLevel: ReadOnly\n packageFileUri: https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\n displayName: TestManagedApplicationDefinition\n description: Test Managed Application Definition\n authorizations:\n - servicePrincipalId: ${current.objectId}\n roleDefinitionId: a094b430-dad3-424d-ae58-13f72fd72591\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManaged Application Definition can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:managedapplication/definition:Definition example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Solutions/applicationDefinitions/appDefinition1\n```\n\n", + "description": "Manages a Managed Application Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleDefinition = new azure.managedapplication.Definition(\"example\", {\n name: \"examplemanagedapplicationdefinition\",\n location: example.location,\n resourceGroupName: example.name,\n lockLevel: \"ReadOnly\",\n packageFileUri: \"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n displayName: \"TestManagedApplicationDefinition\",\n description: \"Test Managed Application Definition\",\n authorizations: [{\n servicePrincipalId: current.then(current =\u003e current.objectId),\n roleDefinitionId: \"a094b430-dad3-424d-ae58-13f72fd72591\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_definition = azure.managedapplication.Definition(\"example\",\n name=\"examplemanagedapplicationdefinition\",\n location=example.location,\n resource_group_name=example.name,\n lock_level=\"ReadOnly\",\n package_file_uri=\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n display_name=\"TestManagedApplicationDefinition\",\n description=\"Test Managed Application Definition\",\n authorizations=[{\n \"service_principal_id\": current.object_id,\n \"role_definition_id\": \"a094b430-dad3-424d-ae58-13f72fd72591\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleDefinition = new Azure.ManagedApplication.Definition(\"example\", new()\n {\n Name = \"examplemanagedapplicationdefinition\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n LockLevel = \"ReadOnly\",\n PackageFileUri = \"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\",\n DisplayName = \"TestManagedApplicationDefinition\",\n Description = \"Test Managed Application Definition\",\n Authorizations = new[]\n {\n new Azure.ManagedApplication.Inputs.DefinitionAuthorizationArgs\n {\n ServicePrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n RoleDefinitionId = \"a094b430-dad3-424d-ae58-13f72fd72591\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/managedapplication\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = managedapplication.NewDefinition(ctx, \"example\", \u0026managedapplication.DefinitionArgs{\n\t\t\tName: pulumi.String(\"examplemanagedapplicationdefinition\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLockLevel: pulumi.String(\"ReadOnly\"),\n\t\t\tPackageFileUri: pulumi.String(\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\"),\n\t\t\tDisplayName: pulumi.String(\"TestManagedApplicationDefinition\"),\n\t\t\tDescription: pulumi.String(\"Test Managed Application Definition\"),\n\t\t\tAuthorizations: managedapplication.DefinitionAuthorizationArray{\n\t\t\t\t\u0026managedapplication.DefinitionAuthorizationArgs{\n\t\t\t\t\tServicePrincipalId: pulumi.String(current.ObjectId),\n\t\t\t\t\tRoleDefinitionId: pulumi.String(\"a094b430-dad3-424d-ae58-13f72fd72591\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.managedapplication.Definition;\nimport com.pulumi.azure.managedapplication.DefinitionArgs;\nimport com.pulumi.azure.managedapplication.inputs.DefinitionAuthorizationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleDefinition = new Definition(\"exampleDefinition\", DefinitionArgs.builder()\n .name(\"examplemanagedapplicationdefinition\")\n .location(example.location())\n .resourceGroupName(example.name())\n .lockLevel(\"ReadOnly\")\n .packageFileUri(\"https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\")\n .displayName(\"TestManagedApplicationDefinition\")\n .description(\"Test Managed Application Definition\")\n .authorizations(DefinitionAuthorizationArgs.builder()\n .servicePrincipalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .roleDefinitionId(\"a094b430-dad3-424d-ae58-13f72fd72591\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleDefinition:\n type: azure:managedapplication:Definition\n name: example\n properties:\n name: examplemanagedapplicationdefinition\n location: ${example.location}\n resourceGroupName: ${example.name}\n lockLevel: ReadOnly\n packageFileUri: https://github.com/Azure/azure-managedapp-samples/raw/master/Managed Application Sample Packages/201-managed-storage-account/managedstorage.zip\n displayName: TestManagedApplicationDefinition\n description: Test Managed Application Definition\n authorizations:\n - servicePrincipalId: ${current.objectId}\n roleDefinitionId: a094b430-dad3-424d-ae58-13f72fd72591\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManaged Application Definition can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:managedapplication/definition:Definition example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Solutions/applicationDefinitions/appDefinition1\n```\n\n", "properties": { "authorizations": { "type": "array", @@ -205486,7 +205486,7 @@ } }, "azure:management/group:Group": { - "description": "Manages a Management Group.\n\n!\u003e **Note:** Configuring `subscription_ids` is not supported when using the `azure.management.GroupSubscriptionAssociation` resource, results will be unpredictable.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst exampleParent = new azure.management.Group(\"example_parent\", {\n displayName: \"ParentGroup\",\n subscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n});\nconst exampleChild = new azure.management.Group(\"example_child\", {\n displayName: \"ChildGroup\",\n parentManagementGroupId: exampleParent.id,\n subscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nexample_parent = azure.management.Group(\"example_parent\",\n display_name=\"ParentGroup\",\n subscription_ids=[current.subscription_id])\nexample_child = azure.management.Group(\"example_child\",\n display_name=\"ChildGroup\",\n parent_management_group_id=example_parent.id,\n subscription_ids=[current.subscription_id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleParent = new Azure.Management.Group(\"example_parent\", new()\n {\n DisplayName = \"ParentGroup\",\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.SubscriptionId),\n },\n });\n\n var exampleChild = new Azure.Management.Group(\"example_child\", new()\n {\n DisplayName = \"ChildGroup\",\n ParentManagementGroupId = exampleParent.Id,\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.SubscriptionId),\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleParent, err := management.NewGroup(ctx, \"example_parent\", \u0026management.GroupArgs{\n\t\t\tDisplayName: pulumi.String(\"ParentGroup\"),\n\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewGroup(ctx, \"example_child\", \u0026management.GroupArgs{\n\t\t\tDisplayName: pulumi.String(\"ChildGroup\"),\n\t\t\tParentManagementGroupId: exampleParent.ID(),\n\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.management.GroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var exampleParent = new Group(\"exampleParent\", GroupArgs.builder()\n .displayName(\"ParentGroup\")\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.subscriptionId()))\n .build());\n\n var exampleChild = new Group(\"exampleChild\", GroupArgs.builder()\n .displayName(\"ChildGroup\")\n .parentManagementGroupId(exampleParent.id())\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.subscriptionId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleParent:\n type: azure:management:Group\n name: example_parent\n properties:\n displayName: ParentGroup\n subscriptionIds:\n - ${current.subscriptionId}\n exampleChild:\n type: azure:management:Group\n name: example_child\n properties:\n displayName: ChildGroup\n parentManagementGroupId: ${exampleParent.id}\n subscriptionIds: # other subscription IDs can go here\n - ${current.subscriptionId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManagement Groups can be imported using the `management group resource id`, e.g.\n\n```sh\n$ pulumi import azure:management/group:Group example /providers/Microsoft.Management/managementGroups/group1\n```\n\n", + "description": "Manages a Management Group.\n\n!\u003e **Note:** Configuring `subscription_ids` is not supported when using the `azure.management.GroupSubscriptionAssociation` resource, results will be unpredictable.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst exampleParent = new azure.management.Group(\"example_parent\", {\n displayName: \"ParentGroup\",\n subscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n});\nconst exampleChild = new azure.management.Group(\"example_child\", {\n displayName: \"ChildGroup\",\n parentManagementGroupId: exampleParent.id,\n subscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nexample_parent = azure.management.Group(\"example_parent\",\n display_name=\"ParentGroup\",\n subscription_ids=[current.subscription_id])\nexample_child = azure.management.Group(\"example_child\",\n display_name=\"ChildGroup\",\n parent_management_group_id=example_parent.id,\n subscription_ids=[current.subscription_id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleParent = new Azure.Management.Group(\"example_parent\", new()\n {\n DisplayName = \"ParentGroup\",\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.SubscriptionId),\n },\n });\n\n var exampleChild = new Azure.Management.Group(\"example_child\", new()\n {\n DisplayName = \"ChildGroup\",\n ParentManagementGroupId = exampleParent.Id,\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.SubscriptionId),\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleParent, err := management.NewGroup(ctx, \"example_parent\", \u0026management.GroupArgs{\n\t\t\tDisplayName: pulumi.String(\"ParentGroup\"),\n\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewGroup(ctx, \"example_child\", \u0026management.GroupArgs{\n\t\t\tDisplayName: pulumi.String(\"ChildGroup\"),\n\t\t\tParentManagementGroupId: exampleParent.ID(),\n\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.management.GroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var exampleParent = new Group(\"exampleParent\", GroupArgs.builder()\n .displayName(\"ParentGroup\")\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.subscriptionId()))\n .build());\n\n var exampleChild = new Group(\"exampleChild\", GroupArgs.builder()\n .displayName(\"ChildGroup\")\n .parentManagementGroupId(exampleParent.id())\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.subscriptionId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleParent:\n type: azure:management:Group\n name: example_parent\n properties:\n displayName: ParentGroup\n subscriptionIds:\n - ${current.subscriptionId}\n exampleChild:\n type: azure:management:Group\n name: example_child\n properties:\n displayName: ChildGroup\n parentManagementGroupId: ${exampleParent.id}\n subscriptionIds: # other subscription IDs can go here\n - ${current.subscriptionId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManagement Groups can be imported using the `management group resource id`, e.g.\n\n```sh\n$ pulumi import azure:management/group:Group example /providers/Microsoft.Management/managementGroups/group1\n```\n\n", "properties": { "displayName": { "type": "string", @@ -206283,7 +206283,7 @@ } }, "azure:management/lock:Lock": { - "description": "Manages a Management Lock which is scoped to a Subscription, Resource Group or Resource.\n\n## Example Usage\n\n### Subscription Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst subscription_level = new azure.management.Lock(\"subscription-level\", {\n name: \"subscription-level\",\n scope: current.then(current =\u003e current.id),\n lockLevel: \"CanNotDelete\",\n notes: \"Items can't be deleted in this subscription!\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nsubscription_level = azure.management.Lock(\"subscription-level\",\n name=\"subscription-level\",\n scope=current.id,\n lock_level=\"CanNotDelete\",\n notes=\"Items can't be deleted in this subscription!\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var subscription_level = new Azure.Management.Lock(\"subscription-level\", new()\n {\n Name = \"subscription-level\",\n Scope = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n LockLevel = \"CanNotDelete\",\n Notes = \"Items can't be deleted in this subscription!\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"subscription-level\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"subscription-level\"),\n\t\t\tScope: pulumi.String(current.Id),\n\t\t\tLockLevel: pulumi.String(\"CanNotDelete\"),\n\t\t\tNotes: pulumi.String(\"Items can't be deleted in this subscription!\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var subscription_level = new Lock(\"subscription-level\", LockArgs.builder()\n .name(\"subscription-level\")\n .scope(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .lockLevel(\"CanNotDelete\")\n .notes(\"Items can't be deleted in this subscription!\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n subscription-level:\n type: azure:management:Lock\n properties:\n name: subscription-level\n scope: ${current.id}\n lockLevel: CanNotDelete\n notes: Items can't be deleted in this subscription!\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Resource Group Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"locked-resource-group\",\n location: \"West Europe\",\n});\nconst resource_group_level = new azure.management.Lock(\"resource-group-level\", {\n name: \"resource-group-level\",\n scope: example.id,\n lockLevel: \"ReadOnly\",\n notes: \"This Resource Group is Read-Only\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"locked-resource-group\",\n location=\"West Europe\")\nresource_group_level = azure.management.Lock(\"resource-group-level\",\n name=\"resource-group-level\",\n scope=example.id,\n lock_level=\"ReadOnly\",\n notes=\"This Resource Group is Read-Only\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"locked-resource-group\",\n Location = \"West Europe\",\n });\n\n var resource_group_level = new Azure.Management.Lock(\"resource-group-level\", new()\n {\n Name = \"resource-group-level\",\n Scope = example.Id,\n LockLevel = \"ReadOnly\",\n Notes = \"This Resource Group is Read-Only\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"locked-resource-group\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"resource-group-level\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"resource-group-level\"),\n\t\t\tScope: example.ID(),\n\t\t\tLockLevel: pulumi.String(\"ReadOnly\"),\n\t\t\tNotes: pulumi.String(\"This Resource Group is Read-Only\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"locked-resource-group\")\n .location(\"West Europe\")\n .build());\n\n var resource_group_level = new Lock(\"resource-group-level\", LockArgs.builder()\n .name(\"resource-group-level\")\n .scope(example.id())\n .lockLevel(\"ReadOnly\")\n .notes(\"This Resource Group is Read-Only\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: locked-resource-group\n location: West Europe\n resource-group-level:\n type: azure:management:Lock\n properties:\n name: resource-group-level\n scope: ${example.id}\n lockLevel: ReadOnly\n notes: This Resource Group is Read-Only\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Resource Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"locked-resource-group\",\n location: \"West Europe\",\n});\nconst examplePublicIp = new azure.network.PublicIp(\"example\", {\n name: \"locked-publicip\",\n location: example.location,\n resourceGroupName: example.name,\n allocationMethod: \"Static\",\n idleTimeoutInMinutes: 30,\n});\nconst public_ip = new azure.management.Lock(\"public-ip\", {\n name: \"resource-ip\",\n scope: examplePublicIp.id,\n lockLevel: \"CanNotDelete\",\n notes: \"Locked because it's needed by a third-party\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"locked-resource-group\",\n location=\"West Europe\")\nexample_public_ip = azure.network.PublicIp(\"example\",\n name=\"locked-publicip\",\n location=example.location,\n resource_group_name=example.name,\n allocation_method=\"Static\",\n idle_timeout_in_minutes=30)\npublic_ip = azure.management.Lock(\"public-ip\",\n name=\"resource-ip\",\n scope=example_public_ip.id,\n lock_level=\"CanNotDelete\",\n notes=\"Locked because it's needed by a third-party\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"locked-resource-group\",\n Location = \"West Europe\",\n });\n\n var examplePublicIp = new Azure.Network.PublicIp(\"example\", new()\n {\n Name = \"locked-publicip\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AllocationMethod = \"Static\",\n IdleTimeoutInMinutes = 30,\n });\n\n var public_ip = new Azure.Management.Lock(\"public-ip\", new()\n {\n Name = \"resource-ip\",\n Scope = examplePublicIp.Id,\n LockLevel = \"CanNotDelete\",\n Notes = \"Locked because it's needed by a third-party\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"locked-resource-group\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePublicIp, err := network.NewPublicIp(ctx, \"example\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"locked-publicip\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tIdleTimeoutInMinutes: pulumi.Int(30),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"public-ip\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"resource-ip\"),\n\t\t\tScope: examplePublicIp.ID(),\n\t\t\tLockLevel: pulumi.String(\"CanNotDelete\"),\n\t\t\tNotes: pulumi.String(\"Locked because it's needed by a third-party\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"locked-resource-group\")\n .location(\"West Europe\")\n .build());\n\n var examplePublicIp = new PublicIp(\"examplePublicIp\", PublicIpArgs.builder()\n .name(\"locked-publicip\")\n .location(example.location())\n .resourceGroupName(example.name())\n .allocationMethod(\"Static\")\n .idleTimeoutInMinutes(30)\n .build());\n\n var public_ip = new Lock(\"public-ip\", LockArgs.builder()\n .name(\"resource-ip\")\n .scope(examplePublicIp.id())\n .lockLevel(\"CanNotDelete\")\n .notes(\"Locked because it's needed by a third-party\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: locked-resource-group\n location: West Europe\n examplePublicIp:\n type: azure:network:PublicIp\n name: example\n properties:\n name: locked-publicip\n location: ${example.location}\n resourceGroupName: ${example.name}\n allocationMethod: Static\n idleTimeoutInMinutes: 30\n public-ip:\n type: azure:management:Lock\n properties:\n name: resource-ip\n scope: ${examplePublicIp.id}\n lockLevel: CanNotDelete\n notes: Locked because it's needed by a third-party\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManagement Locks can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:management/lock:Lock lock1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Authorization/locks/lock1\n```\n\n", + "description": "Manages a Management Lock which is scoped to a Subscription, Resource Group or Resource.\n\n## Example Usage\n\n### Subscription Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst subscription_level = new azure.management.Lock(\"subscription-level\", {\n name: \"subscription-level\",\n scope: current.then(current =\u003e current.id),\n lockLevel: \"CanNotDelete\",\n notes: \"Items can't be deleted in this subscription!\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nsubscription_level = azure.management.Lock(\"subscription-level\",\n name=\"subscription-level\",\n scope=current.id,\n lock_level=\"CanNotDelete\",\n notes=\"Items can't be deleted in this subscription!\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var subscription_level = new Azure.Management.Lock(\"subscription-level\", new()\n {\n Name = \"subscription-level\",\n Scope = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n LockLevel = \"CanNotDelete\",\n Notes = \"Items can't be deleted in this subscription!\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"subscription-level\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"subscription-level\"),\n\t\t\tScope: pulumi.String(current.Id),\n\t\t\tLockLevel: pulumi.String(\"CanNotDelete\"),\n\t\t\tNotes: pulumi.String(\"Items can't be deleted in this subscription!\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var subscription_level = new Lock(\"subscription-level\", LockArgs.builder()\n .name(\"subscription-level\")\n .scope(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .lockLevel(\"CanNotDelete\")\n .notes(\"Items can't be deleted in this subscription!\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n subscription-level:\n type: azure:management:Lock\n properties:\n name: subscription-level\n scope: ${current.id}\n lockLevel: CanNotDelete\n notes: Items can't be deleted in this subscription!\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Resource Group Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"locked-resource-group\",\n location: \"West Europe\",\n});\nconst resource_group_level = new azure.management.Lock(\"resource-group-level\", {\n name: \"resource-group-level\",\n scope: example.id,\n lockLevel: \"ReadOnly\",\n notes: \"This Resource Group is Read-Only\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"locked-resource-group\",\n location=\"West Europe\")\nresource_group_level = azure.management.Lock(\"resource-group-level\",\n name=\"resource-group-level\",\n scope=example.id,\n lock_level=\"ReadOnly\",\n notes=\"This Resource Group is Read-Only\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"locked-resource-group\",\n Location = \"West Europe\",\n });\n\n var resource_group_level = new Azure.Management.Lock(\"resource-group-level\", new()\n {\n Name = \"resource-group-level\",\n Scope = example.Id,\n LockLevel = \"ReadOnly\",\n Notes = \"This Resource Group is Read-Only\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"locked-resource-group\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"resource-group-level\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"resource-group-level\"),\n\t\t\tScope: example.ID(),\n\t\t\tLockLevel: pulumi.String(\"ReadOnly\"),\n\t\t\tNotes: pulumi.String(\"This Resource Group is Read-Only\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"locked-resource-group\")\n .location(\"West Europe\")\n .build());\n\n var resource_group_level = new Lock(\"resource-group-level\", LockArgs.builder()\n .name(\"resource-group-level\")\n .scope(example.id())\n .lockLevel(\"ReadOnly\")\n .notes(\"This Resource Group is Read-Only\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: locked-resource-group\n location: West Europe\n resource-group-level:\n type: azure:management:Lock\n properties:\n name: resource-group-level\n scope: ${example.id}\n lockLevel: ReadOnly\n notes: This Resource Group is Read-Only\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Resource Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"locked-resource-group\",\n location: \"West Europe\",\n});\nconst examplePublicIp = new azure.network.PublicIp(\"example\", {\n name: \"locked-publicip\",\n location: example.location,\n resourceGroupName: example.name,\n allocationMethod: \"Static\",\n idleTimeoutInMinutes: 30,\n});\nconst public_ip = new azure.management.Lock(\"public-ip\", {\n name: \"resource-ip\",\n scope: examplePublicIp.id,\n lockLevel: \"CanNotDelete\",\n notes: \"Locked because it's needed by a third-party\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"locked-resource-group\",\n location=\"West Europe\")\nexample_public_ip = azure.network.PublicIp(\"example\",\n name=\"locked-publicip\",\n location=example.location,\n resource_group_name=example.name,\n allocation_method=\"Static\",\n idle_timeout_in_minutes=30)\npublic_ip = azure.management.Lock(\"public-ip\",\n name=\"resource-ip\",\n scope=example_public_ip.id,\n lock_level=\"CanNotDelete\",\n notes=\"Locked because it's needed by a third-party\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"locked-resource-group\",\n Location = \"West Europe\",\n });\n\n var examplePublicIp = new Azure.Network.PublicIp(\"example\", new()\n {\n Name = \"locked-publicip\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AllocationMethod = \"Static\",\n IdleTimeoutInMinutes = 30,\n });\n\n var public_ip = new Azure.Management.Lock(\"public-ip\", new()\n {\n Name = \"resource-ip\",\n Scope = examplePublicIp.Id,\n LockLevel = \"CanNotDelete\",\n Notes = \"Locked because it's needed by a third-party\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"locked-resource-group\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePublicIp, err := network.NewPublicIp(ctx, \"example\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"locked-publicip\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tIdleTimeoutInMinutes: pulumi.Int(30),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"public-ip\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"resource-ip\"),\n\t\t\tScope: examplePublicIp.ID(),\n\t\t\tLockLevel: pulumi.String(\"CanNotDelete\"),\n\t\t\tNotes: pulumi.String(\"Locked because it's needed by a third-party\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"locked-resource-group\")\n .location(\"West Europe\")\n .build());\n\n var examplePublicIp = new PublicIp(\"examplePublicIp\", PublicIpArgs.builder()\n .name(\"locked-publicip\")\n .location(example.location())\n .resourceGroupName(example.name())\n .allocationMethod(\"Static\")\n .idleTimeoutInMinutes(30)\n .build());\n\n var public_ip = new Lock(\"public-ip\", LockArgs.builder()\n .name(\"resource-ip\")\n .scope(examplePublicIp.id())\n .lockLevel(\"CanNotDelete\")\n .notes(\"Locked because it's needed by a third-party\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: locked-resource-group\n location: West Europe\n examplePublicIp:\n type: azure:network:PublicIp\n name: example\n properties:\n name: locked-publicip\n location: ${example.location}\n resourceGroupName: ${example.name}\n allocationMethod: Static\n idleTimeoutInMinutes: 30\n public-ip:\n type: azure:management:Lock\n properties:\n name: resource-ip\n scope: ${examplePublicIp.id}\n lockLevel: CanNotDelete\n notes: Locked because it's needed by a third-party\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManagement Locks can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:management/lock:Lock lock1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Authorization/locks/lock1\n```\n\n", "properties": { "lockLevel": { "type": "string", @@ -206429,7 +206429,7 @@ } }, "azure:management/privateLinkAssociation:PrivateLinkAssociation": { - "description": "Manages a Resource Management Private Link Association.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as random from \"@pulumi/random\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleGetGroup = example.then(example =\u003e azure.management.getGroup({\n name: example.tenantId,\n}));\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst examplePrivateLink = new azure.management.PrivateLink(\"example\", {\n name: \"example\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n});\nconst exampleRandomUuid = new random.RandomUuid(\"example\", {});\nconst examplePrivateLinkAssociation = new azure.management.PrivateLinkAssociation(\"example\", {\n name: exampleRandomUuid.result,\n managementGroupId: exampleAzurermManagementGroup.id,\n resourceManagementPrivateLinkId: examplePrivateLink.id,\n publicNetworkAccessEnabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_random as random\n\nexample = azure.core.get_client_config()\nexample_get_group = azure.management.get_group(name=example.tenant_id)\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\nexample_private_link = azure.management.PrivateLink(\"example\",\n name=\"example\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location)\nexample_random_uuid = random.RandomUuid(\"example\")\nexample_private_link_association = azure.management.PrivateLinkAssociation(\"example\",\n name=example_random_uuid.result,\n management_group_id=example_azurerm_management_group[\"id\"],\n resource_management_private_link_id=example_private_link.id,\n public_network_access_enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Random = Pulumi.Random;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetGroup = Azure.Management.GetGroup.Invoke(new()\n {\n Name = example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var examplePrivateLink = new Azure.Management.PrivateLink(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n });\n\n var exampleRandomUuid = new Random.RandomUuid(\"example\");\n\n var examplePrivateLinkAssociation = new Azure.Management.PrivateLinkAssociation(\"example\", new()\n {\n Name = exampleRandomUuid.Result,\n ManagementGroupId = exampleAzurermManagementGroup.Id,\n ResourceManagementPrivateLinkId = examplePrivateLink.Id,\n PublicNetworkAccessEnabled = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-random/sdk/v4/go/random\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.LookupGroup(ctx, \u0026management.LookupGroupArgs{\n\t\t\tName: pulumi.StringRef(example.TenantId),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePrivateLink, err := management.NewPrivateLink(ctx, \"example\", \u0026management.PrivateLinkArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRandomUuid, err := random.NewRandomUuid(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewPrivateLinkAssociation(ctx, \"example\", \u0026management.PrivateLinkAssociationArgs{\n\t\t\tName: exampleRandomUuid.Result,\n\t\t\tManagementGroupId: pulumi.Any(exampleAzurermManagementGroup.Id),\n\t\t\tResourceManagementPrivateLinkId: examplePrivateLink.ID(),\n\t\t\tPublicNetworkAccessEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.management.ManagementFunctions;\nimport com.pulumi.azure.management.inputs.GetGroupArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.management.PrivateLink;\nimport com.pulumi.azure.management.PrivateLinkArgs;\nimport com.pulumi.random.RandomUuid;\nimport com.pulumi.azure.management.PrivateLinkAssociation;\nimport com.pulumi.azure.management.PrivateLinkAssociationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetGroup = ManagementFunctions.getGroup(GetGroupArgs.builder()\n .name(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n var examplePrivateLink = new PrivateLink(\"examplePrivateLink\", PrivateLinkArgs.builder()\n .name(\"example\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .build());\n\n var exampleRandomUuid = new RandomUuid(\"exampleRandomUuid\");\n\n var examplePrivateLinkAssociation = new PrivateLinkAssociation(\"examplePrivateLinkAssociation\", PrivateLinkAssociationArgs.builder()\n .name(exampleRandomUuid.result())\n .managementGroupId(exampleAzurermManagementGroup.id())\n .resourceManagementPrivateLinkId(examplePrivateLink.id())\n .publicNetworkAccessEnabled(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example\n location: West Europe\n examplePrivateLink:\n type: azure:management:PrivateLink\n name: example\n properties:\n name: example\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n exampleRandomUuid:\n type: random:RandomUuid\n name: example\n examplePrivateLinkAssociation:\n type: azure:management:PrivateLinkAssociation\n name: example\n properties:\n name: ${exampleRandomUuid.result}\n managementGroupId: ${exampleAzurermManagementGroup.id}\n resourceManagementPrivateLinkId: ${examplePrivateLink.id}\n publicNetworkAccessEnabled: true\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetGroup:\n fn::invoke:\n Function: azure:management:getGroup\n Arguments:\n name: ${example.tenantId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn existing Private Link Association can be imported into Pulumi using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:management/privateLinkAssociation:PrivateLinkAssociation example /providers/Microsoft.Management/managementGroups/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/privateLinkAssociations/00000000-0000-0000-0000-000000000000\n```\n\n", + "description": "Manages a Resource Management Private Link Association.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as random from \"@pulumi/random\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleGetGroup = example.then(example =\u003e azure.management.getGroup({\n name: example.tenantId,\n}));\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example\",\n location: \"West Europe\",\n});\nconst examplePrivateLink = new azure.management.PrivateLink(\"example\", {\n name: \"example\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n});\nconst exampleRandomUuid = new random.RandomUuid(\"example\", {});\nconst examplePrivateLinkAssociation = new azure.management.PrivateLinkAssociation(\"example\", {\n name: exampleRandomUuid.result,\n managementGroupId: exampleAzurermManagementGroup.id,\n resourceManagementPrivateLinkId: examplePrivateLink.id,\n publicNetworkAccessEnabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_random as random\n\nexample = azure.core.get_client_config()\nexample_get_group = azure.management.get_group(name=example.tenant_id)\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example\",\n location=\"West Europe\")\nexample_private_link = azure.management.PrivateLink(\"example\",\n name=\"example\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location)\nexample_random_uuid = random.RandomUuid(\"example\")\nexample_private_link_association = azure.management.PrivateLinkAssociation(\"example\",\n name=example_random_uuid.result,\n management_group_id=example_azurerm_management_group[\"id\"],\n resource_management_private_link_id=example_private_link.id,\n public_network_access_enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Random = Pulumi.Random;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetGroup = Azure.Management.GetGroup.Invoke(new()\n {\n Name = example.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example\",\n Location = \"West Europe\",\n });\n\n var examplePrivateLink = new Azure.Management.PrivateLink(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n });\n\n var exampleRandomUuid = new Random.RandomUuid(\"example\");\n\n var examplePrivateLinkAssociation = new Azure.Management.PrivateLinkAssociation(\"example\", new()\n {\n Name = exampleRandomUuid.Result,\n ManagementGroupId = exampleAzurermManagementGroup.Id,\n ResourceManagementPrivateLinkId = examplePrivateLink.Id,\n PublicNetworkAccessEnabled = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-random/sdk/v4/go/random\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.LookupGroup(ctx, \u0026management.LookupGroupArgs{\n\t\t\tName: pulumi.StringRef(example.TenantId),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePrivateLink, err := management.NewPrivateLink(ctx, \"example\", \u0026management.PrivateLinkArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRandomUuid, err := random.NewRandomUuid(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewPrivateLinkAssociation(ctx, \"example\", \u0026management.PrivateLinkAssociationArgs{\n\t\t\tName: exampleRandomUuid.Result,\n\t\t\tManagementGroupId: pulumi.Any(exampleAzurermManagementGroup.Id),\n\t\t\tResourceManagementPrivateLinkId: examplePrivateLink.ID(),\n\t\t\tPublicNetworkAccessEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.management.ManagementFunctions;\nimport com.pulumi.azure.management.inputs.GetGroupArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.management.PrivateLink;\nimport com.pulumi.azure.management.PrivateLinkArgs;\nimport com.pulumi.random.RandomUuid;\nimport com.pulumi.azure.management.PrivateLinkAssociation;\nimport com.pulumi.azure.management.PrivateLinkAssociationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetGroup = ManagementFunctions.getGroup(GetGroupArgs.builder()\n .name(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example\")\n .location(\"West Europe\")\n .build());\n\n var examplePrivateLink = new PrivateLink(\"examplePrivateLink\", PrivateLinkArgs.builder()\n .name(\"example\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .build());\n\n var exampleRandomUuid = new RandomUuid(\"exampleRandomUuid\");\n\n var examplePrivateLinkAssociation = new PrivateLinkAssociation(\"examplePrivateLinkAssociation\", PrivateLinkAssociationArgs.builder()\n .name(exampleRandomUuid.result())\n .managementGroupId(exampleAzurermManagementGroup.id())\n .resourceManagementPrivateLinkId(examplePrivateLink.id())\n .publicNetworkAccessEnabled(true)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example\n location: West Europe\n examplePrivateLink:\n type: azure:management:PrivateLink\n name: example\n properties:\n name: example\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n exampleRandomUuid:\n type: random:RandomUuid\n name: example\n examplePrivateLinkAssociation:\n type: azure:management:PrivateLinkAssociation\n name: example\n properties:\n name: ${exampleRandomUuid.result}\n managementGroupId: ${exampleAzurermManagementGroup.id}\n resourceManagementPrivateLinkId: ${examplePrivateLink.id}\n publicNetworkAccessEnabled: true\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetGroup:\n fn::invoke:\n Function: azure:management:getGroup\n Arguments:\n name: ${example.tenantId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn existing Private Link Association can be imported into Pulumi using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:management/privateLinkAssociation:PrivateLinkAssociation example /providers/Microsoft.Management/managementGroups/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/privateLinkAssociations/00000000-0000-0000-0000-000000000000\n```\n\n", "properties": { "managementGroupId": { "type": "string", @@ -206518,7 +206518,7 @@ } }, "azure:managementgroups/managementGroup:ManagementGroup": { - "description": "Manages a Management Group.\n\n!\u003e **Note:** Configuring `subscription_ids` is not supported when using the `azure.management.GroupSubscriptionAssociation` resource, results will be unpredictable.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst exampleParent = new azure.management.Group(\"example_parent\", {\n displayName: \"ParentGroup\",\n subscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n});\nconst exampleChild = new azure.management.Group(\"example_child\", {\n displayName: \"ChildGroup\",\n parentManagementGroupId: exampleParent.id,\n subscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nexample_parent = azure.management.Group(\"example_parent\",\n display_name=\"ParentGroup\",\n subscription_ids=[current.subscription_id])\nexample_child = azure.management.Group(\"example_child\",\n display_name=\"ChildGroup\",\n parent_management_group_id=example_parent.id,\n subscription_ids=[current.subscription_id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleParent = new Azure.Management.Group(\"example_parent\", new()\n {\n DisplayName = \"ParentGroup\",\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.SubscriptionId),\n },\n });\n\n var exampleChild = new Azure.Management.Group(\"example_child\", new()\n {\n DisplayName = \"ChildGroup\",\n ParentManagementGroupId = exampleParent.Id,\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.SubscriptionId),\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleParent, err := management.NewGroup(ctx, \"example_parent\", \u0026management.GroupArgs{\n\t\t\tDisplayName: pulumi.String(\"ParentGroup\"),\n\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewGroup(ctx, \"example_child\", \u0026management.GroupArgs{\n\t\t\tDisplayName: pulumi.String(\"ChildGroup\"),\n\t\t\tParentManagementGroupId: exampleParent.ID(),\n\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.management.GroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var exampleParent = new Group(\"exampleParent\", GroupArgs.builder()\n .displayName(\"ParentGroup\")\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.subscriptionId()))\n .build());\n\n var exampleChild = new Group(\"exampleChild\", GroupArgs.builder()\n .displayName(\"ChildGroup\")\n .parentManagementGroupId(exampleParent.id())\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.subscriptionId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleParent:\n type: azure:management:Group\n name: example_parent\n properties:\n displayName: ParentGroup\n subscriptionIds:\n - ${current.subscriptionId}\n exampleChild:\n type: azure:management:Group\n name: example_child\n properties:\n displayName: ChildGroup\n parentManagementGroupId: ${exampleParent.id}\n subscriptionIds: # other subscription IDs can go here\n - ${current.subscriptionId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManagement Groups can be imported using the `management group resource id`, e.g.\n\n```sh\n$ pulumi import azure:managementgroups/managementGroup:ManagementGroup example /providers/Microsoft.Management/managementGroups/group1\n```\n\n", + "description": "Manages a Management Group.\n\n!\u003e **Note:** Configuring `subscription_ids` is not supported when using the `azure.management.GroupSubscriptionAssociation` resource, results will be unpredictable.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst exampleParent = new azure.management.Group(\"example_parent\", {\n displayName: \"ParentGroup\",\n subscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n});\nconst exampleChild = new azure.management.Group(\"example_child\", {\n displayName: \"ChildGroup\",\n parentManagementGroupId: exampleParent.id,\n subscriptionIds: [current.then(current =\u003e current.subscriptionId)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nexample_parent = azure.management.Group(\"example_parent\",\n display_name=\"ParentGroup\",\n subscription_ids=[current.subscription_id])\nexample_child = azure.management.Group(\"example_child\",\n display_name=\"ChildGroup\",\n parent_management_group_id=example_parent.id,\n subscription_ids=[current.subscription_id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleParent = new Azure.Management.Group(\"example_parent\", new()\n {\n DisplayName = \"ParentGroup\",\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.SubscriptionId),\n },\n });\n\n var exampleChild = new Azure.Management.Group(\"example_child\", new()\n {\n DisplayName = \"ChildGroup\",\n ParentManagementGroupId = exampleParent.Id,\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.SubscriptionId),\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleParent, err := management.NewGroup(ctx, \"example_parent\", \u0026management.GroupArgs{\n\t\t\tDisplayName: pulumi.String(\"ParentGroup\"),\n\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewGroup(ctx, \"example_child\", \u0026management.GroupArgs{\n\t\t\tDisplayName: pulumi.String(\"ChildGroup\"),\n\t\t\tParentManagementGroupId: exampleParent.ID(),\n\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.management.GroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var exampleParent = new Group(\"exampleParent\", GroupArgs.builder()\n .displayName(\"ParentGroup\")\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.subscriptionId()))\n .build());\n\n var exampleChild = new Group(\"exampleChild\", GroupArgs.builder()\n .displayName(\"ChildGroup\")\n .parentManagementGroupId(exampleParent.id())\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.subscriptionId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleParent:\n type: azure:management:Group\n name: example_parent\n properties:\n displayName: ParentGroup\n subscriptionIds:\n - ${current.subscriptionId}\n exampleChild:\n type: azure:management:Group\n name: example_child\n properties:\n displayName: ChildGroup\n parentManagementGroupId: ${exampleParent.id}\n subscriptionIds: # other subscription IDs can go here\n - ${current.subscriptionId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManagement Groups can be imported using the `management group resource id`, e.g.\n\n```sh\n$ pulumi import azure:managementgroups/managementGroup:ManagementGroup example /providers/Microsoft.Management/managementGroups/group1\n```\n\n", "properties": { "displayName": { "type": "string", @@ -206606,7 +206606,7 @@ "deprecationMessage": "azure.managementgroups.ManagementGroup has been deprecated in favor of azure.management.Group" }, "azure:managementresource/manangementLock:ManangementLock": { - "description": "Manages a Management Lock which is scoped to a Subscription, Resource Group or Resource.\n\n## Example Usage\n\n### Subscription Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst subscription_level = new azure.management.Lock(\"subscription-level\", {\n name: \"subscription-level\",\n scope: current.then(current =\u003e current.id),\n lockLevel: \"CanNotDelete\",\n notes: \"Items can't be deleted in this subscription!\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nsubscription_level = azure.management.Lock(\"subscription-level\",\n name=\"subscription-level\",\n scope=current.id,\n lock_level=\"CanNotDelete\",\n notes=\"Items can't be deleted in this subscription!\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var subscription_level = new Azure.Management.Lock(\"subscription-level\", new()\n {\n Name = \"subscription-level\",\n Scope = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n LockLevel = \"CanNotDelete\",\n Notes = \"Items can't be deleted in this subscription!\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"subscription-level\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"subscription-level\"),\n\t\t\tScope: pulumi.String(current.Id),\n\t\t\tLockLevel: pulumi.String(\"CanNotDelete\"),\n\t\t\tNotes: pulumi.String(\"Items can't be deleted in this subscription!\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var subscription_level = new Lock(\"subscription-level\", LockArgs.builder()\n .name(\"subscription-level\")\n .scope(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .lockLevel(\"CanNotDelete\")\n .notes(\"Items can't be deleted in this subscription!\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n subscription-level:\n type: azure:management:Lock\n properties:\n name: subscription-level\n scope: ${current.id}\n lockLevel: CanNotDelete\n notes: Items can't be deleted in this subscription!\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Resource Group Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"locked-resource-group\",\n location: \"West Europe\",\n});\nconst resource_group_level = new azure.management.Lock(\"resource-group-level\", {\n name: \"resource-group-level\",\n scope: example.id,\n lockLevel: \"ReadOnly\",\n notes: \"This Resource Group is Read-Only\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"locked-resource-group\",\n location=\"West Europe\")\nresource_group_level = azure.management.Lock(\"resource-group-level\",\n name=\"resource-group-level\",\n scope=example.id,\n lock_level=\"ReadOnly\",\n notes=\"This Resource Group is Read-Only\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"locked-resource-group\",\n Location = \"West Europe\",\n });\n\n var resource_group_level = new Azure.Management.Lock(\"resource-group-level\", new()\n {\n Name = \"resource-group-level\",\n Scope = example.Id,\n LockLevel = \"ReadOnly\",\n Notes = \"This Resource Group is Read-Only\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"locked-resource-group\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"resource-group-level\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"resource-group-level\"),\n\t\t\tScope: example.ID(),\n\t\t\tLockLevel: pulumi.String(\"ReadOnly\"),\n\t\t\tNotes: pulumi.String(\"This Resource Group is Read-Only\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"locked-resource-group\")\n .location(\"West Europe\")\n .build());\n\n var resource_group_level = new Lock(\"resource-group-level\", LockArgs.builder()\n .name(\"resource-group-level\")\n .scope(example.id())\n .lockLevel(\"ReadOnly\")\n .notes(\"This Resource Group is Read-Only\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: locked-resource-group\n location: West Europe\n resource-group-level:\n type: azure:management:Lock\n properties:\n name: resource-group-level\n scope: ${example.id}\n lockLevel: ReadOnly\n notes: This Resource Group is Read-Only\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Resource Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"locked-resource-group\",\n location: \"West Europe\",\n});\nconst examplePublicIp = new azure.network.PublicIp(\"example\", {\n name: \"locked-publicip\",\n location: example.location,\n resourceGroupName: example.name,\n allocationMethod: \"Static\",\n idleTimeoutInMinutes: 30,\n});\nconst public_ip = new azure.management.Lock(\"public-ip\", {\n name: \"resource-ip\",\n scope: examplePublicIp.id,\n lockLevel: \"CanNotDelete\",\n notes: \"Locked because it's needed by a third-party\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"locked-resource-group\",\n location=\"West Europe\")\nexample_public_ip = azure.network.PublicIp(\"example\",\n name=\"locked-publicip\",\n location=example.location,\n resource_group_name=example.name,\n allocation_method=\"Static\",\n idle_timeout_in_minutes=30)\npublic_ip = azure.management.Lock(\"public-ip\",\n name=\"resource-ip\",\n scope=example_public_ip.id,\n lock_level=\"CanNotDelete\",\n notes=\"Locked because it's needed by a third-party\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"locked-resource-group\",\n Location = \"West Europe\",\n });\n\n var examplePublicIp = new Azure.Network.PublicIp(\"example\", new()\n {\n Name = \"locked-publicip\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AllocationMethod = \"Static\",\n IdleTimeoutInMinutes = 30,\n });\n\n var public_ip = new Azure.Management.Lock(\"public-ip\", new()\n {\n Name = \"resource-ip\",\n Scope = examplePublicIp.Id,\n LockLevel = \"CanNotDelete\",\n Notes = \"Locked because it's needed by a third-party\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"locked-resource-group\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePublicIp, err := network.NewPublicIp(ctx, \"example\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"locked-publicip\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tIdleTimeoutInMinutes: pulumi.Int(30),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"public-ip\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"resource-ip\"),\n\t\t\tScope: examplePublicIp.ID(),\n\t\t\tLockLevel: pulumi.String(\"CanNotDelete\"),\n\t\t\tNotes: pulumi.String(\"Locked because it's needed by a third-party\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"locked-resource-group\")\n .location(\"West Europe\")\n .build());\n\n var examplePublicIp = new PublicIp(\"examplePublicIp\", PublicIpArgs.builder()\n .name(\"locked-publicip\")\n .location(example.location())\n .resourceGroupName(example.name())\n .allocationMethod(\"Static\")\n .idleTimeoutInMinutes(30)\n .build());\n\n var public_ip = new Lock(\"public-ip\", LockArgs.builder()\n .name(\"resource-ip\")\n .scope(examplePublicIp.id())\n .lockLevel(\"CanNotDelete\")\n .notes(\"Locked because it's needed by a third-party\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: locked-resource-group\n location: West Europe\n examplePublicIp:\n type: azure:network:PublicIp\n name: example\n properties:\n name: locked-publicip\n location: ${example.location}\n resourceGroupName: ${example.name}\n allocationMethod: Static\n idleTimeoutInMinutes: 30\n public-ip:\n type: azure:management:Lock\n properties:\n name: resource-ip\n scope: ${examplePublicIp.id}\n lockLevel: CanNotDelete\n notes: Locked because it's needed by a third-party\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManagement Locks can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:managementresource/manangementLock:ManangementLock lock1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Authorization/locks/lock1\n```\n\n", + "description": "Manages a Management Lock which is scoped to a Subscription, Resource Group or Resource.\n\n## Example Usage\n\n### Subscription Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst subscription_level = new azure.management.Lock(\"subscription-level\", {\n name: \"subscription-level\",\n scope: current.then(current =\u003e current.id),\n lockLevel: \"CanNotDelete\",\n notes: \"Items can't be deleted in this subscription!\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\nsubscription_level = azure.management.Lock(\"subscription-level\",\n name=\"subscription-level\",\n scope=current.id,\n lock_level=\"CanNotDelete\",\n notes=\"Items can't be deleted in this subscription!\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var subscription_level = new Azure.Management.Lock(\"subscription-level\", new()\n {\n Name = \"subscription-level\",\n Scope = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n LockLevel = \"CanNotDelete\",\n Notes = \"Items can't be deleted in this subscription!\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"subscription-level\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"subscription-level\"),\n\t\t\tScope: pulumi.String(current.Id),\n\t\t\tLockLevel: pulumi.String(\"CanNotDelete\"),\n\t\t\tNotes: pulumi.String(\"Items can't be deleted in this subscription!\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n var subscription_level = new Lock(\"subscription-level\", LockArgs.builder()\n .name(\"subscription-level\")\n .scope(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .lockLevel(\"CanNotDelete\")\n .notes(\"Items can't be deleted in this subscription!\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n subscription-level:\n type: azure:management:Lock\n properties:\n name: subscription-level\n scope: ${current.id}\n lockLevel: CanNotDelete\n notes: Items can't be deleted in this subscription!\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Resource Group Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"locked-resource-group\",\n location: \"West Europe\",\n});\nconst resource_group_level = new azure.management.Lock(\"resource-group-level\", {\n name: \"resource-group-level\",\n scope: example.id,\n lockLevel: \"ReadOnly\",\n notes: \"This Resource Group is Read-Only\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"locked-resource-group\",\n location=\"West Europe\")\nresource_group_level = azure.management.Lock(\"resource-group-level\",\n name=\"resource-group-level\",\n scope=example.id,\n lock_level=\"ReadOnly\",\n notes=\"This Resource Group is Read-Only\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"locked-resource-group\",\n Location = \"West Europe\",\n });\n\n var resource_group_level = new Azure.Management.Lock(\"resource-group-level\", new()\n {\n Name = \"resource-group-level\",\n Scope = example.Id,\n LockLevel = \"ReadOnly\",\n Notes = \"This Resource Group is Read-Only\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"locked-resource-group\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"resource-group-level\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"resource-group-level\"),\n\t\t\tScope: example.ID(),\n\t\t\tLockLevel: pulumi.String(\"ReadOnly\"),\n\t\t\tNotes: pulumi.String(\"This Resource Group is Read-Only\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"locked-resource-group\")\n .location(\"West Europe\")\n .build());\n\n var resource_group_level = new Lock(\"resource-group-level\", LockArgs.builder()\n .name(\"resource-group-level\")\n .scope(example.id())\n .lockLevel(\"ReadOnly\")\n .notes(\"This Resource Group is Read-Only\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: locked-resource-group\n location: West Europe\n resource-group-level:\n type: azure:management:Lock\n properties:\n name: resource-group-level\n scope: ${example.id}\n lockLevel: ReadOnly\n notes: This Resource Group is Read-Only\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Resource Level Lock)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"locked-resource-group\",\n location: \"West Europe\",\n});\nconst examplePublicIp = new azure.network.PublicIp(\"example\", {\n name: \"locked-publicip\",\n location: example.location,\n resourceGroupName: example.name,\n allocationMethod: \"Static\",\n idleTimeoutInMinutes: 30,\n});\nconst public_ip = new azure.management.Lock(\"public-ip\", {\n name: \"resource-ip\",\n scope: examplePublicIp.id,\n lockLevel: \"CanNotDelete\",\n notes: \"Locked because it's needed by a third-party\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"locked-resource-group\",\n location=\"West Europe\")\nexample_public_ip = azure.network.PublicIp(\"example\",\n name=\"locked-publicip\",\n location=example.location,\n resource_group_name=example.name,\n allocation_method=\"Static\",\n idle_timeout_in_minutes=30)\npublic_ip = azure.management.Lock(\"public-ip\",\n name=\"resource-ip\",\n scope=example_public_ip.id,\n lock_level=\"CanNotDelete\",\n notes=\"Locked because it's needed by a third-party\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"locked-resource-group\",\n Location = \"West Europe\",\n });\n\n var examplePublicIp = new Azure.Network.PublicIp(\"example\", new()\n {\n Name = \"locked-publicip\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AllocationMethod = \"Static\",\n IdleTimeoutInMinutes = 30,\n });\n\n var public_ip = new Azure.Management.Lock(\"public-ip\", new()\n {\n Name = \"resource-ip\",\n Scope = examplePublicIp.Id,\n LockLevel = \"CanNotDelete\",\n Notes = \"Locked because it's needed by a third-party\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"locked-resource-group\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePublicIp, err := network.NewPublicIp(ctx, \"example\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"locked-publicip\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tIdleTimeoutInMinutes: pulumi.Int(30),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewLock(ctx, \"public-ip\", \u0026management.LockArgs{\n\t\t\tName: pulumi.String(\"resource-ip\"),\n\t\t\tScope: examplePublicIp.ID(),\n\t\t\tLockLevel: pulumi.String(\"CanNotDelete\"),\n\t\t\tNotes: pulumi.String(\"Locked because it's needed by a third-party\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.management.Lock;\nimport com.pulumi.azure.management.LockArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"locked-resource-group\")\n .location(\"West Europe\")\n .build());\n\n var examplePublicIp = new PublicIp(\"examplePublicIp\", PublicIpArgs.builder()\n .name(\"locked-publicip\")\n .location(example.location())\n .resourceGroupName(example.name())\n .allocationMethod(\"Static\")\n .idleTimeoutInMinutes(30)\n .build());\n\n var public_ip = new Lock(\"public-ip\", LockArgs.builder()\n .name(\"resource-ip\")\n .scope(examplePublicIp.id())\n .lockLevel(\"CanNotDelete\")\n .notes(\"Locked because it's needed by a third-party\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: locked-resource-group\n location: West Europe\n examplePublicIp:\n type: azure:network:PublicIp\n name: example\n properties:\n name: locked-publicip\n location: ${example.location}\n resourceGroupName: ${example.name}\n allocationMethod: Static\n idleTimeoutInMinutes: 30\n public-ip:\n type: azure:management:Lock\n properties:\n name: resource-ip\n scope: ${examplePublicIp.id}\n lockLevel: CanNotDelete\n notes: Locked because it's needed by a third-party\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nManagement Locks can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:managementresource/manangementLock:ManangementLock lock1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Authorization/locks/lock1\n```\n\n", "properties": { "lockLevel": { "type": "string", @@ -208995,7 +208995,7 @@ } }, "azure:monitoring/actionGroup:ActionGroup": { - "description": "Manages an Action Group within Azure Monitor.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"monitoring-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleAnalyticsWorkspace = new azure.operationalinsights.AnalyticsWorkspace(\"example\", {\n name: \"workspace-01\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleActionGroup = new azure.monitoring.ActionGroup(\"example\", {\n name: \"CriticalAlertsAction\",\n resourceGroupName: example.name,\n shortName: \"p0action\",\n armRoleReceivers: [{\n name: \"armroleaction\",\n roleId: \"de139f84-1756-47ae-9be6-808fbbe84772\",\n useCommonAlertSchema: true,\n }],\n automationRunbookReceivers: [{\n name: \"action_name_1\",\n automationAccountId: \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\",\n runbookName: \"my runbook\",\n webhookResourceId: \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\",\n isGlobalRunbook: true,\n serviceUri: \"https://s13events.azure-automation.net/webhooks?token=randomtoken\",\n useCommonAlertSchema: true,\n }],\n azureAppPushReceivers: [{\n name: \"pushtoadmin\",\n emailAddress: \"admin@contoso.com\",\n }],\n azureFunctionReceivers: [{\n name: \"funcaction\",\n functionAppResourceId: \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\",\n functionName: \"myfunc\",\n httpTriggerUrl: \"https://example.com/trigger\",\n useCommonAlertSchema: true,\n }],\n emailReceivers: [\n {\n name: \"sendtoadmin\",\n emailAddress: \"admin@contoso.com\",\n },\n {\n name: \"sendtodevops\",\n emailAddress: \"devops@contoso.com\",\n useCommonAlertSchema: true,\n },\n ],\n eventHubReceivers: [{\n name: \"sendtoeventhub\",\n eventHubNamespace: \"eventhubnamespace\",\n eventHubName: \"eventhub1\",\n subscriptionId: \"00000000-0000-0000-0000-000000000000\",\n useCommonAlertSchema: false,\n }],\n itsmReceivers: [{\n name: \"createorupdateticket\",\n workspaceId: pulumi.all([current, exampleAnalyticsWorkspace.workspaceId]).apply(([current, workspaceId]) =\u003e `${current.subscriptionId}|${workspaceId}`),\n connectionId: \"53de6956-42b4-41ba-be3c-b154cdf17b13\",\n ticketConfiguration: \"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\",\n region: \"southcentralus\",\n }],\n logicAppReceivers: [{\n name: \"logicappaction\",\n resourceId: \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\",\n callbackUrl: \"https://logicapptriggerurl/...\",\n useCommonAlertSchema: true,\n }],\n smsReceivers: [{\n name: \"oncallmsg\",\n countryCode: \"1\",\n phoneNumber: \"1231231234\",\n }],\n voiceReceivers: [{\n name: \"remotesupport\",\n countryCode: \"86\",\n phoneNumber: \"13888888888\",\n }],\n webhookReceivers: [{\n name: \"callmyapiaswell\",\n serviceUri: \"http://example.com/alert\",\n useCommonAlertSchema: true,\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"monitoring-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_analytics_workspace = azure.operationalinsights.AnalyticsWorkspace(\"example\",\n name=\"workspace-01\",\n location=example.location,\n resource_group_name=example.name)\nexample_action_group = azure.monitoring.ActionGroup(\"example\",\n name=\"CriticalAlertsAction\",\n resource_group_name=example.name,\n short_name=\"p0action\",\n arm_role_receivers=[{\n \"name\": \"armroleaction\",\n \"role_id\": \"de139f84-1756-47ae-9be6-808fbbe84772\",\n \"use_common_alert_schema\": True,\n }],\n automation_runbook_receivers=[{\n \"name\": \"action_name_1\",\n \"automation_account_id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\",\n \"runbook_name\": \"my runbook\",\n \"webhook_resource_id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\",\n \"is_global_runbook\": True,\n \"service_uri\": \"https://s13events.azure-automation.net/webhooks?token=randomtoken\",\n \"use_common_alert_schema\": True,\n }],\n azure_app_push_receivers=[{\n \"name\": \"pushtoadmin\",\n \"email_address\": \"admin@contoso.com\",\n }],\n azure_function_receivers=[{\n \"name\": \"funcaction\",\n \"function_app_resource_id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\",\n \"function_name\": \"myfunc\",\n \"http_trigger_url\": \"https://example.com/trigger\",\n \"use_common_alert_schema\": True,\n }],\n email_receivers=[\n {\n \"name\": \"sendtoadmin\",\n \"email_address\": \"admin@contoso.com\",\n },\n {\n \"name\": \"sendtodevops\",\n \"email_address\": \"devops@contoso.com\",\n \"use_common_alert_schema\": True,\n },\n ],\n event_hub_receivers=[{\n \"name\": \"sendtoeventhub\",\n \"event_hub_namespace\": \"eventhubnamespace\",\n \"event_hub_name\": \"eventhub1\",\n \"subscription_id\": \"00000000-0000-0000-0000-000000000000\",\n \"use_common_alert_schema\": False,\n }],\n itsm_receivers=[{\n \"name\": \"createorupdateticket\",\n \"workspace_id\": example_analytics_workspace.workspace_id.apply(lambda workspace_id: f\"{current.subscription_id}|{workspace_id}\"),\n \"connection_id\": \"53de6956-42b4-41ba-be3c-b154cdf17b13\",\n \"ticket_configuration\": \"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\",\n \"region\": \"southcentralus\",\n }],\n logic_app_receivers=[{\n \"name\": \"logicappaction\",\n \"resource_id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\",\n \"callback_url\": \"https://logicapptriggerurl/...\",\n \"use_common_alert_schema\": True,\n }],\n sms_receivers=[{\n \"name\": \"oncallmsg\",\n \"country_code\": \"1\",\n \"phone_number\": \"1231231234\",\n }],\n voice_receivers=[{\n \"name\": \"remotesupport\",\n \"country_code\": \"86\",\n \"phone_number\": \"13888888888\",\n }],\n webhook_receivers=[{\n \"name\": \"callmyapiaswell\",\n \"service_uri\": \"http://example.com/alert\",\n \"use_common_alert_schema\": True,\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"monitoring-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAnalyticsWorkspace = new Azure.OperationalInsights.AnalyticsWorkspace(\"example\", new()\n {\n Name = \"workspace-01\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleActionGroup = new Azure.Monitoring.ActionGroup(\"example\", new()\n {\n Name = \"CriticalAlertsAction\",\n ResourceGroupName = example.Name,\n ShortName = \"p0action\",\n ArmRoleReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupArmRoleReceiverArgs\n {\n Name = \"armroleaction\",\n RoleId = \"de139f84-1756-47ae-9be6-808fbbe84772\",\n UseCommonAlertSchema = true,\n },\n },\n AutomationRunbookReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupAutomationRunbookReceiverArgs\n {\n Name = \"action_name_1\",\n AutomationAccountId = \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\",\n RunbookName = \"my runbook\",\n WebhookResourceId = \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\",\n IsGlobalRunbook = true,\n ServiceUri = \"https://s13events.azure-automation.net/webhooks?token=randomtoken\",\n UseCommonAlertSchema = true,\n },\n },\n AzureAppPushReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupAzureAppPushReceiverArgs\n {\n Name = \"pushtoadmin\",\n EmailAddress = \"admin@contoso.com\",\n },\n },\n AzureFunctionReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupAzureFunctionReceiverArgs\n {\n Name = \"funcaction\",\n FunctionAppResourceId = \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\",\n FunctionName = \"myfunc\",\n HttpTriggerUrl = \"https://example.com/trigger\",\n UseCommonAlertSchema = true,\n },\n },\n EmailReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupEmailReceiverArgs\n {\n Name = \"sendtoadmin\",\n EmailAddress = \"admin@contoso.com\",\n },\n new Azure.Monitoring.Inputs.ActionGroupEmailReceiverArgs\n {\n Name = \"sendtodevops\",\n EmailAddress = \"devops@contoso.com\",\n UseCommonAlertSchema = true,\n },\n },\n EventHubReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupEventHubReceiverArgs\n {\n Name = \"sendtoeventhub\",\n EventHubNamespace = \"eventhubnamespace\",\n EventHubName = \"eventhub1\",\n SubscriptionId = \"00000000-0000-0000-0000-000000000000\",\n UseCommonAlertSchema = false,\n },\n },\n ItsmReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupItsmReceiverArgs\n {\n Name = \"createorupdateticket\",\n WorkspaceId = Output.Tuple(current, exampleAnalyticsWorkspace.WorkspaceId).Apply(values =\u003e\n {\n var current = values.Item1;\n var workspaceId = values.Item2;\n return $\"{current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId)}|{workspaceId}\";\n }),\n ConnectionId = \"53de6956-42b4-41ba-be3c-b154cdf17b13\",\n TicketConfiguration = \"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\",\n Region = \"southcentralus\",\n },\n },\n LogicAppReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupLogicAppReceiverArgs\n {\n Name = \"logicappaction\",\n ResourceId = \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\",\n CallbackUrl = \"https://logicapptriggerurl/...\",\n UseCommonAlertSchema = true,\n },\n },\n SmsReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupSmsReceiverArgs\n {\n Name = \"oncallmsg\",\n CountryCode = \"1\",\n PhoneNumber = \"1231231234\",\n },\n },\n VoiceReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupVoiceReceiverArgs\n {\n Name = \"remotesupport\",\n CountryCode = \"86\",\n PhoneNumber = \"13888888888\",\n },\n },\n WebhookReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupWebhookReceiverArgs\n {\n Name = \"callmyapiaswell\",\n ServiceUri = \"http://example.com/alert\",\n UseCommonAlertSchema = true,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/monitoring\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/operationalinsights\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"monitoring-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAnalyticsWorkspace, err := operationalinsights.NewAnalyticsWorkspace(ctx, \"example\", \u0026operationalinsights.AnalyticsWorkspaceArgs{\n\t\t\tName: pulumi.String(\"workspace-01\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = monitoring.NewActionGroup(ctx, \"example\", \u0026monitoring.ActionGroupArgs{\n\t\t\tName: pulumi.String(\"CriticalAlertsAction\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tShortName: pulumi.String(\"p0action\"),\n\t\t\tArmRoleReceivers: monitoring.ActionGroupArmRoleReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupArmRoleReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"armroleaction\"),\n\t\t\t\t\tRoleId: pulumi.String(\"de139f84-1756-47ae-9be6-808fbbe84772\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAutomationRunbookReceivers: monitoring.ActionGroupAutomationRunbookReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupAutomationRunbookReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"action_name_1\"),\n\t\t\t\t\tAutomationAccountId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\"),\n\t\t\t\t\tRunbookName: pulumi.String(\"my runbook\"),\n\t\t\t\t\tWebhookResourceId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\"),\n\t\t\t\t\tIsGlobalRunbook: pulumi.Bool(true),\n\t\t\t\t\tServiceUri: pulumi.String(\"https://s13events.azure-automation.net/webhooks?token=randomtoken\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAzureAppPushReceivers: monitoring.ActionGroupAzureAppPushReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupAzureAppPushReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"pushtoadmin\"),\n\t\t\t\t\tEmailAddress: pulumi.String(\"admin@contoso.com\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAzureFunctionReceivers: monitoring.ActionGroupAzureFunctionReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupAzureFunctionReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"funcaction\"),\n\t\t\t\t\tFunctionAppResourceId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\"),\n\t\t\t\t\tFunctionName: pulumi.String(\"myfunc\"),\n\t\t\t\t\tHttpTriggerUrl: pulumi.String(\"https://example.com/trigger\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEmailReceivers: monitoring.ActionGroupEmailReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupEmailReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"sendtoadmin\"),\n\t\t\t\t\tEmailAddress: pulumi.String(\"admin@contoso.com\"),\n\t\t\t\t},\n\t\t\t\t\u0026monitoring.ActionGroupEmailReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"sendtodevops\"),\n\t\t\t\t\tEmailAddress: pulumi.String(\"devops@contoso.com\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEventHubReceivers: monitoring.ActionGroupEventHubReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupEventHubReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"sendtoeventhub\"),\n\t\t\t\t\tEventHubNamespace: pulumi.String(\"eventhubnamespace\"),\n\t\t\t\t\tEventHubName: pulumi.String(\"eventhub1\"),\n\t\t\t\t\tSubscriptionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(false),\n\t\t\t\t},\n\t\t\t},\n\t\t\tItsmReceivers: monitoring.ActionGroupItsmReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupItsmReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"createorupdateticket\"),\n\t\t\t\t\tWorkspaceId: exampleAnalyticsWorkspace.WorkspaceId.ApplyT(func(workspaceId string) (string, error) {\n\t\t\t\t\t\treturn fmt.Sprintf(\"%v|%v\", current.SubscriptionId, workspaceId), nil\n\t\t\t\t\t}).(pulumi.StringOutput),\n\t\t\t\t\tConnectionId: pulumi.String(\"53de6956-42b4-41ba-be3c-b154cdf17b13\"),\n\t\t\t\t\tTicketConfiguration: pulumi.String(\"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\"),\n\t\t\t\t\tRegion: pulumi.String(\"southcentralus\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tLogicAppReceivers: monitoring.ActionGroupLogicAppReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupLogicAppReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"logicappaction\"),\n\t\t\t\t\tResourceId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\"),\n\t\t\t\t\tCallbackUrl: pulumi.String(\"https://logicapptriggerurl/...\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSmsReceivers: monitoring.ActionGroupSmsReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupSmsReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"oncallmsg\"),\n\t\t\t\t\tCountryCode: pulumi.String(\"1\"),\n\t\t\t\t\tPhoneNumber: pulumi.String(\"1231231234\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tVoiceReceivers: monitoring.ActionGroupVoiceReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupVoiceReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"remotesupport\"),\n\t\t\t\t\tCountryCode: pulumi.String(\"86\"),\n\t\t\t\t\tPhoneNumber: pulumi.String(\"13888888888\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tWebhookReceivers: monitoring.ActionGroupWebhookReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupWebhookReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"callmyapiaswell\"),\n\t\t\t\t\tServiceUri: pulumi.String(\"http://example.com/alert\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.operationalinsights.AnalyticsWorkspace;\nimport com.pulumi.azure.operationalinsights.AnalyticsWorkspaceArgs;\nimport com.pulumi.azure.monitoring.ActionGroup;\nimport com.pulumi.azure.monitoring.ActionGroupArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupArmRoleReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupAutomationRunbookReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupAzureAppPushReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupAzureFunctionReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupEmailReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupEventHubReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupItsmReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupLogicAppReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupSmsReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupVoiceReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupWebhookReceiverArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"monitoring-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleAnalyticsWorkspace = new AnalyticsWorkspace(\"exampleAnalyticsWorkspace\", AnalyticsWorkspaceArgs.builder()\n .name(\"workspace-01\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleActionGroup = new ActionGroup(\"exampleActionGroup\", ActionGroupArgs.builder()\n .name(\"CriticalAlertsAction\")\n .resourceGroupName(example.name())\n .shortName(\"p0action\")\n .armRoleReceivers(ActionGroupArmRoleReceiverArgs.builder()\n .name(\"armroleaction\")\n .roleId(\"de139f84-1756-47ae-9be6-808fbbe84772\")\n .useCommonAlertSchema(true)\n .build())\n .automationRunbookReceivers(ActionGroupAutomationRunbookReceiverArgs.builder()\n .name(\"action_name_1\")\n .automationAccountId(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\")\n .runbookName(\"my runbook\")\n .webhookResourceId(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\")\n .isGlobalRunbook(true)\n .serviceUri(\"https://s13events.azure-automation.net/webhooks?token=randomtoken\")\n .useCommonAlertSchema(true)\n .build())\n .azureAppPushReceivers(ActionGroupAzureAppPushReceiverArgs.builder()\n .name(\"pushtoadmin\")\n .emailAddress(\"admin@contoso.com\")\n .build())\n .azureFunctionReceivers(ActionGroupAzureFunctionReceiverArgs.builder()\n .name(\"funcaction\")\n .functionAppResourceId(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\")\n .functionName(\"myfunc\")\n .httpTriggerUrl(\"https://example.com/trigger\")\n .useCommonAlertSchema(true)\n .build())\n .emailReceivers( \n ActionGroupEmailReceiverArgs.builder()\n .name(\"sendtoadmin\")\n .emailAddress(\"admin@contoso.com\")\n .build(),\n ActionGroupEmailReceiverArgs.builder()\n .name(\"sendtodevops\")\n .emailAddress(\"devops@contoso.com\")\n .useCommonAlertSchema(true)\n .build())\n .eventHubReceivers(ActionGroupEventHubReceiverArgs.builder()\n .name(\"sendtoeventhub\")\n .eventHubNamespace(\"eventhubnamespace\")\n .eventHubName(\"eventhub1\")\n .subscriptionId(\"00000000-0000-0000-0000-000000000000\")\n .useCommonAlertSchema(false)\n .build())\n .itsmReceivers(ActionGroupItsmReceiverArgs.builder()\n .name(\"createorupdateticket\")\n .workspaceId(exampleAnalyticsWorkspace.workspaceId().applyValue(workspaceId -\u003e String.format(\"%s|%s\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()),workspaceId)))\n .connectionId(\"53de6956-42b4-41ba-be3c-b154cdf17b13\")\n .ticketConfiguration(\"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\")\n .region(\"southcentralus\")\n .build())\n .logicAppReceivers(ActionGroupLogicAppReceiverArgs.builder()\n .name(\"logicappaction\")\n .resourceId(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\")\n .callbackUrl(\"https://logicapptriggerurl/...\")\n .useCommonAlertSchema(true)\n .build())\n .smsReceivers(ActionGroupSmsReceiverArgs.builder()\n .name(\"oncallmsg\")\n .countryCode(\"1\")\n .phoneNumber(\"1231231234\")\n .build())\n .voiceReceivers(ActionGroupVoiceReceiverArgs.builder()\n .name(\"remotesupport\")\n .countryCode(\"86\")\n .phoneNumber(\"13888888888\")\n .build())\n .webhookReceivers(ActionGroupWebhookReceiverArgs.builder()\n .name(\"callmyapiaswell\")\n .serviceUri(\"http://example.com/alert\")\n .useCommonAlertSchema(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: monitoring-resources\n location: West Europe\n exampleAnalyticsWorkspace:\n type: azure:operationalinsights:AnalyticsWorkspace\n name: example\n properties:\n name: workspace-01\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleActionGroup:\n type: azure:monitoring:ActionGroup\n name: example\n properties:\n name: CriticalAlertsAction\n resourceGroupName: ${example.name}\n shortName: p0action\n armRoleReceivers:\n - name: armroleaction\n roleId: de139f84-1756-47ae-9be6-808fbbe84772\n useCommonAlertSchema: true\n automationRunbookReceivers:\n - name: action_name_1\n automationAccountId: /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\n runbookName: my runbook\n webhookResourceId: /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\n isGlobalRunbook: true\n serviceUri: https://s13events.azure-automation.net/webhooks?token=randomtoken\n useCommonAlertSchema: true\n azureAppPushReceivers:\n - name: pushtoadmin\n emailAddress: admin@contoso.com\n azureFunctionReceivers:\n - name: funcaction\n functionAppResourceId: /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\n functionName: myfunc\n httpTriggerUrl: https://example.com/trigger\n useCommonAlertSchema: true\n emailReceivers:\n - name: sendtoadmin\n emailAddress: admin@contoso.com\n - name: sendtodevops\n emailAddress: devops@contoso.com\n useCommonAlertSchema: true\n eventHubReceivers:\n - name: sendtoeventhub\n eventHubNamespace: eventhubnamespace\n eventHubName: eventhub1\n subscriptionId: 00000000-0000-0000-0000-000000000000\n useCommonAlertSchema: false\n itsmReceivers:\n - name: createorupdateticket\n workspaceId: ${current.subscriptionId}|${exampleAnalyticsWorkspace.workspaceId}\n connectionId: 53de6956-42b4-41ba-be3c-b154cdf17b13\n ticketConfiguration: '{\"PayloadRevision\":0,\"WorkItemType\":\"Incident\",\"UseTemplate\":false,\"WorkItemData\":\"{}\",\"CreateOneWIPerCI\":false}'\n region: southcentralus\n logicAppReceivers:\n - name: logicappaction\n resourceId: /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\n callbackUrl: https://logicapptriggerurl/...\n useCommonAlertSchema: true\n smsReceivers:\n - name: oncallmsg\n countryCode: '1'\n phoneNumber: '1231231234'\n voiceReceivers:\n - name: remotesupport\n countryCode: '86'\n phoneNumber: '13888888888'\n webhookReceivers:\n - name: callmyapiaswell\n serviceUri: http://example.com/alert\n useCommonAlertSchema: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAction Groups can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:monitoring/actionGroup:ActionGroup example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Insights/actionGroups/myagname\n```\n\n", + "description": "Manages an Action Group within Azure Monitor.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"monitoring-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleAnalyticsWorkspace = new azure.operationalinsights.AnalyticsWorkspace(\"example\", {\n name: \"workspace-01\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleActionGroup = new azure.monitoring.ActionGroup(\"example\", {\n name: \"CriticalAlertsAction\",\n resourceGroupName: example.name,\n shortName: \"p0action\",\n armRoleReceivers: [{\n name: \"armroleaction\",\n roleId: \"de139f84-1756-47ae-9be6-808fbbe84772\",\n useCommonAlertSchema: true,\n }],\n automationRunbookReceivers: [{\n name: \"action_name_1\",\n automationAccountId: \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\",\n runbookName: \"my runbook\",\n webhookResourceId: \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\",\n isGlobalRunbook: true,\n serviceUri: \"https://s13events.azure-automation.net/webhooks?token=randomtoken\",\n useCommonAlertSchema: true,\n }],\n azureAppPushReceivers: [{\n name: \"pushtoadmin\",\n emailAddress: \"admin@contoso.com\",\n }],\n azureFunctionReceivers: [{\n name: \"funcaction\",\n functionAppResourceId: \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\",\n functionName: \"myfunc\",\n httpTriggerUrl: \"https://example.com/trigger\",\n useCommonAlertSchema: true,\n }],\n emailReceivers: [\n {\n name: \"sendtoadmin\",\n emailAddress: \"admin@contoso.com\",\n },\n {\n name: \"sendtodevops\",\n emailAddress: \"devops@contoso.com\",\n useCommonAlertSchema: true,\n },\n ],\n eventHubReceivers: [{\n name: \"sendtoeventhub\",\n eventHubNamespace: \"eventhubnamespace\",\n eventHubName: \"eventhub1\",\n subscriptionId: \"00000000-0000-0000-0000-000000000000\",\n useCommonAlertSchema: false,\n }],\n itsmReceivers: [{\n name: \"createorupdateticket\",\n workspaceId: pulumi.all([current, exampleAnalyticsWorkspace.workspaceId]).apply(([current, workspaceId]) =\u003e `${current.subscriptionId}|${workspaceId}`),\n connectionId: \"53de6956-42b4-41ba-be3c-b154cdf17b13\",\n ticketConfiguration: \"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\",\n region: \"southcentralus\",\n }],\n logicAppReceivers: [{\n name: \"logicappaction\",\n resourceId: \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\",\n callbackUrl: \"https://logicapptriggerurl/...\",\n useCommonAlertSchema: true,\n }],\n smsReceivers: [{\n name: \"oncallmsg\",\n countryCode: \"1\",\n phoneNumber: \"1231231234\",\n }],\n voiceReceivers: [{\n name: \"remotesupport\",\n countryCode: \"86\",\n phoneNumber: \"13888888888\",\n }],\n webhookReceivers: [{\n name: \"callmyapiaswell\",\n serviceUri: \"http://example.com/alert\",\n useCommonAlertSchema: true,\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"monitoring-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_analytics_workspace = azure.operationalinsights.AnalyticsWorkspace(\"example\",\n name=\"workspace-01\",\n location=example.location,\n resource_group_name=example.name)\nexample_action_group = azure.monitoring.ActionGroup(\"example\",\n name=\"CriticalAlertsAction\",\n resource_group_name=example.name,\n short_name=\"p0action\",\n arm_role_receivers=[{\n \"name\": \"armroleaction\",\n \"role_id\": \"de139f84-1756-47ae-9be6-808fbbe84772\",\n \"use_common_alert_schema\": True,\n }],\n automation_runbook_receivers=[{\n \"name\": \"action_name_1\",\n \"automation_account_id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\",\n \"runbook_name\": \"my runbook\",\n \"webhook_resource_id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\",\n \"is_global_runbook\": True,\n \"service_uri\": \"https://s13events.azure-automation.net/webhooks?token=randomtoken\",\n \"use_common_alert_schema\": True,\n }],\n azure_app_push_receivers=[{\n \"name\": \"pushtoadmin\",\n \"email_address\": \"admin@contoso.com\",\n }],\n azure_function_receivers=[{\n \"name\": \"funcaction\",\n \"function_app_resource_id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\",\n \"function_name\": \"myfunc\",\n \"http_trigger_url\": \"https://example.com/trigger\",\n \"use_common_alert_schema\": True,\n }],\n email_receivers=[\n {\n \"name\": \"sendtoadmin\",\n \"email_address\": \"admin@contoso.com\",\n },\n {\n \"name\": \"sendtodevops\",\n \"email_address\": \"devops@contoso.com\",\n \"use_common_alert_schema\": True,\n },\n ],\n event_hub_receivers=[{\n \"name\": \"sendtoeventhub\",\n \"event_hub_namespace\": \"eventhubnamespace\",\n \"event_hub_name\": \"eventhub1\",\n \"subscription_id\": \"00000000-0000-0000-0000-000000000000\",\n \"use_common_alert_schema\": False,\n }],\n itsm_receivers=[{\n \"name\": \"createorupdateticket\",\n \"workspace_id\": example_analytics_workspace.workspace_id.apply(lambda workspace_id: f\"{current.subscription_id}|{workspace_id}\"),\n \"connection_id\": \"53de6956-42b4-41ba-be3c-b154cdf17b13\",\n \"ticket_configuration\": \"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\",\n \"region\": \"southcentralus\",\n }],\n logic_app_receivers=[{\n \"name\": \"logicappaction\",\n \"resource_id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\",\n \"callback_url\": \"https://logicapptriggerurl/...\",\n \"use_common_alert_schema\": True,\n }],\n sms_receivers=[{\n \"name\": \"oncallmsg\",\n \"country_code\": \"1\",\n \"phone_number\": \"1231231234\",\n }],\n voice_receivers=[{\n \"name\": \"remotesupport\",\n \"country_code\": \"86\",\n \"phone_number\": \"13888888888\",\n }],\n webhook_receivers=[{\n \"name\": \"callmyapiaswell\",\n \"service_uri\": \"http://example.com/alert\",\n \"use_common_alert_schema\": True,\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"monitoring-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAnalyticsWorkspace = new Azure.OperationalInsights.AnalyticsWorkspace(\"example\", new()\n {\n Name = \"workspace-01\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleActionGroup = new Azure.Monitoring.ActionGroup(\"example\", new()\n {\n Name = \"CriticalAlertsAction\",\n ResourceGroupName = example.Name,\n ShortName = \"p0action\",\n ArmRoleReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupArmRoleReceiverArgs\n {\n Name = \"armroleaction\",\n RoleId = \"de139f84-1756-47ae-9be6-808fbbe84772\",\n UseCommonAlertSchema = true,\n },\n },\n AutomationRunbookReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupAutomationRunbookReceiverArgs\n {\n Name = \"action_name_1\",\n AutomationAccountId = \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\",\n RunbookName = \"my runbook\",\n WebhookResourceId = \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\",\n IsGlobalRunbook = true,\n ServiceUri = \"https://s13events.azure-automation.net/webhooks?token=randomtoken\",\n UseCommonAlertSchema = true,\n },\n },\n AzureAppPushReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupAzureAppPushReceiverArgs\n {\n Name = \"pushtoadmin\",\n EmailAddress = \"admin@contoso.com\",\n },\n },\n AzureFunctionReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupAzureFunctionReceiverArgs\n {\n Name = \"funcaction\",\n FunctionAppResourceId = \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\",\n FunctionName = \"myfunc\",\n HttpTriggerUrl = \"https://example.com/trigger\",\n UseCommonAlertSchema = true,\n },\n },\n EmailReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupEmailReceiverArgs\n {\n Name = \"sendtoadmin\",\n EmailAddress = \"admin@contoso.com\",\n },\n new Azure.Monitoring.Inputs.ActionGroupEmailReceiverArgs\n {\n Name = \"sendtodevops\",\n EmailAddress = \"devops@contoso.com\",\n UseCommonAlertSchema = true,\n },\n },\n EventHubReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupEventHubReceiverArgs\n {\n Name = \"sendtoeventhub\",\n EventHubNamespace = \"eventhubnamespace\",\n EventHubName = \"eventhub1\",\n SubscriptionId = \"00000000-0000-0000-0000-000000000000\",\n UseCommonAlertSchema = false,\n },\n },\n ItsmReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupItsmReceiverArgs\n {\n Name = \"createorupdateticket\",\n WorkspaceId = Output.Tuple(current, exampleAnalyticsWorkspace.WorkspaceId).Apply(values =\u003e\n {\n var current = values.Item1;\n var workspaceId = values.Item2;\n return $\"{current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId)}|{workspaceId}\";\n }),\n ConnectionId = \"53de6956-42b4-41ba-be3c-b154cdf17b13\",\n TicketConfiguration = \"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\",\n Region = \"southcentralus\",\n },\n },\n LogicAppReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupLogicAppReceiverArgs\n {\n Name = \"logicappaction\",\n ResourceId = \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\",\n CallbackUrl = \"https://logicapptriggerurl/...\",\n UseCommonAlertSchema = true,\n },\n },\n SmsReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupSmsReceiverArgs\n {\n Name = \"oncallmsg\",\n CountryCode = \"1\",\n PhoneNumber = \"1231231234\",\n },\n },\n VoiceReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupVoiceReceiverArgs\n {\n Name = \"remotesupport\",\n CountryCode = \"86\",\n PhoneNumber = \"13888888888\",\n },\n },\n WebhookReceivers = new[]\n {\n new Azure.Monitoring.Inputs.ActionGroupWebhookReceiverArgs\n {\n Name = \"callmyapiaswell\",\n ServiceUri = \"http://example.com/alert\",\n UseCommonAlertSchema = true,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/monitoring\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/operationalinsights\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"monitoring-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAnalyticsWorkspace, err := operationalinsights.NewAnalyticsWorkspace(ctx, \"example\", \u0026operationalinsights.AnalyticsWorkspaceArgs{\n\t\t\tName: pulumi.String(\"workspace-01\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = monitoring.NewActionGroup(ctx, \"example\", \u0026monitoring.ActionGroupArgs{\n\t\t\tName: pulumi.String(\"CriticalAlertsAction\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tShortName: pulumi.String(\"p0action\"),\n\t\t\tArmRoleReceivers: monitoring.ActionGroupArmRoleReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupArmRoleReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"armroleaction\"),\n\t\t\t\t\tRoleId: pulumi.String(\"de139f84-1756-47ae-9be6-808fbbe84772\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAutomationRunbookReceivers: monitoring.ActionGroupAutomationRunbookReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupAutomationRunbookReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"action_name_1\"),\n\t\t\t\t\tAutomationAccountId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\"),\n\t\t\t\t\tRunbookName: pulumi.String(\"my runbook\"),\n\t\t\t\t\tWebhookResourceId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\"),\n\t\t\t\t\tIsGlobalRunbook: pulumi.Bool(true),\n\t\t\t\t\tServiceUri: pulumi.String(\"https://s13events.azure-automation.net/webhooks?token=randomtoken\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAzureAppPushReceivers: monitoring.ActionGroupAzureAppPushReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupAzureAppPushReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"pushtoadmin\"),\n\t\t\t\t\tEmailAddress: pulumi.String(\"admin@contoso.com\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAzureFunctionReceivers: monitoring.ActionGroupAzureFunctionReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupAzureFunctionReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"funcaction\"),\n\t\t\t\t\tFunctionAppResourceId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\"),\n\t\t\t\t\tFunctionName: pulumi.String(\"myfunc\"),\n\t\t\t\t\tHttpTriggerUrl: pulumi.String(\"https://example.com/trigger\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEmailReceivers: monitoring.ActionGroupEmailReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupEmailReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"sendtoadmin\"),\n\t\t\t\t\tEmailAddress: pulumi.String(\"admin@contoso.com\"),\n\t\t\t\t},\n\t\t\t\t\u0026monitoring.ActionGroupEmailReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"sendtodevops\"),\n\t\t\t\t\tEmailAddress: pulumi.String(\"devops@contoso.com\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEventHubReceivers: monitoring.ActionGroupEventHubReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupEventHubReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"sendtoeventhub\"),\n\t\t\t\t\tEventHubNamespace: pulumi.String(\"eventhubnamespace\"),\n\t\t\t\t\tEventHubName: pulumi.String(\"eventhub1\"),\n\t\t\t\t\tSubscriptionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(false),\n\t\t\t\t},\n\t\t\t},\n\t\t\tItsmReceivers: monitoring.ActionGroupItsmReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupItsmReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"createorupdateticket\"),\n\t\t\t\t\tWorkspaceId: exampleAnalyticsWorkspace.WorkspaceId.ApplyT(func(workspaceId string) (string, error) {\n\t\t\t\t\t\treturn fmt.Sprintf(\"%v|%v\", current.SubscriptionId, workspaceId), nil\n\t\t\t\t\t}).(pulumi.StringOutput),\n\t\t\t\t\tConnectionId: pulumi.String(\"53de6956-42b4-41ba-be3c-b154cdf17b13\"),\n\t\t\t\t\tTicketConfiguration: pulumi.String(\"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\"),\n\t\t\t\t\tRegion: pulumi.String(\"southcentralus\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tLogicAppReceivers: monitoring.ActionGroupLogicAppReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupLogicAppReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"logicappaction\"),\n\t\t\t\t\tResourceId: pulumi.String(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\"),\n\t\t\t\t\tCallbackUrl: pulumi.String(\"https://logicapptriggerurl/...\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSmsReceivers: monitoring.ActionGroupSmsReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupSmsReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"oncallmsg\"),\n\t\t\t\t\tCountryCode: pulumi.String(\"1\"),\n\t\t\t\t\tPhoneNumber: pulumi.String(\"1231231234\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tVoiceReceivers: monitoring.ActionGroupVoiceReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupVoiceReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"remotesupport\"),\n\t\t\t\t\tCountryCode: pulumi.String(\"86\"),\n\t\t\t\t\tPhoneNumber: pulumi.String(\"13888888888\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tWebhookReceivers: monitoring.ActionGroupWebhookReceiverArray{\n\t\t\t\t\u0026monitoring.ActionGroupWebhookReceiverArgs{\n\t\t\t\t\tName: pulumi.String(\"callmyapiaswell\"),\n\t\t\t\t\tServiceUri: pulumi.String(\"http://example.com/alert\"),\n\t\t\t\t\tUseCommonAlertSchema: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.operationalinsights.AnalyticsWorkspace;\nimport com.pulumi.azure.operationalinsights.AnalyticsWorkspaceArgs;\nimport com.pulumi.azure.monitoring.ActionGroup;\nimport com.pulumi.azure.monitoring.ActionGroupArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupArmRoleReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupAutomationRunbookReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupAzureAppPushReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupAzureFunctionReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupEmailReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupEventHubReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupItsmReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupLogicAppReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupSmsReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupVoiceReceiverArgs;\nimport com.pulumi.azure.monitoring.inputs.ActionGroupWebhookReceiverArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"monitoring-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleAnalyticsWorkspace = new AnalyticsWorkspace(\"exampleAnalyticsWorkspace\", AnalyticsWorkspaceArgs.builder()\n .name(\"workspace-01\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleActionGroup = new ActionGroup(\"exampleActionGroup\", ActionGroupArgs.builder()\n .name(\"CriticalAlertsAction\")\n .resourceGroupName(example.name())\n .shortName(\"p0action\")\n .armRoleReceivers(ActionGroupArmRoleReceiverArgs.builder()\n .name(\"armroleaction\")\n .roleId(\"de139f84-1756-47ae-9be6-808fbbe84772\")\n .useCommonAlertSchema(true)\n .build())\n .automationRunbookReceivers(ActionGroupAutomationRunbookReceiverArgs.builder()\n .name(\"action_name_1\")\n .automationAccountId(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\")\n .runbookName(\"my runbook\")\n .webhookResourceId(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\")\n .isGlobalRunbook(true)\n .serviceUri(\"https://s13events.azure-automation.net/webhooks?token=randomtoken\")\n .useCommonAlertSchema(true)\n .build())\n .azureAppPushReceivers(ActionGroupAzureAppPushReceiverArgs.builder()\n .name(\"pushtoadmin\")\n .emailAddress(\"admin@contoso.com\")\n .build())\n .azureFunctionReceivers(ActionGroupAzureFunctionReceiverArgs.builder()\n .name(\"funcaction\")\n .functionAppResourceId(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\")\n .functionName(\"myfunc\")\n .httpTriggerUrl(\"https://example.com/trigger\")\n .useCommonAlertSchema(true)\n .build())\n .emailReceivers( \n ActionGroupEmailReceiverArgs.builder()\n .name(\"sendtoadmin\")\n .emailAddress(\"admin@contoso.com\")\n .build(),\n ActionGroupEmailReceiverArgs.builder()\n .name(\"sendtodevops\")\n .emailAddress(\"devops@contoso.com\")\n .useCommonAlertSchema(true)\n .build())\n .eventHubReceivers(ActionGroupEventHubReceiverArgs.builder()\n .name(\"sendtoeventhub\")\n .eventHubNamespace(\"eventhubnamespace\")\n .eventHubName(\"eventhub1\")\n .subscriptionId(\"00000000-0000-0000-0000-000000000000\")\n .useCommonAlertSchema(false)\n .build())\n .itsmReceivers(ActionGroupItsmReceiverArgs.builder()\n .name(\"createorupdateticket\")\n .workspaceId(exampleAnalyticsWorkspace.workspaceId().applyValue(workspaceId -\u003e String.format(\"%s|%s\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId()),workspaceId)))\n .connectionId(\"53de6956-42b4-41ba-be3c-b154cdf17b13\")\n .ticketConfiguration(\"{\\\"PayloadRevision\\\":0,\\\"WorkItemType\\\":\\\"Incident\\\",\\\"UseTemplate\\\":false,\\\"WorkItemData\\\":\\\"{}\\\",\\\"CreateOneWIPerCI\\\":false}\")\n .region(\"southcentralus\")\n .build())\n .logicAppReceivers(ActionGroupLogicAppReceiverArgs.builder()\n .name(\"logicappaction\")\n .resourceId(\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\")\n .callbackUrl(\"https://logicapptriggerurl/...\")\n .useCommonAlertSchema(true)\n .build())\n .smsReceivers(ActionGroupSmsReceiverArgs.builder()\n .name(\"oncallmsg\")\n .countryCode(\"1\")\n .phoneNumber(\"1231231234\")\n .build())\n .voiceReceivers(ActionGroupVoiceReceiverArgs.builder()\n .name(\"remotesupport\")\n .countryCode(\"86\")\n .phoneNumber(\"13888888888\")\n .build())\n .webhookReceivers(ActionGroupWebhookReceiverArgs.builder()\n .name(\"callmyapiaswell\")\n .serviceUri(\"http://example.com/alert\")\n .useCommonAlertSchema(true)\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: monitoring-resources\n location: West Europe\n exampleAnalyticsWorkspace:\n type: azure:operationalinsights:AnalyticsWorkspace\n name: example\n properties:\n name: workspace-01\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleActionGroup:\n type: azure:monitoring:ActionGroup\n name: example\n properties:\n name: CriticalAlertsAction\n resourceGroupName: ${example.name}\n shortName: p0action\n armRoleReceivers:\n - name: armroleaction\n roleId: de139f84-1756-47ae-9be6-808fbbe84772\n useCommonAlertSchema: true\n automationRunbookReceivers:\n - name: action_name_1\n automationAccountId: /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001\n runbookName: my runbook\n webhookResourceId: /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-runbooks/providers/Microsoft.Automation/automationAccounts/aaa001/webHooks/webhook_alert\n isGlobalRunbook: true\n serviceUri: https://s13events.azure-automation.net/webhooks?token=randomtoken\n useCommonAlertSchema: true\n azureAppPushReceivers:\n - name: pushtoadmin\n emailAddress: admin@contoso.com\n azureFunctionReceivers:\n - name: funcaction\n functionAppResourceId: /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-funcapp/providers/Microsoft.Web/sites/funcapp\n functionName: myfunc\n httpTriggerUrl: https://example.com/trigger\n useCommonAlertSchema: true\n emailReceivers:\n - name: sendtoadmin\n emailAddress: admin@contoso.com\n - name: sendtodevops\n emailAddress: devops@contoso.com\n useCommonAlertSchema: true\n eventHubReceivers:\n - name: sendtoeventhub\n eventHubNamespace: eventhubnamespace\n eventHubName: eventhub1\n subscriptionId: 00000000-0000-0000-0000-000000000000\n useCommonAlertSchema: false\n itsmReceivers:\n - name: createorupdateticket\n workspaceId: ${current.subscriptionId}|${exampleAnalyticsWorkspace.workspaceId}\n connectionId: 53de6956-42b4-41ba-be3c-b154cdf17b13\n ticketConfiguration: '{\"PayloadRevision\":0,\"WorkItemType\":\"Incident\",\"UseTemplate\":false,\"WorkItemData\":\"{}\",\"CreateOneWIPerCI\":false}'\n region: southcentralus\n logicAppReceivers:\n - name: logicappaction\n resourceId: /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg-logicapp/providers/Microsoft.Logic/workflows/logicapp\n callbackUrl: https://logicapptriggerurl/...\n useCommonAlertSchema: true\n smsReceivers:\n - name: oncallmsg\n countryCode: '1'\n phoneNumber: '1231231234'\n voiceReceivers:\n - name: remotesupport\n countryCode: '86'\n phoneNumber: '13888888888'\n webhookReceivers:\n - name: callmyapiaswell\n serviceUri: http://example.com/alert\n useCommonAlertSchema: true\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAction Groups can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:monitoring/actionGroup:ActionGroup example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Insights/actionGroups/myagname\n```\n\n", "properties": { "armRoleReceivers": { "type": "array", @@ -210594,7 +210594,7 @@ } }, "azure:monitoring/diagnosticSetting:DiagnosticSetting": { - "description": "Manages a Diagnostic Setting for an existing Resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: false,\n skuName: \"standard\",\n});\nconst exampleDiagnosticSetting = new azure.monitoring.DiagnosticSetting(\"example\", {\n name: \"example\",\n targetResourceId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n enabledLogs: [{\n category: \"AuditEvent\",\n }],\n metrics: [{\n category: \"AllMetrics\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=False,\n sku_name=\"standard\")\nexample_diagnostic_setting = azure.monitoring.DiagnosticSetting(\"example\",\n name=\"example\",\n target_resource_id=example_key_vault.id,\n storage_account_id=example_account.id,\n enabled_logs=[{\n \"category\": \"AuditEvent\",\n }],\n metrics=[{\n \"category\": \"AllMetrics\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = false,\n SkuName = \"standard\",\n });\n\n var exampleDiagnosticSetting = new Azure.Monitoring.DiagnosticSetting(\"example\", new()\n {\n Name = \"example\",\n TargetResourceId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n EnabledLogs = new[]\n {\n new Azure.Monitoring.Inputs.DiagnosticSettingEnabledLogArgs\n {\n Category = \"AuditEvent\",\n },\n },\n Metrics = new[]\n {\n new Azure.Monitoring.Inputs.DiagnosticSettingMetricArgs\n {\n Category = \"AllMetrics\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/monitoring\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = monitoring.NewDiagnosticSetting(ctx, \"example\", \u0026monitoring.DiagnosticSettingArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tTargetResourceId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tEnabledLogs: monitoring.DiagnosticSettingEnabledLogArray{\n\t\t\t\t\u0026monitoring.DiagnosticSettingEnabledLogArgs{\n\t\t\t\t\tCategory: pulumi.String(\"AuditEvent\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tMetrics: monitoring.DiagnosticSettingMetricArray{\n\t\t\t\t\u0026monitoring.DiagnosticSettingMetricArgs{\n\t\t\t\t\tCategory: pulumi.String(\"AllMetrics\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.monitoring.DiagnosticSetting;\nimport com.pulumi.azure.monitoring.DiagnosticSettingArgs;\nimport com.pulumi.azure.monitoring.inputs.DiagnosticSettingEnabledLogArgs;\nimport com.pulumi.azure.monitoring.inputs.DiagnosticSettingMetricArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(false)\n .skuName(\"standard\")\n .build());\n\n var exampleDiagnosticSetting = new DiagnosticSetting(\"exampleDiagnosticSetting\", DiagnosticSettingArgs.builder()\n .name(\"example\")\n .targetResourceId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .enabledLogs(DiagnosticSettingEnabledLogArgs.builder()\n .category(\"AuditEvent\")\n .build())\n .metrics(DiagnosticSettingMetricArgs.builder()\n .category(\"AllMetrics\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: false\n skuName: standard\n exampleDiagnosticSetting:\n type: azure:monitoring:DiagnosticSetting\n name: example\n properties:\n name: example\n targetResourceId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n enabledLogs:\n - category: AuditEvent\n metrics:\n - category: AllMetrics\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDiagnostic Settings can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:monitoring/diagnosticSetting:DiagnosticSetting example \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.KeyVault/vaults/vault1|logMonitoring1\"\n```\n\n", + "description": "Manages a Diagnostic Setting for an existing Resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"storageaccountname\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: false,\n skuName: \"standard\",\n});\nconst exampleDiagnosticSetting = new azure.monitoring.DiagnosticSetting(\"example\", {\n name: \"example\",\n targetResourceId: exampleKeyVault.id,\n storageAccountId: exampleAccount.id,\n enabledLogs: [{\n category: \"AuditEvent\",\n }],\n metrics: [{\n category: \"AllMetrics\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"storageaccountname\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=False,\n sku_name=\"standard\")\nexample_diagnostic_setting = azure.monitoring.DiagnosticSetting(\"example\",\n name=\"example\",\n target_resource_id=example_key_vault.id,\n storage_account_id=example_account.id,\n enabled_logs=[{\n \"category\": \"AuditEvent\",\n }],\n metrics=[{\n \"category\": \"AllMetrics\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"storageaccountname\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = false,\n SkuName = \"standard\",\n });\n\n var exampleDiagnosticSetting = new Azure.Monitoring.DiagnosticSetting(\"example\", new()\n {\n Name = \"example\",\n TargetResourceId = exampleKeyVault.Id,\n StorageAccountId = exampleAccount.Id,\n EnabledLogs = new[]\n {\n new Azure.Monitoring.Inputs.DiagnosticSettingEnabledLogArgs\n {\n Category = \"AuditEvent\",\n },\n },\n Metrics = new[]\n {\n new Azure.Monitoring.Inputs.DiagnosticSettingMetricArgs\n {\n Category = \"AllMetrics\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/monitoring\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"storageaccountname\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = monitoring.NewDiagnosticSetting(ctx, \"example\", \u0026monitoring.DiagnosticSettingArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tTargetResourceId: exampleKeyVault.ID(),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tEnabledLogs: monitoring.DiagnosticSettingEnabledLogArray{\n\t\t\t\t\u0026monitoring.DiagnosticSettingEnabledLogArgs{\n\t\t\t\t\tCategory: pulumi.String(\"AuditEvent\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tMetrics: monitoring.DiagnosticSettingMetricArray{\n\t\t\t\t\u0026monitoring.DiagnosticSettingMetricArgs{\n\t\t\t\t\tCategory: pulumi.String(\"AllMetrics\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.monitoring.DiagnosticSetting;\nimport com.pulumi.azure.monitoring.DiagnosticSettingArgs;\nimport com.pulumi.azure.monitoring.inputs.DiagnosticSettingEnabledLogArgs;\nimport com.pulumi.azure.monitoring.inputs.DiagnosticSettingMetricArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"storageaccountname\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(false)\n .skuName(\"standard\")\n .build());\n\n var exampleDiagnosticSetting = new DiagnosticSetting(\"exampleDiagnosticSetting\", DiagnosticSettingArgs.builder()\n .name(\"example\")\n .targetResourceId(exampleKeyVault.id())\n .storageAccountId(exampleAccount.id())\n .enabledLogs(DiagnosticSettingEnabledLogArgs.builder()\n .category(\"AuditEvent\")\n .build())\n .metrics(DiagnosticSettingMetricArgs.builder()\n .category(\"AllMetrics\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: storageaccountname\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: false\n skuName: standard\n exampleDiagnosticSetting:\n type: azure:monitoring:DiagnosticSetting\n name: example\n properties:\n name: example\n targetResourceId: ${exampleKeyVault.id}\n storageAccountId: ${exampleAccount.id}\n enabledLogs:\n - category: AuditEvent\n metrics:\n - category: AllMetrics\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDiagnostic Settings can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:monitoring/diagnosticSetting:DiagnosticSetting example \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.KeyVault/vaults/vault1|logMonitoring1\"\n```\n\n", "properties": { "enabledLogs": { "type": "array", @@ -214092,7 +214092,7 @@ ] }, "azure:mssql/managedInstanceActiveDirectoryAdministrator:ManagedInstanceActiveDirectoryAdministrator": { - "description": "Allows you to set a user, group or service principal as the AAD Administrator for an Azure SQL Managed Instance.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"rg-example\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.2.0/24\"],\n});\nconst exampleManagedInstance = new azure.mssql.ManagedInstance(\"example\", {\n name: \"managedsqlinstance\",\n resourceGroupName: example.name,\n location: example.location,\n licenseType: \"BasePrice\",\n skuName: \"GP_Gen5\",\n storageSizeInGb: 32,\n subnetId: exampleSubnet.id,\n vcores: 4,\n administratorLogin: \"msadministrator\",\n administratorLoginPassword: \"thisIsDog11\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst reader = new azuread.DirectoryRole(\"reader\", {displayName: \"Directory Readers\"});\nconst exampleDirectoryRoleMember = new azuread.DirectoryRoleMember(\"example\", {\n roleObjectId: reader.objectId,\n memberObjectId: exampleManagedInstance.identity.apply(identity =\u003e identity?.principalId),\n});\nconst admin = new azuread.User(\"admin\", {\n userPrincipalName: \"ms.admin@example.com\",\n displayName: \"Ms Admin\",\n mailNickname: \"ms.admin\",\n password: \"SecretP@sswd99!\",\n});\nconst exampleManagedInstanceActiveDirectoryAdministrator = new azure.mssql.ManagedInstanceActiveDirectoryAdministrator(\"example\", {\n managedInstanceId: exampleManagedInstance.id,\n loginUsername: \"msadmin\",\n objectId: admin.objectId,\n tenantId: current.then(current =\u003e current.tenantId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"rg-example\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"])\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.2.0/24\"])\nexample_managed_instance = azure.mssql.ManagedInstance(\"example\",\n name=\"managedsqlinstance\",\n resource_group_name=example.name,\n location=example.location,\n license_type=\"BasePrice\",\n sku_name=\"GP_Gen5\",\n storage_size_in_gb=32,\n subnet_id=example_subnet.id,\n vcores=4,\n administrator_login=\"msadministrator\",\n administrator_login_password=\"thisIsDog11\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nreader = azuread.DirectoryRole(\"reader\", display_name=\"Directory Readers\")\nexample_directory_role_member = azuread.DirectoryRoleMember(\"example\",\n role_object_id=reader.object_id,\n member_object_id=example_managed_instance.identity.principal_id)\nadmin = azuread.User(\"admin\",\n user_principal_name=\"ms.admin@example.com\",\n display_name=\"Ms Admin\",\n mail_nickname=\"ms.admin\",\n password=\"SecretP@sswd99!\")\nexample_managed_instance_active_directory_administrator = azure.mssql.ManagedInstanceActiveDirectoryAdministrator(\"example\",\n managed_instance_id=example_managed_instance.id,\n login_username=\"msadmin\",\n object_id=admin.object_id,\n tenant_id=current.tenant_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"rg-example\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.2.0/24\",\n },\n });\n\n var exampleManagedInstance = new Azure.MSSql.ManagedInstance(\"example\", new()\n {\n Name = \"managedsqlinstance\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n LicenseType = \"BasePrice\",\n SkuName = \"GP_Gen5\",\n StorageSizeInGb = 32,\n SubnetId = exampleSubnet.Id,\n Vcores = 4,\n AdministratorLogin = \"msadministrator\",\n AdministratorLoginPassword = \"thisIsDog11\",\n Identity = new Azure.MSSql.Inputs.ManagedInstanceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var reader = new AzureAD.DirectoryRole(\"reader\", new()\n {\n DisplayName = \"Directory Readers\",\n });\n\n var exampleDirectoryRoleMember = new AzureAD.DirectoryRoleMember(\"example\", new()\n {\n RoleObjectId = reader.ObjectId,\n MemberObjectId = exampleManagedInstance.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var admin = new AzureAD.User(\"admin\", new()\n {\n UserPrincipalName = \"ms.admin@example.com\",\n DisplayName = \"Ms Admin\",\n MailNickname = \"ms.admin\",\n Password = \"SecretP@sswd99!\",\n });\n\n var exampleManagedInstanceActiveDirectoryAdministrator = new Azure.MSSql.ManagedInstanceActiveDirectoryAdministrator(\"example\", new()\n {\n ManagedInstanceId = exampleManagedInstance.Id,\n LoginUsername = \"msadmin\",\n ObjectId = admin.ObjectId,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"rg-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.2.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleManagedInstance, err := mssql.NewManagedInstance(ctx, \"example\", \u0026mssql.ManagedInstanceArgs{\n\t\t\tName: pulumi.String(\"managedsqlinstance\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tLicenseType: pulumi.String(\"BasePrice\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5\"),\n\t\t\tStorageSizeInGb: pulumi.Int(32),\n\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\tVcores: pulumi.Int(4),\n\t\t\tAdministratorLogin: pulumi.String(\"msadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"thisIsDog11\"),\n\t\t\tIdentity: \u0026mssql.ManagedInstanceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treader, err := azuread.NewDirectoryRole(ctx, \"reader\", \u0026azuread.DirectoryRoleArgs{\n\t\t\tDisplayName: pulumi.String(\"Directory Readers\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = azuread.NewDirectoryRoleMember(ctx, \"example\", \u0026azuread.DirectoryRoleMemberArgs{\n\t\t\tRoleObjectId: reader.ObjectId,\n\t\t\tMemberObjectId: pulumi.String(exampleManagedInstance.Identity.ApplyT(func(identity mssql.ManagedInstanceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tadmin, err := azuread.NewUser(ctx, \"admin\", \u0026azuread.UserArgs{\n\t\t\tUserPrincipalName: pulumi.String(\"ms.admin@example.com\"),\n\t\t\tDisplayName: pulumi.String(\"Ms Admin\"),\n\t\t\tMailNickname: pulumi.String(\"ms.admin\"),\n\t\t\tPassword: pulumi.String(\"SecretP@sswd99!\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewManagedInstanceActiveDirectoryAdministrator(ctx, \"example\", \u0026mssql.ManagedInstanceActiveDirectoryAdministratorArgs{\n\t\t\tManagedInstanceId: exampleManagedInstance.ID(),\n\t\t\tLoginUsername: pulumi.String(\"msadmin\"),\n\t\t\tObjectId: admin.ObjectId,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.mssql.ManagedInstance;\nimport com.pulumi.azure.mssql.ManagedInstanceArgs;\nimport com.pulumi.azure.mssql.inputs.ManagedInstanceIdentityArgs;\nimport com.pulumi.azuread.DirectoryRole;\nimport com.pulumi.azuread.DirectoryRoleArgs;\nimport com.pulumi.azuread.DirectoryRoleMember;\nimport com.pulumi.azuread.DirectoryRoleMemberArgs;\nimport com.pulumi.azuread.User;\nimport com.pulumi.azuread.UserArgs;\nimport com.pulumi.azure.mssql.ManagedInstanceActiveDirectoryAdministrator;\nimport com.pulumi.azure.mssql.ManagedInstanceActiveDirectoryAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"rg-example\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.2.0/24\")\n .build());\n\n var exampleManagedInstance = new ManagedInstance(\"exampleManagedInstance\", ManagedInstanceArgs.builder()\n .name(\"managedsqlinstance\")\n .resourceGroupName(example.name())\n .location(example.location())\n .licenseType(\"BasePrice\")\n .skuName(\"GP_Gen5\")\n .storageSizeInGb(32)\n .subnetId(exampleSubnet.id())\n .vcores(4)\n .administratorLogin(\"msadministrator\")\n .administratorLoginPassword(\"thisIsDog11\")\n .identity(ManagedInstanceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var reader = new DirectoryRole(\"reader\", DirectoryRoleArgs.builder()\n .displayName(\"Directory Readers\")\n .build());\n\n var exampleDirectoryRoleMember = new DirectoryRoleMember(\"exampleDirectoryRoleMember\", DirectoryRoleMemberArgs.builder()\n .roleObjectId(reader.objectId())\n .memberObjectId(exampleManagedInstance.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var admin = new User(\"admin\", UserArgs.builder()\n .userPrincipalName(\"ms.admin@example.com\")\n .displayName(\"Ms Admin\")\n .mailNickname(\"ms.admin\")\n .password(\"SecretP@sswd99!\")\n .build());\n\n var exampleManagedInstanceActiveDirectoryAdministrator = new ManagedInstanceActiveDirectoryAdministrator(\"exampleManagedInstanceActiveDirectoryAdministrator\", ManagedInstanceActiveDirectoryAdministratorArgs.builder()\n .managedInstanceId(exampleManagedInstance.id())\n .loginUsername(\"msadmin\")\n .objectId(admin.objectId())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: rg-example\n location: West Europe\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.2.0/24\n exampleManagedInstance:\n type: azure:mssql:ManagedInstance\n name: example\n properties:\n name: managedsqlinstance\n resourceGroupName: ${example.name}\n location: ${example.location}\n licenseType: BasePrice\n skuName: GP_Gen5\n storageSizeInGb: 32\n subnetId: ${exampleSubnet.id}\n vcores: 4\n administratorLogin: msadministrator\n administratorLoginPassword: thisIsDog11\n identity:\n type: SystemAssigned\n reader:\n type: azuread:DirectoryRole\n properties:\n displayName: Directory Readers\n exampleDirectoryRoleMember:\n type: azuread:DirectoryRoleMember\n name: example\n properties:\n roleObjectId: ${reader.objectId}\n memberObjectId: ${exampleManagedInstance.identity.principalId}\n admin:\n type: azuread:User\n properties:\n userPrincipalName: ms.admin@example.com\n displayName: Ms Admin\n mailNickname: ms.admin\n password: SecretP@sswd99!\n exampleManagedInstanceActiveDirectoryAdministrator:\n type: azure:mssql:ManagedInstanceActiveDirectoryAdministrator\n name: example\n properties:\n managedInstanceId: ${exampleManagedInstance.id}\n loginUsername: msadmin\n objectId: ${admin.objectId}\n tenantId: ${current.tenantId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn Azure SQL Active Directory Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:mssql/managedInstanceActiveDirectoryAdministrator:ManagedInstanceActiveDirectoryAdministrator administrator /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/managedInstances/mymanagedinstance/administrators/activeDirectory\n```\n\n", + "description": "Allows you to set a user, group or service principal as the AAD Administrator for an Azure SQL Managed Instance.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"rg-example\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.2.0/24\"],\n});\nconst exampleManagedInstance = new azure.mssql.ManagedInstance(\"example\", {\n name: \"managedsqlinstance\",\n resourceGroupName: example.name,\n location: example.location,\n licenseType: \"BasePrice\",\n skuName: \"GP_Gen5\",\n storageSizeInGb: 32,\n subnetId: exampleSubnet.id,\n vcores: 4,\n administratorLogin: \"msadministrator\",\n administratorLoginPassword: \"thisIsDog11\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst reader = new azuread.DirectoryRole(\"reader\", {displayName: \"Directory Readers\"});\nconst exampleDirectoryRoleMember = new azuread.DirectoryRoleMember(\"example\", {\n roleObjectId: reader.objectId,\n memberObjectId: exampleManagedInstance.identity.apply(identity =\u003e identity?.principalId),\n});\nconst admin = new azuread.User(\"admin\", {\n userPrincipalName: \"ms.admin@example.com\",\n displayName: \"Ms Admin\",\n mailNickname: \"ms.admin\",\n password: \"SecretP@sswd99!\",\n});\nconst exampleManagedInstanceActiveDirectoryAdministrator = new azure.mssql.ManagedInstanceActiveDirectoryAdministrator(\"example\", {\n managedInstanceId: exampleManagedInstance.id,\n loginUsername: \"msadmin\",\n objectId: admin.objectId,\n tenantId: current.then(current =\u003e current.tenantId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"rg-example\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"])\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.2.0/24\"])\nexample_managed_instance = azure.mssql.ManagedInstance(\"example\",\n name=\"managedsqlinstance\",\n resource_group_name=example.name,\n location=example.location,\n license_type=\"BasePrice\",\n sku_name=\"GP_Gen5\",\n storage_size_in_gb=32,\n subnet_id=example_subnet.id,\n vcores=4,\n administrator_login=\"msadministrator\",\n administrator_login_password=\"thisIsDog11\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nreader = azuread.DirectoryRole(\"reader\", display_name=\"Directory Readers\")\nexample_directory_role_member = azuread.DirectoryRoleMember(\"example\",\n role_object_id=reader.object_id,\n member_object_id=example_managed_instance.identity.principal_id)\nadmin = azuread.User(\"admin\",\n user_principal_name=\"ms.admin@example.com\",\n display_name=\"Ms Admin\",\n mail_nickname=\"ms.admin\",\n password=\"SecretP@sswd99!\")\nexample_managed_instance_active_directory_administrator = azure.mssql.ManagedInstanceActiveDirectoryAdministrator(\"example\",\n managed_instance_id=example_managed_instance.id,\n login_username=\"msadmin\",\n object_id=admin.object_id,\n tenant_id=current.tenant_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"rg-example\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.2.0/24\",\n },\n });\n\n var exampleManagedInstance = new Azure.MSSql.ManagedInstance(\"example\", new()\n {\n Name = \"managedsqlinstance\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n LicenseType = \"BasePrice\",\n SkuName = \"GP_Gen5\",\n StorageSizeInGb = 32,\n SubnetId = exampleSubnet.Id,\n Vcores = 4,\n AdministratorLogin = \"msadministrator\",\n AdministratorLoginPassword = \"thisIsDog11\",\n Identity = new Azure.MSSql.Inputs.ManagedInstanceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var reader = new AzureAD.DirectoryRole(\"reader\", new()\n {\n DisplayName = \"Directory Readers\",\n });\n\n var exampleDirectoryRoleMember = new AzureAD.DirectoryRoleMember(\"example\", new()\n {\n RoleObjectId = reader.ObjectId,\n MemberObjectId = exampleManagedInstance.Identity.Apply(identity =\u003e identity?.PrincipalId),\n });\n\n var admin = new AzureAD.User(\"admin\", new()\n {\n UserPrincipalName = \"ms.admin@example.com\",\n DisplayName = \"Ms Admin\",\n MailNickname = \"ms.admin\",\n Password = \"SecretP@sswd99!\",\n });\n\n var exampleManagedInstanceActiveDirectoryAdministrator = new Azure.MSSql.ManagedInstanceActiveDirectoryAdministrator(\"example\", new()\n {\n ManagedInstanceId = exampleManagedInstance.Id,\n LoginUsername = \"msadmin\",\n ObjectId = admin.ObjectId,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"rg-example\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.2.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleManagedInstance, err := mssql.NewManagedInstance(ctx, \"example\", \u0026mssql.ManagedInstanceArgs{\n\t\t\tName: pulumi.String(\"managedsqlinstance\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tLicenseType: pulumi.String(\"BasePrice\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5\"),\n\t\t\tStorageSizeInGb: pulumi.Int(32),\n\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\tVcores: pulumi.Int(4),\n\t\t\tAdministratorLogin: pulumi.String(\"msadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"thisIsDog11\"),\n\t\t\tIdentity: \u0026mssql.ManagedInstanceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treader, err := azuread.NewDirectoryRole(ctx, \"reader\", \u0026azuread.DirectoryRoleArgs{\n\t\t\tDisplayName: pulumi.String(\"Directory Readers\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = azuread.NewDirectoryRoleMember(ctx, \"example\", \u0026azuread.DirectoryRoleMemberArgs{\n\t\t\tRoleObjectId: reader.ObjectId,\n\t\t\tMemberObjectId: pulumi.String(exampleManagedInstance.Identity.ApplyT(func(identity mssql.ManagedInstanceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tadmin, err := azuread.NewUser(ctx, \"admin\", \u0026azuread.UserArgs{\n\t\t\tUserPrincipalName: pulumi.String(\"ms.admin@example.com\"),\n\t\t\tDisplayName: pulumi.String(\"Ms Admin\"),\n\t\t\tMailNickname: pulumi.String(\"ms.admin\"),\n\t\t\tPassword: pulumi.String(\"SecretP@sswd99!\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewManagedInstanceActiveDirectoryAdministrator(ctx, \"example\", \u0026mssql.ManagedInstanceActiveDirectoryAdministratorArgs{\n\t\t\tManagedInstanceId: exampleManagedInstance.ID(),\n\t\t\tLoginUsername: pulumi.String(\"msadmin\"),\n\t\t\tObjectId: admin.ObjectId,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.mssql.ManagedInstance;\nimport com.pulumi.azure.mssql.ManagedInstanceArgs;\nimport com.pulumi.azure.mssql.inputs.ManagedInstanceIdentityArgs;\nimport com.pulumi.azuread.DirectoryRole;\nimport com.pulumi.azuread.DirectoryRoleArgs;\nimport com.pulumi.azuread.DirectoryRoleMember;\nimport com.pulumi.azuread.DirectoryRoleMemberArgs;\nimport com.pulumi.azuread.User;\nimport com.pulumi.azuread.UserArgs;\nimport com.pulumi.azure.mssql.ManagedInstanceActiveDirectoryAdministrator;\nimport com.pulumi.azure.mssql.ManagedInstanceActiveDirectoryAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"rg-example\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.2.0/24\")\n .build());\n\n var exampleManagedInstance = new ManagedInstance(\"exampleManagedInstance\", ManagedInstanceArgs.builder()\n .name(\"managedsqlinstance\")\n .resourceGroupName(example.name())\n .location(example.location())\n .licenseType(\"BasePrice\")\n .skuName(\"GP_Gen5\")\n .storageSizeInGb(32)\n .subnetId(exampleSubnet.id())\n .vcores(4)\n .administratorLogin(\"msadministrator\")\n .administratorLoginPassword(\"thisIsDog11\")\n .identity(ManagedInstanceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var reader = new DirectoryRole(\"reader\", DirectoryRoleArgs.builder()\n .displayName(\"Directory Readers\")\n .build());\n\n var exampleDirectoryRoleMember = new DirectoryRoleMember(\"exampleDirectoryRoleMember\", DirectoryRoleMemberArgs.builder()\n .roleObjectId(reader.objectId())\n .memberObjectId(exampleManagedInstance.identity().applyValue(identity -\u003e identity.principalId()))\n .build());\n\n var admin = new User(\"admin\", UserArgs.builder()\n .userPrincipalName(\"ms.admin@example.com\")\n .displayName(\"Ms Admin\")\n .mailNickname(\"ms.admin\")\n .password(\"SecretP@sswd99!\")\n .build());\n\n var exampleManagedInstanceActiveDirectoryAdministrator = new ManagedInstanceActiveDirectoryAdministrator(\"exampleManagedInstanceActiveDirectoryAdministrator\", ManagedInstanceActiveDirectoryAdministratorArgs.builder()\n .managedInstanceId(exampleManagedInstance.id())\n .loginUsername(\"msadmin\")\n .objectId(admin.objectId())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: rg-example\n location: West Europe\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.2.0/24\n exampleManagedInstance:\n type: azure:mssql:ManagedInstance\n name: example\n properties:\n name: managedsqlinstance\n resourceGroupName: ${example.name}\n location: ${example.location}\n licenseType: BasePrice\n skuName: GP_Gen5\n storageSizeInGb: 32\n subnetId: ${exampleSubnet.id}\n vcores: 4\n administratorLogin: msadministrator\n administratorLoginPassword: thisIsDog11\n identity:\n type: SystemAssigned\n reader:\n type: azuread:DirectoryRole\n properties:\n displayName: Directory Readers\n exampleDirectoryRoleMember:\n type: azuread:DirectoryRoleMember\n name: example\n properties:\n roleObjectId: ${reader.objectId}\n memberObjectId: ${exampleManagedInstance.identity.principalId}\n admin:\n type: azuread:User\n properties:\n userPrincipalName: ms.admin@example.com\n displayName: Ms Admin\n mailNickname: ms.admin\n password: SecretP@sswd99!\n exampleManagedInstanceActiveDirectoryAdministrator:\n type: azure:mssql:ManagedInstanceActiveDirectoryAdministrator\n name: example\n properties:\n managedInstanceId: ${exampleManagedInstance.id}\n loginUsername: msadmin\n objectId: ${admin.objectId}\n tenantId: ${current.tenantId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn Azure SQL Active Directory Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:mssql/managedInstanceActiveDirectoryAdministrator:ManagedInstanceActiveDirectoryAdministrator administrator /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/managedInstances/mymanagedinstance/administrators/activeDirectory\n```\n\n", "properties": { "azureadAuthenticationOnly": { "type": "boolean", @@ -214472,7 +214472,7 @@ } }, "azure:mssql/managedInstanceTransparentDataEncryption:ManagedInstanceTransparentDataEncryption": { - "description": "Manages the transparent data encryption configuration for a MSSQL Managed Instance\n\n\u003e **NOTE:** Once transparent data encryption(TDE) is enabled on a MS SQL instance, it is not possible to remove TDE. You will be able to switch between 'ServiceManaged' and 'CustomerManaged' keys, but will not be able to remove encryption. For safety when this resource is deleted, the TDE mode will automatically be set to 'ServiceManaged'. See `key_vault_uri` for more information on how to specify the key types. As SQL Managed Instance only supports a single configuration for encryption settings, this resource will replace the current encryption settings on the server. \n\n\u003e **Note:** See [documentation](https://docs.microsoft.com/azure/azure-sql/database/transparent-data-encryption-byok-overview) for important information on how handle lifecycle management of the keys to prevent data lockout. \n\n## Example Usage\n\n### With Service Managed Key\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"EastUs\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"acctest-vnet1-mssql\",\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n location: test.location,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"subnet1-mssql\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.0.0/24\"],\n delegations: [{\n name: \"managedinstancedelegation\",\n serviceDelegation: {\n name: \"Microsoft.Sql/managedInstances\",\n actions: [\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n ],\n },\n }],\n});\nconst exampleManagedInstance = new azure.mssql.ManagedInstance(\"example\", {\n name: \"mssqlinstance\",\n resourceGroupName: example.name,\n location: example.location,\n licenseType: \"BasePrice\",\n skuName: \"GP_Gen5\",\n storageSizeInGb: 32,\n subnetId: exampleSubnet.id,\n vcores: 4,\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"NCC-1701-D\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleManagedInstanceTransparentDataEncryption = new azure.mssql.ManagedInstanceTransparentDataEncryption(\"example\", {managedInstanceId: exampleManagedInstance.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"EastUs\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"acctest-vnet1-mssql\",\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n location=test[\"location\"])\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"subnet1-mssql\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.0.0/24\"],\n delegations=[{\n \"name\": \"managedinstancedelegation\",\n \"service_delegation\": {\n \"name\": \"Microsoft.Sql/managedInstances\",\n \"actions\": [\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n ],\n },\n }])\nexample_managed_instance = azure.mssql.ManagedInstance(\"example\",\n name=\"mssqlinstance\",\n resource_group_name=example.name,\n location=example.location,\n license_type=\"BasePrice\",\n sku_name=\"GP_Gen5\",\n storage_size_in_gb=32,\n subnet_id=example_subnet.id,\n vcores=4,\n administrator_login=\"missadministrator\",\n administrator_login_password=\"NCC-1701-D\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_managed_instance_transparent_data_encryption = azure.mssql.ManagedInstanceTransparentDataEncryption(\"example\", managed_instance_id=example_managed_instance.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"EastUs\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"acctest-vnet1-mssql\",\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n Location = test.Location,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"subnet1-mssql\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.0.0/24\",\n },\n Delegations = new[]\n {\n new Azure.Network.Inputs.SubnetDelegationArgs\n {\n Name = \"managedinstancedelegation\",\n ServiceDelegation = new Azure.Network.Inputs.SubnetDelegationServiceDelegationArgs\n {\n Name = \"Microsoft.Sql/managedInstances\",\n Actions = new[]\n {\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n },\n },\n },\n },\n });\n\n var exampleManagedInstance = new Azure.MSSql.ManagedInstance(\"example\", new()\n {\n Name = \"mssqlinstance\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n LicenseType = \"BasePrice\",\n SkuName = \"GP_Gen5\",\n StorageSizeInGb = 32,\n SubnetId = exampleSubnet.Id,\n Vcores = 4,\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"NCC-1701-D\",\n Identity = new Azure.MSSql.Inputs.ManagedInstanceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleManagedInstanceTransparentDataEncryption = new Azure.MSSql.ManagedInstanceTransparentDataEncryption(\"example\", new()\n {\n ManagedInstanceId = exampleManagedInstance.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"EastUs\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"acctest-vnet1-mssql\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: pulumi.Any(test.Location),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"subnet1-mssql\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/24\"),\n\t\t\t},\n\t\t\tDelegations: network.SubnetDelegationArray{\n\t\t\t\t\u0026network.SubnetDelegationArgs{\n\t\t\t\t\tName: pulumi.String(\"managedinstancedelegation\"),\n\t\t\t\t\tServiceDelegation: \u0026network.SubnetDelegationServiceDelegationArgs{\n\t\t\t\t\t\tName: pulumi.String(\"Microsoft.Sql/managedInstances\"),\n\t\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/join/action\"),\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\"),\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleManagedInstance, err := mssql.NewManagedInstance(ctx, \"example\", \u0026mssql.ManagedInstanceArgs{\n\t\t\tName: pulumi.String(\"mssqlinstance\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tLicenseType: pulumi.String(\"BasePrice\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5\"),\n\t\t\tStorageSizeInGb: pulumi.Int(32),\n\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\tVcores: pulumi.Int(4),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"NCC-1701-D\"),\n\t\t\tIdentity: \u0026mssql.ManagedInstanceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewManagedInstanceTransparentDataEncryption(ctx, \"example\", \u0026mssql.ManagedInstanceTransparentDataEncryptionArgs{\n\t\t\tManagedInstanceId: exampleManagedInstance.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationServiceDelegationArgs;\nimport com.pulumi.azure.mssql.ManagedInstance;\nimport com.pulumi.azure.mssql.ManagedInstanceArgs;\nimport com.pulumi.azure.mssql.inputs.ManagedInstanceIdentityArgs;\nimport com.pulumi.azure.mssql.ManagedInstanceTransparentDataEncryption;\nimport com.pulumi.azure.mssql.ManagedInstanceTransparentDataEncryptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"EastUs\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"acctest-vnet1-mssql\")\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .location(test.location())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"subnet1-mssql\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.0.0/24\")\n .delegations(SubnetDelegationArgs.builder()\n .name(\"managedinstancedelegation\")\n .serviceDelegation(SubnetDelegationServiceDelegationArgs.builder()\n .name(\"Microsoft.Sql/managedInstances\")\n .actions( \n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\")\n .build())\n .build())\n .build());\n\n var exampleManagedInstance = new ManagedInstance(\"exampleManagedInstance\", ManagedInstanceArgs.builder()\n .name(\"mssqlinstance\")\n .resourceGroupName(example.name())\n .location(example.location())\n .licenseType(\"BasePrice\")\n .skuName(\"GP_Gen5\")\n .storageSizeInGb(32)\n .subnetId(exampleSubnet.id())\n .vcores(4)\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"NCC-1701-D\")\n .identity(ManagedInstanceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleManagedInstanceTransparentDataEncryption = new ManagedInstanceTransparentDataEncryption(\"exampleManagedInstanceTransparentDataEncryption\", ManagedInstanceTransparentDataEncryptionArgs.builder()\n .managedInstanceId(exampleManagedInstance.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: EastUs\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: acctest-vnet1-mssql\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n location: ${test.location}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: subnet1-mssql\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.0.0/24\n delegations:\n - name: managedinstancedelegation\n serviceDelegation:\n name: Microsoft.Sql/managedInstances\n actions:\n - Microsoft.Network/virtualNetworks/subnets/join/action\n - Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\n - Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\n exampleManagedInstance:\n type: azure:mssql:ManagedInstance\n name: example\n properties:\n name: mssqlinstance\n resourceGroupName: ${example.name}\n location: ${example.location}\n licenseType: BasePrice\n skuName: GP_Gen5\n storageSizeInGb: 32\n subnetId: ${exampleSubnet.id}\n vcores: 4\n administratorLogin: missadministrator\n administratorLoginPassword: NCC-1701-D\n identity:\n type: SystemAssigned\n exampleManagedInstanceTransparentDataEncryption:\n type: azure:mssql:ManagedInstanceTransparentDataEncryption\n name: example\n properties:\n managedInstanceId: ${exampleManagedInstance.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Customer Managed Key\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"EastUs\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"acctest-vnet1-mssql\",\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n location: test.location,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"subnet1-mssql\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.0.0/24\"],\n delegations: [{\n name: \"managedinstancedelegation\",\n serviceDelegation: {\n name: \"Microsoft.Sql/managedInstances\",\n actions: [\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n ],\n },\n }],\n});\nconst exampleManagedInstance = new azure.mssql.ManagedInstance(\"example\", {\n name: \"mssqlinstance\",\n resourceGroupName: example.name,\n location: example.location,\n licenseType: \"BasePrice\",\n skuName: \"GP_Gen5\",\n storageSizeInGb: 32,\n subnetId: exampleSubnet.id,\n vcores: 4,\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"NCC-1701-D\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\n// Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: false,\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n tenantId: exampleManagedInstance.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleManagedInstance.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"byok\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [exampleKeyVault],\n});\nconst exampleManagedInstanceTransparentDataEncryption = new azure.mssql.ManagedInstanceTransparentDataEncryption(\"example\", {\n managedInstanceId: exampleManagedInstance.id,\n keyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"EastUs\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"acctest-vnet1-mssql\",\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n location=test[\"location\"])\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"subnet1-mssql\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.0.0/24\"],\n delegations=[{\n \"name\": \"managedinstancedelegation\",\n \"service_delegation\": {\n \"name\": \"Microsoft.Sql/managedInstances\",\n \"actions\": [\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n ],\n },\n }])\nexample_managed_instance = azure.mssql.ManagedInstance(\"example\",\n name=\"mssqlinstance\",\n resource_group_name=example.name,\n location=example.location,\n license_type=\"BasePrice\",\n sku_name=\"GP_Gen5\",\n storage_size_in_gb=32,\n subnet_id=example_subnet.id,\n vcores=4,\n administrator_login=\"missadministrator\",\n administrator_login_password=\"NCC-1701-D\",\n identity={\n \"type\": \"SystemAssigned\",\n })\n# Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=False,\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n \"tenant_id\": example_managed_instance.identity.tenant_id,\n \"object_id\": example_managed_instance.identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"byok\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_key_vault]))\nexample_managed_instance_transparent_data_encryption = azure.mssql.ManagedInstanceTransparentDataEncryption(\"example\",\n managed_instance_id=example_managed_instance.id,\n key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"EastUs\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"acctest-vnet1-mssql\",\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n Location = test.Location,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"subnet1-mssql\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.0.0/24\",\n },\n Delegations = new[]\n {\n new Azure.Network.Inputs.SubnetDelegationArgs\n {\n Name = \"managedinstancedelegation\",\n ServiceDelegation = new Azure.Network.Inputs.SubnetDelegationServiceDelegationArgs\n {\n Name = \"Microsoft.Sql/managedInstances\",\n Actions = new[]\n {\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n },\n },\n },\n },\n });\n\n var exampleManagedInstance = new Azure.MSSql.ManagedInstance(\"example\", new()\n {\n Name = \"mssqlinstance\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n LicenseType = \"BasePrice\",\n SkuName = \"GP_Gen5\",\n StorageSizeInGb = 32,\n SubnetId = exampleSubnet.Id,\n Vcores = 4,\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"NCC-1701-D\",\n Identity = new Azure.MSSql.Inputs.ManagedInstanceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n // Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = false,\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleManagedInstance.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleManagedInstance.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"byok\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n },\n });\n\n var exampleManagedInstanceTransparentDataEncryption = new Azure.MSSql.ManagedInstanceTransparentDataEncryption(\"example\", new()\n {\n ManagedInstanceId = exampleManagedInstance.Id,\n KeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"EastUs\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"acctest-vnet1-mssql\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: pulumi.Any(test.Location),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"subnet1-mssql\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/24\"),\n\t\t\t},\n\t\t\tDelegations: network.SubnetDelegationArray{\n\t\t\t\t\u0026network.SubnetDelegationArgs{\n\t\t\t\t\tName: pulumi.String(\"managedinstancedelegation\"),\n\t\t\t\t\tServiceDelegation: \u0026network.SubnetDelegationServiceDelegationArgs{\n\t\t\t\t\t\tName: pulumi.String(\"Microsoft.Sql/managedInstances\"),\n\t\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/join/action\"),\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\"),\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleManagedInstance, err := mssql.NewManagedInstance(ctx, \"example\", \u0026mssql.ManagedInstanceArgs{\n\t\t\tName: pulumi.String(\"mssqlinstance\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tLicenseType: pulumi.String(\"BasePrice\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5\"),\n\t\t\tStorageSizeInGb: pulumi.Int(32),\n\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\tVcores: pulumi.Int(4),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"NCC-1701-D\"),\n\t\t\tIdentity: \u0026mssql.ManagedInstanceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleManagedInstance.Identity.ApplyT(func(identity mssql.ManagedInstanceIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleManagedInstance.Identity.ApplyT(func(identity mssql.ManagedInstanceIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"byok\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewManagedInstanceTransparentDataEncryption(ctx, \"example\", \u0026mssql.ManagedInstanceTransparentDataEncryptionArgs{\n\t\t\tManagedInstanceId: exampleManagedInstance.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationServiceDelegationArgs;\nimport com.pulumi.azure.mssql.ManagedInstance;\nimport com.pulumi.azure.mssql.ManagedInstanceArgs;\nimport com.pulumi.azure.mssql.inputs.ManagedInstanceIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.mssql.ManagedInstanceTransparentDataEncryption;\nimport com.pulumi.azure.mssql.ManagedInstanceTransparentDataEncryptionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"EastUs\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"acctest-vnet1-mssql\")\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .location(test.location())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"subnet1-mssql\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.0.0/24\")\n .delegations(SubnetDelegationArgs.builder()\n .name(\"managedinstancedelegation\")\n .serviceDelegation(SubnetDelegationServiceDelegationArgs.builder()\n .name(\"Microsoft.Sql/managedInstances\")\n .actions( \n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\")\n .build())\n .build())\n .build());\n\n var exampleManagedInstance = new ManagedInstance(\"exampleManagedInstance\", ManagedInstanceArgs.builder()\n .name(\"mssqlinstance\")\n .resourceGroupName(example.name())\n .location(example.location())\n .licenseType(\"BasePrice\")\n .skuName(\"GP_Gen5\")\n .storageSizeInGb(32)\n .subnetId(exampleSubnet.id())\n .vcores(4)\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"NCC-1701-D\")\n .identity(ManagedInstanceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n // Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(false)\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleManagedInstance.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleManagedInstance.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"byok\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleKeyVault)\n .build());\n\n var exampleManagedInstanceTransparentDataEncryption = new ManagedInstanceTransparentDataEncryption(\"exampleManagedInstanceTransparentDataEncryption\", ManagedInstanceTransparentDataEncryptionArgs.builder()\n .managedInstanceId(exampleManagedInstance.id())\n .keyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: EastUs\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: acctest-vnet1-mssql\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n location: ${test.location}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: subnet1-mssql\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.0.0/24\n delegations:\n - name: managedinstancedelegation\n serviceDelegation:\n name: Microsoft.Sql/managedInstances\n actions:\n - Microsoft.Network/virtualNetworks/subnets/join/action\n - Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\n - Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\n exampleManagedInstance:\n type: azure:mssql:ManagedInstance\n name: example\n properties:\n name: mssqlinstance\n resourceGroupName: ${example.name}\n location: ${example.location}\n licenseType: BasePrice\n skuName: GP_Gen5\n storageSizeInGb: 32\n subnetId: ${exampleSubnet.id}\n vcores: 4\n administratorLogin: missadministrator\n administratorLoginPassword: NCC-1701-D\n identity:\n type: SystemAssigned\n # Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: false\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - List\n - Create\n - Delete\n - Update\n - Recover\n - Purge\n - GetRotationPolicy\n - tenantId: ${exampleManagedInstance.identity.tenantId}\n objectId: ${exampleManagedInstance.identity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: byok\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\n exampleManagedInstanceTransparentDataEncryption:\n type: azure:mssql:ManagedInstanceTransparentDataEncryption\n name: example\n properties:\n managedInstanceId: ${exampleManagedInstance.id}\n keyVaultKeyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSQL Managed Instance Transparent Data Encryption can be imported using the resource id, e.g.\n\n```sh\n$ pulumi import azure:mssql/managedInstanceTransparentDataEncryption:ManagedInstanceTransparentDataEncryption example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.Sql/managedInstances/instance1/encryptionProtector/current\n```\n\n", + "description": "Manages the transparent data encryption configuration for a MSSQL Managed Instance\n\n\u003e **NOTE:** Once transparent data encryption(TDE) is enabled on a MS SQL instance, it is not possible to remove TDE. You will be able to switch between 'ServiceManaged' and 'CustomerManaged' keys, but will not be able to remove encryption. For safety when this resource is deleted, the TDE mode will automatically be set to 'ServiceManaged'. See `key_vault_uri` for more information on how to specify the key types. As SQL Managed Instance only supports a single configuration for encryption settings, this resource will replace the current encryption settings on the server. \n\n\u003e **Note:** See [documentation](https://docs.microsoft.com/azure/azure-sql/database/transparent-data-encryption-byok-overview) for important information on how handle lifecycle management of the keys to prevent data lockout. \n\n## Example Usage\n\n### With Service Managed Key\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"EastUs\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"acctest-vnet1-mssql\",\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n location: test.location,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"subnet1-mssql\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.0.0/24\"],\n delegations: [{\n name: \"managedinstancedelegation\",\n serviceDelegation: {\n name: \"Microsoft.Sql/managedInstances\",\n actions: [\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n ],\n },\n }],\n});\nconst exampleManagedInstance = new azure.mssql.ManagedInstance(\"example\", {\n name: \"mssqlinstance\",\n resourceGroupName: example.name,\n location: example.location,\n licenseType: \"BasePrice\",\n skuName: \"GP_Gen5\",\n storageSizeInGb: 32,\n subnetId: exampleSubnet.id,\n vcores: 4,\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"NCC-1701-D\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleManagedInstanceTransparentDataEncryption = new azure.mssql.ManagedInstanceTransparentDataEncryption(\"example\", {managedInstanceId: exampleManagedInstance.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"EastUs\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"acctest-vnet1-mssql\",\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n location=test[\"location\"])\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"subnet1-mssql\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.0.0/24\"],\n delegations=[{\n \"name\": \"managedinstancedelegation\",\n \"service_delegation\": {\n \"name\": \"Microsoft.Sql/managedInstances\",\n \"actions\": [\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n ],\n },\n }])\nexample_managed_instance = azure.mssql.ManagedInstance(\"example\",\n name=\"mssqlinstance\",\n resource_group_name=example.name,\n location=example.location,\n license_type=\"BasePrice\",\n sku_name=\"GP_Gen5\",\n storage_size_in_gb=32,\n subnet_id=example_subnet.id,\n vcores=4,\n administrator_login=\"missadministrator\",\n administrator_login_password=\"NCC-1701-D\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_managed_instance_transparent_data_encryption = azure.mssql.ManagedInstanceTransparentDataEncryption(\"example\", managed_instance_id=example_managed_instance.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"EastUs\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"acctest-vnet1-mssql\",\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n Location = test.Location,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"subnet1-mssql\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.0.0/24\",\n },\n Delegations = new[]\n {\n new Azure.Network.Inputs.SubnetDelegationArgs\n {\n Name = \"managedinstancedelegation\",\n ServiceDelegation = new Azure.Network.Inputs.SubnetDelegationServiceDelegationArgs\n {\n Name = \"Microsoft.Sql/managedInstances\",\n Actions = new[]\n {\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n },\n },\n },\n },\n });\n\n var exampleManagedInstance = new Azure.MSSql.ManagedInstance(\"example\", new()\n {\n Name = \"mssqlinstance\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n LicenseType = \"BasePrice\",\n SkuName = \"GP_Gen5\",\n StorageSizeInGb = 32,\n SubnetId = exampleSubnet.Id,\n Vcores = 4,\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"NCC-1701-D\",\n Identity = new Azure.MSSql.Inputs.ManagedInstanceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleManagedInstanceTransparentDataEncryption = new Azure.MSSql.ManagedInstanceTransparentDataEncryption(\"example\", new()\n {\n ManagedInstanceId = exampleManagedInstance.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"EastUs\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"acctest-vnet1-mssql\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: pulumi.Any(test.Location),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"subnet1-mssql\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/24\"),\n\t\t\t},\n\t\t\tDelegations: network.SubnetDelegationArray{\n\t\t\t\t\u0026network.SubnetDelegationArgs{\n\t\t\t\t\tName: pulumi.String(\"managedinstancedelegation\"),\n\t\t\t\t\tServiceDelegation: \u0026network.SubnetDelegationServiceDelegationArgs{\n\t\t\t\t\t\tName: pulumi.String(\"Microsoft.Sql/managedInstances\"),\n\t\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/join/action\"),\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\"),\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleManagedInstance, err := mssql.NewManagedInstance(ctx, \"example\", \u0026mssql.ManagedInstanceArgs{\n\t\t\tName: pulumi.String(\"mssqlinstance\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tLicenseType: pulumi.String(\"BasePrice\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5\"),\n\t\t\tStorageSizeInGb: pulumi.Int(32),\n\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\tVcores: pulumi.Int(4),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"NCC-1701-D\"),\n\t\t\tIdentity: \u0026mssql.ManagedInstanceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewManagedInstanceTransparentDataEncryption(ctx, \"example\", \u0026mssql.ManagedInstanceTransparentDataEncryptionArgs{\n\t\t\tManagedInstanceId: exampleManagedInstance.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationServiceDelegationArgs;\nimport com.pulumi.azure.mssql.ManagedInstance;\nimport com.pulumi.azure.mssql.ManagedInstanceArgs;\nimport com.pulumi.azure.mssql.inputs.ManagedInstanceIdentityArgs;\nimport com.pulumi.azure.mssql.ManagedInstanceTransparentDataEncryption;\nimport com.pulumi.azure.mssql.ManagedInstanceTransparentDataEncryptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"EastUs\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"acctest-vnet1-mssql\")\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .location(test.location())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"subnet1-mssql\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.0.0/24\")\n .delegations(SubnetDelegationArgs.builder()\n .name(\"managedinstancedelegation\")\n .serviceDelegation(SubnetDelegationServiceDelegationArgs.builder()\n .name(\"Microsoft.Sql/managedInstances\")\n .actions( \n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\")\n .build())\n .build())\n .build());\n\n var exampleManagedInstance = new ManagedInstance(\"exampleManagedInstance\", ManagedInstanceArgs.builder()\n .name(\"mssqlinstance\")\n .resourceGroupName(example.name())\n .location(example.location())\n .licenseType(\"BasePrice\")\n .skuName(\"GP_Gen5\")\n .storageSizeInGb(32)\n .subnetId(exampleSubnet.id())\n .vcores(4)\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"NCC-1701-D\")\n .identity(ManagedInstanceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleManagedInstanceTransparentDataEncryption = new ManagedInstanceTransparentDataEncryption(\"exampleManagedInstanceTransparentDataEncryption\", ManagedInstanceTransparentDataEncryptionArgs.builder()\n .managedInstanceId(exampleManagedInstance.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: EastUs\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: acctest-vnet1-mssql\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n location: ${test.location}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: subnet1-mssql\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.0.0/24\n delegations:\n - name: managedinstancedelegation\n serviceDelegation:\n name: Microsoft.Sql/managedInstances\n actions:\n - Microsoft.Network/virtualNetworks/subnets/join/action\n - Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\n - Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\n exampleManagedInstance:\n type: azure:mssql:ManagedInstance\n name: example\n properties:\n name: mssqlinstance\n resourceGroupName: ${example.name}\n location: ${example.location}\n licenseType: BasePrice\n skuName: GP_Gen5\n storageSizeInGb: 32\n subnetId: ${exampleSubnet.id}\n vcores: 4\n administratorLogin: missadministrator\n administratorLoginPassword: NCC-1701-D\n identity:\n type: SystemAssigned\n exampleManagedInstanceTransparentDataEncryption:\n type: azure:mssql:ManagedInstanceTransparentDataEncryption\n name: example\n properties:\n managedInstanceId: ${exampleManagedInstance.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Customer Managed Key\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"EastUs\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"acctest-vnet1-mssql\",\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n location: test.location,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"subnet1-mssql\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.0.0/24\"],\n delegations: [{\n name: \"managedinstancedelegation\",\n serviceDelegation: {\n name: \"Microsoft.Sql/managedInstances\",\n actions: [\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n ],\n },\n }],\n});\nconst exampleManagedInstance = new azure.mssql.ManagedInstance(\"example\", {\n name: \"mssqlinstance\",\n resourceGroupName: example.name,\n location: example.location,\n licenseType: \"BasePrice\",\n skuName: \"GP_Gen5\",\n storageSizeInGb: 32,\n subnetId: exampleSubnet.id,\n vcores: 4,\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"NCC-1701-D\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\n// Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: false,\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n tenantId: exampleManagedInstance.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleManagedInstance.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"byok\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [exampleKeyVault],\n});\nconst exampleManagedInstanceTransparentDataEncryption = new azure.mssql.ManagedInstanceTransparentDataEncryption(\"example\", {\n managedInstanceId: exampleManagedInstance.id,\n keyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"EastUs\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"acctest-vnet1-mssql\",\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n location=test[\"location\"])\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"subnet1-mssql\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.0.0/24\"],\n delegations=[{\n \"name\": \"managedinstancedelegation\",\n \"service_delegation\": {\n \"name\": \"Microsoft.Sql/managedInstances\",\n \"actions\": [\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n ],\n },\n }])\nexample_managed_instance = azure.mssql.ManagedInstance(\"example\",\n name=\"mssqlinstance\",\n resource_group_name=example.name,\n location=example.location,\n license_type=\"BasePrice\",\n sku_name=\"GP_Gen5\",\n storage_size_in_gb=32,\n subnet_id=example_subnet.id,\n vcores=4,\n administrator_login=\"missadministrator\",\n administrator_login_password=\"NCC-1701-D\",\n identity={\n \"type\": \"SystemAssigned\",\n })\n# Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=False,\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n \"tenant_id\": example_managed_instance.identity.tenant_id,\n \"object_id\": example_managed_instance.identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"byok\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_key_vault]))\nexample_managed_instance_transparent_data_encryption = azure.mssql.ManagedInstanceTransparentDataEncryption(\"example\",\n managed_instance_id=example_managed_instance.id,\n key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"EastUs\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"acctest-vnet1-mssql\",\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n Location = test.Location,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"subnet1-mssql\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.0.0/24\",\n },\n Delegations = new[]\n {\n new Azure.Network.Inputs.SubnetDelegationArgs\n {\n Name = \"managedinstancedelegation\",\n ServiceDelegation = new Azure.Network.Inputs.SubnetDelegationServiceDelegationArgs\n {\n Name = \"Microsoft.Sql/managedInstances\",\n Actions = new[]\n {\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\",\n },\n },\n },\n },\n });\n\n var exampleManagedInstance = new Azure.MSSql.ManagedInstance(\"example\", new()\n {\n Name = \"mssqlinstance\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n LicenseType = \"BasePrice\",\n SkuName = \"GP_Gen5\",\n StorageSizeInGb = 32,\n SubnetId = exampleSubnet.Id,\n Vcores = 4,\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"NCC-1701-D\",\n Identity = new Azure.MSSql.Inputs.ManagedInstanceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n // Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = false,\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleManagedInstance.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleManagedInstance.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"byok\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n },\n });\n\n var exampleManagedInstanceTransparentDataEncryption = new Azure.MSSql.ManagedInstanceTransparentDataEncryption(\"example\", new()\n {\n ManagedInstanceId = exampleManagedInstance.Id,\n KeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"EastUs\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"acctest-vnet1-mssql\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: pulumi.Any(test.Location),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"subnet1-mssql\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/24\"),\n\t\t\t},\n\t\t\tDelegations: network.SubnetDelegationArray{\n\t\t\t\t\u0026network.SubnetDelegationArgs{\n\t\t\t\t\tName: pulumi.String(\"managedinstancedelegation\"),\n\t\t\t\t\tServiceDelegation: \u0026network.SubnetDelegationServiceDelegationArgs{\n\t\t\t\t\t\tName: pulumi.String(\"Microsoft.Sql/managedInstances\"),\n\t\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/join/action\"),\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\"),\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleManagedInstance, err := mssql.NewManagedInstance(ctx, \"example\", \u0026mssql.ManagedInstanceArgs{\n\t\t\tName: pulumi.String(\"mssqlinstance\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tLicenseType: pulumi.String(\"BasePrice\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5\"),\n\t\t\tStorageSizeInGb: pulumi.Int(32),\n\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\tVcores: pulumi.Int(4),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"NCC-1701-D\"),\n\t\t\tIdentity: \u0026mssql.ManagedInstanceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleManagedInstance.Identity.ApplyT(func(identity mssql.ManagedInstanceIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleManagedInstance.Identity.ApplyT(func(identity mssql.ManagedInstanceIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"byok\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewManagedInstanceTransparentDataEncryption(ctx, \"example\", \u0026mssql.ManagedInstanceTransparentDataEncryptionArgs{\n\t\t\tManagedInstanceId: exampleManagedInstance.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationServiceDelegationArgs;\nimport com.pulumi.azure.mssql.ManagedInstance;\nimport com.pulumi.azure.mssql.ManagedInstanceArgs;\nimport com.pulumi.azure.mssql.inputs.ManagedInstanceIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.mssql.ManagedInstanceTransparentDataEncryption;\nimport com.pulumi.azure.mssql.ManagedInstanceTransparentDataEncryptionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"EastUs\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"acctest-vnet1-mssql\")\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .location(test.location())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"subnet1-mssql\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.0.0/24\")\n .delegations(SubnetDelegationArgs.builder()\n .name(\"managedinstancedelegation\")\n .serviceDelegation(SubnetDelegationServiceDelegationArgs.builder()\n .name(\"Microsoft.Sql/managedInstances\")\n .actions( \n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n \"Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\",\n \"Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\")\n .build())\n .build())\n .build());\n\n var exampleManagedInstance = new ManagedInstance(\"exampleManagedInstance\", ManagedInstanceArgs.builder()\n .name(\"mssqlinstance\")\n .resourceGroupName(example.name())\n .location(example.location())\n .licenseType(\"BasePrice\")\n .skuName(\"GP_Gen5\")\n .storageSizeInGb(32)\n .subnetId(exampleSubnet.id())\n .vcores(4)\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"NCC-1701-D\")\n .identity(ManagedInstanceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n // Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(false)\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleManagedInstance.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleManagedInstance.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"byok\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleKeyVault)\n .build());\n\n var exampleManagedInstanceTransparentDataEncryption = new ManagedInstanceTransparentDataEncryption(\"exampleManagedInstanceTransparentDataEncryption\", ManagedInstanceTransparentDataEncryptionArgs.builder()\n .managedInstanceId(exampleManagedInstance.id())\n .keyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: EastUs\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: acctest-vnet1-mssql\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n location: ${test.location}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: subnet1-mssql\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.0.0/24\n delegations:\n - name: managedinstancedelegation\n serviceDelegation:\n name: Microsoft.Sql/managedInstances\n actions:\n - Microsoft.Network/virtualNetworks/subnets/join/action\n - Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action\n - Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action\n exampleManagedInstance:\n type: azure:mssql:ManagedInstance\n name: example\n properties:\n name: mssqlinstance\n resourceGroupName: ${example.name}\n location: ${example.location}\n licenseType: BasePrice\n skuName: GP_Gen5\n storageSizeInGb: 32\n subnetId: ${exampleSubnet.id}\n vcores: 4\n administratorLogin: missadministrator\n administratorLoginPassword: NCC-1701-D\n identity:\n type: SystemAssigned\n # Create a key vault with policies for the deployer to create a key \u0026 SQL Managed Instance to wrap/unwrap/get key\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: false\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - List\n - Create\n - Delete\n - Update\n - Recover\n - Purge\n - GetRotationPolicy\n - tenantId: ${exampleManagedInstance.identity.tenantId}\n objectId: ${exampleManagedInstance.identity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: byok\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\n exampleManagedInstanceTransparentDataEncryption:\n type: azure:mssql:ManagedInstanceTransparentDataEncryption\n name: example\n properties:\n managedInstanceId: ${exampleManagedInstance.id}\n keyVaultKeyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSQL Managed Instance Transparent Data Encryption can be imported using the resource id, e.g.\n\n```sh\n$ pulumi import azure:mssql/managedInstanceTransparentDataEncryption:ManagedInstanceTransparentDataEncryption example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.Sql/managedInstances/instance1/encryptionProtector/current\n```\n\n", "properties": { "autoRotationEnabled": { "type": "boolean", @@ -214667,7 +214667,7 @@ } }, "azure:mssql/server:Server": { - "description": "Manages a Microsoft SQL Azure Database Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"database-rg\",\n location: \"West Europe\",\n});\nconst exampleServer = new azure.mssql.Server(\"example\", {\n name: \"mssqlserver\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"12.0\",\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"thisIsKat11\",\n minimumTlsVersion: \"1.2\",\n azureadAdministrator: {\n loginUsername: \"AzureAD Admin\",\n objectId: \"00000000-0000-0000-0000-000000000000\",\n },\n tags: {\n environment: \"production\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"database-rg\",\n location=\"West Europe\")\nexample_server = azure.mssql.Server(\"example\",\n name=\"mssqlserver\",\n resource_group_name=example.name,\n location=example.location,\n version=\"12.0\",\n administrator_login=\"missadministrator\",\n administrator_login_password=\"thisIsKat11\",\n minimum_tls_version=\"1.2\",\n azuread_administrator={\n \"login_username\": \"AzureAD Admin\",\n \"object_id\": \"00000000-0000-0000-0000-000000000000\",\n },\n tags={\n \"environment\": \"production\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"database-rg\",\n Location = \"West Europe\",\n });\n\n var exampleServer = new Azure.MSSql.Server(\"example\", new()\n {\n Name = \"mssqlserver\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"12.0\",\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"thisIsKat11\",\n MinimumTlsVersion = \"1.2\",\n AzureadAdministrator = new Azure.MSSql.Inputs.ServerAzureadAdministratorArgs\n {\n LoginUsername = \"AzureAD Admin\",\n ObjectId = \"00000000-0000-0000-0000-000000000000\",\n },\n Tags = \n {\n { \"environment\", \"production\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"database-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewServer(ctx, \"example\", \u0026mssql.ServerArgs{\n\t\t\tName: pulumi.String(\"mssqlserver\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"12.0\"),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"thisIsKat11\"),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tAzureadAdministrator: \u0026mssql.ServerAzureadAdministratorArgs{\n\t\t\t\tLoginUsername: pulumi.String(\"AzureAD Admin\"),\n\t\t\t\tObjectId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.mssql.Server;\nimport com.pulumi.azure.mssql.ServerArgs;\nimport com.pulumi.azure.mssql.inputs.ServerAzureadAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"database-rg\")\n .location(\"West Europe\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"mssqlserver\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"12.0\")\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"thisIsKat11\")\n .minimumTlsVersion(\"1.2\")\n .azureadAdministrator(ServerAzureadAdministratorArgs.builder()\n .loginUsername(\"AzureAD Admin\")\n .objectId(\"00000000-0000-0000-0000-000000000000\")\n .build())\n .tags(Map.of(\"environment\", \"production\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: database-rg\n location: West Europe\n exampleServer:\n type: azure:mssql:Server\n name: example\n properties:\n name: mssqlserver\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '12.0'\n administratorLogin: missadministrator\n administratorLoginPassword: thisIsKat11\n minimumTlsVersion: '1.2'\n azureadAdministrator:\n loginUsername: AzureAD Admin\n objectId: 00000000-0000-0000-0000-000000000000\n tags:\n environment: production\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Transparent Data Encryption(TDE) With A Customer Managed Key(CMK) During Create\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"example-admin\",\n location: example.location,\n resourceGroupName: example.name,\n});\n// Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"mssqltdeexample\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: exampleUserAssignedIdentity.tenantId,\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: true,\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n tenantId: exampleUserAssignedIdentity.tenantId,\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [exampleKeyVault],\n});\nconst exampleServer = new azure.mssql.Server(\"example\", {\n name: \"example-resource\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"12.0\",\n administratorLogin: \"Example-Administrator\",\n administratorLoginPassword: \"Example_Password!\",\n minimumTlsVersion: \"1.2\",\n azureadAdministrator: {\n loginUsername: exampleUserAssignedIdentity.name,\n objectId: exampleUserAssignedIdentity.principalId,\n },\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n primaryUserAssignedIdentityId: exampleUserAssignedIdentity.id,\n transparentDataEncryptionKeyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"example-admin\",\n location=example.location,\n resource_group_name=example.name)\n# Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"mssqltdeexample\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=example_user_assigned_identity.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=True,\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n \"tenant_id\": example_user_assigned_identity.tenant_id,\n \"object_id\": example_user_assigned_identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_key_vault]))\nexample_server = azure.mssql.Server(\"example\",\n name=\"example-resource\",\n resource_group_name=example.name,\n location=example.location,\n version=\"12.0\",\n administrator_login=\"Example-Administrator\",\n administrator_login_password=\"Example_Password!\",\n minimum_tls_version=\"1.2\",\n azuread_administrator={\n \"login_username\": example_user_assigned_identity.name,\n \"object_id\": example_user_assigned_identity.principal_id,\n },\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n primary_user_assigned_identity_id=example_user_assigned_identity.id,\n transparent_data_encryption_key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"example-admin\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n // Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"mssqltdeexample\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = exampleUserAssignedIdentity.TenantId,\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = true,\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleUserAssignedIdentity.TenantId,\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n },\n });\n\n var exampleServer = new Azure.MSSql.Server(\"example\", new()\n {\n Name = \"example-resource\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"12.0\",\n AdministratorLogin = \"Example-Administrator\",\n AdministratorLoginPassword = \"Example_Password!\",\n MinimumTlsVersion = \"1.2\",\n AzureadAdministrator = new Azure.MSSql.Inputs.ServerAzureadAdministratorArgs\n {\n LoginUsername = exampleUserAssignedIdentity.Name,\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n },\n Identity = new Azure.MSSql.Inputs.ServerIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n PrimaryUserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n TransparentDataEncryptionKeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"example-admin\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"mssqltdeexample\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: exampleUserAssignedIdentity.TenantId,\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleUserAssignedIdentity.TenantId,\n\t\t\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewServer(ctx, \"example\", \u0026mssql.ServerArgs{\n\t\t\tName: pulumi.String(\"example-resource\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"12.0\"),\n\t\t\tAdministratorLogin: pulumi.String(\"Example-Administrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"Example_Password!\"),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tAzureadAdministrator: \u0026mssql.ServerAzureadAdministratorArgs{\n\t\t\t\tLoginUsername: exampleUserAssignedIdentity.Name,\n\t\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\t},\n\t\t\tIdentity: \u0026mssql.ServerIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tPrimaryUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t\tTransparentDataEncryptionKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.mssql.Server;\nimport com.pulumi.azure.mssql.ServerArgs;\nimport com.pulumi.azure.mssql.inputs.ServerAzureadAdministratorArgs;\nimport com.pulumi.azure.mssql.inputs.ServerIdentityArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"example-admin\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n // Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"mssqltdeexample\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(exampleUserAssignedIdentity.tenantId())\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(true)\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleUserAssignedIdentity.tenantId())\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleKeyVault)\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"example-resource\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"12.0\")\n .administratorLogin(\"Example-Administrator\")\n .administratorLoginPassword(\"Example_Password!\")\n .minimumTlsVersion(\"1.2\")\n .azureadAdministrator(ServerAzureadAdministratorArgs.builder()\n .loginUsername(exampleUserAssignedIdentity.name())\n .objectId(exampleUserAssignedIdentity.principalId())\n .build())\n .identity(ServerIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .primaryUserAssignedIdentityId(exampleUserAssignedIdentity.id())\n .transparentDataEncryptionKeyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: example-admin\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleServer:\n type: azure:mssql:Server\n name: example\n properties:\n name: example-resource\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '12.0'\n administratorLogin: Example-Administrator\n administratorLoginPassword: Example_Password!\n minimumTlsVersion: '1.2'\n azureadAdministrator:\n loginUsername: ${exampleUserAssignedIdentity.name}\n objectId: ${exampleUserAssignedIdentity.principalId}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n primaryUserAssignedIdentityId: ${exampleUserAssignedIdentity.id}\n transparentDataEncryptionKeyVaultKeyId: ${exampleKey.id}\n # Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: mssqltdeexample\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${exampleUserAssignedIdentity.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: true\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - List\n - Create\n - Delete\n - Update\n - Recover\n - Purge\n - GetRotationPolicy\n - tenantId: ${exampleUserAssignedIdentity.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSQL Servers can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:mssql/server:Server example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/servers/myserver\n```\n\n", + "description": "Manages a Microsoft SQL Azure Database Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"database-rg\",\n location: \"West Europe\",\n});\nconst exampleServer = new azure.mssql.Server(\"example\", {\n name: \"mssqlserver\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"12.0\",\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"thisIsKat11\",\n minimumTlsVersion: \"1.2\",\n azureadAdministrator: {\n loginUsername: \"AzureAD Admin\",\n objectId: \"00000000-0000-0000-0000-000000000000\",\n },\n tags: {\n environment: \"production\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"database-rg\",\n location=\"West Europe\")\nexample_server = azure.mssql.Server(\"example\",\n name=\"mssqlserver\",\n resource_group_name=example.name,\n location=example.location,\n version=\"12.0\",\n administrator_login=\"missadministrator\",\n administrator_login_password=\"thisIsKat11\",\n minimum_tls_version=\"1.2\",\n azuread_administrator={\n \"login_username\": \"AzureAD Admin\",\n \"object_id\": \"00000000-0000-0000-0000-000000000000\",\n },\n tags={\n \"environment\": \"production\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"database-rg\",\n Location = \"West Europe\",\n });\n\n var exampleServer = new Azure.MSSql.Server(\"example\", new()\n {\n Name = \"mssqlserver\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"12.0\",\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"thisIsKat11\",\n MinimumTlsVersion = \"1.2\",\n AzureadAdministrator = new Azure.MSSql.Inputs.ServerAzureadAdministratorArgs\n {\n LoginUsername = \"AzureAD Admin\",\n ObjectId = \"00000000-0000-0000-0000-000000000000\",\n },\n Tags = \n {\n { \"environment\", \"production\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"database-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewServer(ctx, \"example\", \u0026mssql.ServerArgs{\n\t\t\tName: pulumi.String(\"mssqlserver\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"12.0\"),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"thisIsKat11\"),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tAzureadAdministrator: \u0026mssql.ServerAzureadAdministratorArgs{\n\t\t\t\tLoginUsername: pulumi.String(\"AzureAD Admin\"),\n\t\t\t\tObjectId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.mssql.Server;\nimport com.pulumi.azure.mssql.ServerArgs;\nimport com.pulumi.azure.mssql.inputs.ServerAzureadAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"database-rg\")\n .location(\"West Europe\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"mssqlserver\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"12.0\")\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"thisIsKat11\")\n .minimumTlsVersion(\"1.2\")\n .azureadAdministrator(ServerAzureadAdministratorArgs.builder()\n .loginUsername(\"AzureAD Admin\")\n .objectId(\"00000000-0000-0000-0000-000000000000\")\n .build())\n .tags(Map.of(\"environment\", \"production\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: database-rg\n location: West Europe\n exampleServer:\n type: azure:mssql:Server\n name: example\n properties:\n name: mssqlserver\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '12.0'\n administratorLogin: missadministrator\n administratorLoginPassword: thisIsKat11\n minimumTlsVersion: '1.2'\n azureadAdministrator:\n loginUsername: AzureAD Admin\n objectId: 00000000-0000-0000-0000-000000000000\n tags:\n environment: production\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Transparent Data Encryption(TDE) With A Customer Managed Key(CMK) During Create\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"example-admin\",\n location: example.location,\n resourceGroupName: example.name,\n});\n// Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"mssqltdeexample\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: exampleUserAssignedIdentity.tenantId,\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: true,\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n tenantId: exampleUserAssignedIdentity.tenantId,\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"example-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [exampleKeyVault],\n});\nconst exampleServer = new azure.mssql.Server(\"example\", {\n name: \"example-resource\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"12.0\",\n administratorLogin: \"Example-Administrator\",\n administratorLoginPassword: \"Example_Password!\",\n minimumTlsVersion: \"1.2\",\n azureadAdministrator: {\n loginUsername: exampleUserAssignedIdentity.name,\n objectId: exampleUserAssignedIdentity.principalId,\n },\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n primaryUserAssignedIdentityId: exampleUserAssignedIdentity.id,\n transparentDataEncryptionKeyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"example-admin\",\n location=example.location,\n resource_group_name=example.name)\n# Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"mssqltdeexample\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=example_user_assigned_identity.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=True,\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n \"tenant_id\": example_user_assigned_identity.tenant_id,\n \"object_id\": example_user_assigned_identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"example-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_key_vault]))\nexample_server = azure.mssql.Server(\"example\",\n name=\"example-resource\",\n resource_group_name=example.name,\n location=example.location,\n version=\"12.0\",\n administrator_login=\"Example-Administrator\",\n administrator_login_password=\"Example_Password!\",\n minimum_tls_version=\"1.2\",\n azuread_administrator={\n \"login_username\": example_user_assigned_identity.name,\n \"object_id\": example_user_assigned_identity.principal_id,\n },\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n },\n primary_user_assigned_identity_id=example_user_assigned_identity.id,\n transparent_data_encryption_key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"example-admin\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n // Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"mssqltdeexample\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = exampleUserAssignedIdentity.TenantId,\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = true,\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleUserAssignedIdentity.TenantId,\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"example-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n },\n });\n\n var exampleServer = new Azure.MSSql.Server(\"example\", new()\n {\n Name = \"example-resource\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"12.0\",\n AdministratorLogin = \"Example-Administrator\",\n AdministratorLoginPassword = \"Example_Password!\",\n MinimumTlsVersion = \"1.2\",\n AzureadAdministrator = new Azure.MSSql.Inputs.ServerAzureadAdministratorArgs\n {\n LoginUsername = exampleUserAssignedIdentity.Name,\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n },\n Identity = new Azure.MSSql.Inputs.ServerIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n PrimaryUserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n TransparentDataEncryptionKeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"example-admin\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"mssqltdeexample\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: exampleUserAssignedIdentity.TenantId,\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleUserAssignedIdentity.TenantId,\n\t\t\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"example-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewServer(ctx, \"example\", \u0026mssql.ServerArgs{\n\t\t\tName: pulumi.String(\"example-resource\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"12.0\"),\n\t\t\tAdministratorLogin: pulumi.String(\"Example-Administrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"Example_Password!\"),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tAzureadAdministrator: \u0026mssql.ServerAzureadAdministratorArgs{\n\t\t\t\tLoginUsername: exampleUserAssignedIdentity.Name,\n\t\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\t},\n\t\t\tIdentity: \u0026mssql.ServerIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tPrimaryUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t\tTransparentDataEncryptionKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.mssql.Server;\nimport com.pulumi.azure.mssql.ServerArgs;\nimport com.pulumi.azure.mssql.inputs.ServerAzureadAdministratorArgs;\nimport com.pulumi.azure.mssql.inputs.ServerIdentityArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"example-admin\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n // Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"mssqltdeexample\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(exampleUserAssignedIdentity.tenantId())\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(true)\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleUserAssignedIdentity.tenantId())\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"example-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleKeyVault)\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"example-resource\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"12.0\")\n .administratorLogin(\"Example-Administrator\")\n .administratorLoginPassword(\"Example_Password!\")\n .minimumTlsVersion(\"1.2\")\n .azureadAdministrator(ServerAzureadAdministratorArgs.builder()\n .loginUsername(exampleUserAssignedIdentity.name())\n .objectId(exampleUserAssignedIdentity.principalId())\n .build())\n .identity(ServerIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .primaryUserAssignedIdentityId(exampleUserAssignedIdentity.id())\n .transparentDataEncryptionKeyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: example-admin\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleServer:\n type: azure:mssql:Server\n name: example\n properties:\n name: example-resource\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '12.0'\n administratorLogin: Example-Administrator\n administratorLoginPassword: Example_Password!\n minimumTlsVersion: '1.2'\n azureadAdministrator:\n loginUsername: ${exampleUserAssignedIdentity.name}\n objectId: ${exampleUserAssignedIdentity.principalId}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n primaryUserAssignedIdentityId: ${exampleUserAssignedIdentity.id}\n transparentDataEncryptionKeyVaultKeyId: ${exampleKey.id}\n # Create a key vault with access policies which allow for the current user to get, list, create, delete, update, recover, purge and getRotationPolicy for the key vault key and also add a key vault access policy for the Microsoft Sql Server instance User Managed Identity to get, wrap, and unwrap key(s)\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: mssqltdeexample\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${exampleUserAssignedIdentity.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: true\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - List\n - Create\n - Delete\n - Update\n - Recover\n - Purge\n - GetRotationPolicy\n - tenantId: ${exampleUserAssignedIdentity.tenantId}\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: example-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSQL Servers can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:mssql/server:Server example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Sql/servers/myserver\n```\n\n", "properties": { "administratorLogin": { "type": "string", @@ -215392,7 +215392,7 @@ } }, "azure:mssql/serverTransparentDataEncryption:ServerTransparentDataEncryption": { - "description": "Manages the transparent data encryption configuration for a MSSQL Server\n\n!\u003e **IMPORTANT:** This resource should only be used with pre-existing MS SQL Instances that are over 2 years old. For new MS SQL Instances that will be created through the use of the `azure.mssql.Server` resource, please enable Transparent Data Encryption through `azure.mssql.Server` resource itself by configuring an identity block. By default all new MS SQL Instances are deployed with System Managed Transparent Data Encryption enabled. \n\n\u003e **NOTE:** Once transparent data encryption is enabled on a MS SQL instance, it is not possible to remove TDE. You will be able to switch between 'ServiceManaged' and 'CustomerManaged' keys, but will not be able to remove encryption. For safety when this resource is deleted, the TDE mode will automatically be set to 'ServiceManaged'. See `key_vault_uri` for more information on how to specify the key types. As SQL Server only supports a single configuration for encryption settings, this resource will replace the current encryption settings on the server.\n\n\u003e **Note:** See [documentation](https://docs.microsoft.com/azure/azure-sql/database/transparent-data-encryption-byok-overview) for important information on how handle lifecycle management of the keys to prevent data lockout.\n\n## Example Usage\n\n### With Service Managed Key\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"EastUs\",\n});\nconst exampleServer = new azure.mssql.Server(\"example\", {\n name: \"mssqlserver\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"12.0\",\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"thisIsKat11\",\n minimumTlsVersion: \"1.2\",\n azureadAdministrator: {\n loginUsername: \"AzureAD Admin\",\n objectId: \"00000000-0000-0000-0000-000000000000\",\n },\n tags: {\n environment: \"production\",\n },\n});\nconst exampleServerTransparentDataEncryption = new azure.mssql.ServerTransparentDataEncryption(\"example\", {serverId: exampleServer.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"EastUs\")\nexample_server = azure.mssql.Server(\"example\",\n name=\"mssqlserver\",\n resource_group_name=example.name,\n location=example.location,\n version=\"12.0\",\n administrator_login=\"missadministrator\",\n administrator_login_password=\"thisIsKat11\",\n minimum_tls_version=\"1.2\",\n azuread_administrator={\n \"login_username\": \"AzureAD Admin\",\n \"object_id\": \"00000000-0000-0000-0000-000000000000\",\n },\n tags={\n \"environment\": \"production\",\n })\nexample_server_transparent_data_encryption = azure.mssql.ServerTransparentDataEncryption(\"example\", server_id=example_server.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"EastUs\",\n });\n\n var exampleServer = new Azure.MSSql.Server(\"example\", new()\n {\n Name = \"mssqlserver\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"12.0\",\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"thisIsKat11\",\n MinimumTlsVersion = \"1.2\",\n AzureadAdministrator = new Azure.MSSql.Inputs.ServerAzureadAdministratorArgs\n {\n LoginUsername = \"AzureAD Admin\",\n ObjectId = \"00000000-0000-0000-0000-000000000000\",\n },\n Tags = \n {\n { \"environment\", \"production\" },\n },\n });\n\n var exampleServerTransparentDataEncryption = new Azure.MSSql.ServerTransparentDataEncryption(\"example\", new()\n {\n ServerId = exampleServer.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"EastUs\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := mssql.NewServer(ctx, \"example\", \u0026mssql.ServerArgs{\n\t\t\tName: pulumi.String(\"mssqlserver\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"12.0\"),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"thisIsKat11\"),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tAzureadAdministrator: \u0026mssql.ServerAzureadAdministratorArgs{\n\t\t\t\tLoginUsername: pulumi.String(\"AzureAD Admin\"),\n\t\t\t\tObjectId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewServerTransparentDataEncryption(ctx, \"example\", \u0026mssql.ServerTransparentDataEncryptionArgs{\n\t\t\tServerId: exampleServer.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.mssql.Server;\nimport com.pulumi.azure.mssql.ServerArgs;\nimport com.pulumi.azure.mssql.inputs.ServerAzureadAdministratorArgs;\nimport com.pulumi.azure.mssql.ServerTransparentDataEncryption;\nimport com.pulumi.azure.mssql.ServerTransparentDataEncryptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"EastUs\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"mssqlserver\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"12.0\")\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"thisIsKat11\")\n .minimumTlsVersion(\"1.2\")\n .azureadAdministrator(ServerAzureadAdministratorArgs.builder()\n .loginUsername(\"AzureAD Admin\")\n .objectId(\"00000000-0000-0000-0000-000000000000\")\n .build())\n .tags(Map.of(\"environment\", \"production\"))\n .build());\n\n var exampleServerTransparentDataEncryption = new ServerTransparentDataEncryption(\"exampleServerTransparentDataEncryption\", ServerTransparentDataEncryptionArgs.builder()\n .serverId(exampleServer.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: EastUs\n exampleServer:\n type: azure:mssql:Server\n name: example\n properties:\n name: mssqlserver\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '12.0'\n administratorLogin: missadministrator\n administratorLoginPassword: thisIsKat11\n minimumTlsVersion: '1.2'\n azureadAdministrator:\n loginUsername: AzureAD Admin\n objectId: 00000000-0000-0000-0000-000000000000\n tags:\n environment: production\n exampleServerTransparentDataEncryption:\n type: azure:mssql:ServerTransparentDataEncryption\n name: example\n properties:\n serverId: ${exampleServer.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Customer Managed Key\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"EastUs\",\n});\nconst exampleServer = new azure.mssql.Server(\"example\", {\n name: \"mssqlserver\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"12.0\",\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"thisIsKat11\",\n minimumTlsVersion: \"1.2\",\n azureadAdministrator: {\n loginUsername: \"AzureAD Admin\",\n objectId: \"00000000-0000-0000-0000-000000000000\",\n },\n tags: {\n environment: \"production\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\n// Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: false,\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n tenantId: exampleServer.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleServer.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"byok\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [exampleKeyVault],\n});\nconst exampleServerTransparentDataEncryption = new azure.mssql.ServerTransparentDataEncryption(\"example\", {\n serverId: exampleServer.id,\n keyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"EastUs\")\nexample_server = azure.mssql.Server(\"example\",\n name=\"mssqlserver\",\n resource_group_name=example.name,\n location=example.location,\n version=\"12.0\",\n administrator_login=\"missadministrator\",\n administrator_login_password=\"thisIsKat11\",\n minimum_tls_version=\"1.2\",\n azuread_administrator={\n \"login_username\": \"AzureAD Admin\",\n \"object_id\": \"00000000-0000-0000-0000-000000000000\",\n },\n tags={\n \"environment\": \"production\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\n# Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=False,\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n \"tenant_id\": example_server.identity.tenant_id,\n \"object_id\": example_server.identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"byok\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_key_vault]))\nexample_server_transparent_data_encryption = azure.mssql.ServerTransparentDataEncryption(\"example\",\n server_id=example_server.id,\n key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"EastUs\",\n });\n\n var exampleServer = new Azure.MSSql.Server(\"example\", new()\n {\n Name = \"mssqlserver\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"12.0\",\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"thisIsKat11\",\n MinimumTlsVersion = \"1.2\",\n AzureadAdministrator = new Azure.MSSql.Inputs.ServerAzureadAdministratorArgs\n {\n LoginUsername = \"AzureAD Admin\",\n ObjectId = \"00000000-0000-0000-0000-000000000000\",\n },\n Tags = \n {\n { \"environment\", \"production\" },\n },\n Identity = new Azure.MSSql.Inputs.ServerIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n // Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = false,\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleServer.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleServer.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"byok\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n },\n });\n\n var exampleServerTransparentDataEncryption = new Azure.MSSql.ServerTransparentDataEncryption(\"example\", new()\n {\n ServerId = exampleServer.Id,\n KeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"EastUs\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := mssql.NewServer(ctx, \"example\", \u0026mssql.ServerArgs{\n\t\t\tName: pulumi.String(\"mssqlserver\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"12.0\"),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"thisIsKat11\"),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tAzureadAdministrator: \u0026mssql.ServerAzureadAdministratorArgs{\n\t\t\t\tLoginUsername: pulumi.String(\"AzureAD Admin\"),\n\t\t\t\tObjectId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t\tIdentity: \u0026mssql.ServerIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleServer.Identity.ApplyT(func(identity mssql.ServerIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleServer.Identity.ApplyT(func(identity mssql.ServerIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"byok\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewServerTransparentDataEncryption(ctx, \"example\", \u0026mssql.ServerTransparentDataEncryptionArgs{\n\t\t\tServerId: exampleServer.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.mssql.Server;\nimport com.pulumi.azure.mssql.ServerArgs;\nimport com.pulumi.azure.mssql.inputs.ServerAzureadAdministratorArgs;\nimport com.pulumi.azure.mssql.inputs.ServerIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.mssql.ServerTransparentDataEncryption;\nimport com.pulumi.azure.mssql.ServerTransparentDataEncryptionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"EastUs\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"mssqlserver\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"12.0\")\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"thisIsKat11\")\n .minimumTlsVersion(\"1.2\")\n .azureadAdministrator(ServerAzureadAdministratorArgs.builder()\n .loginUsername(\"AzureAD Admin\")\n .objectId(\"00000000-0000-0000-0000-000000000000\")\n .build())\n .tags(Map.of(\"environment\", \"production\"))\n .identity(ServerIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n // Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(false)\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleServer.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleServer.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"byok\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleKeyVault)\n .build());\n\n var exampleServerTransparentDataEncryption = new ServerTransparentDataEncryption(\"exampleServerTransparentDataEncryption\", ServerTransparentDataEncryptionArgs.builder()\n .serverId(exampleServer.id())\n .keyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: EastUs\n exampleServer:\n type: azure:mssql:Server\n name: example\n properties:\n name: mssqlserver\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '12.0'\n administratorLogin: missadministrator\n administratorLoginPassword: thisIsKat11\n minimumTlsVersion: '1.2'\n azureadAdministrator:\n loginUsername: AzureAD Admin\n objectId: 00000000-0000-0000-0000-000000000000\n tags:\n environment: production\n identity:\n type: SystemAssigned\n # Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: false\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - List\n - Create\n - Delete\n - Update\n - Recover\n - Purge\n - GetRotationPolicy\n - tenantId: ${exampleServer.identity.tenantId}\n objectId: ${exampleServer.identity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: byok\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\n exampleServerTransparentDataEncryption:\n type: azure:mssql:ServerTransparentDataEncryption\n name: example\n properties:\n serverId: ${exampleServer.id}\n keyVaultKeyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSQL Server Transparent Data Encryption can be imported using the resource id, e.g.\n\n```sh\n$ pulumi import azure:mssql/serverTransparentDataEncryption:ServerTransparentDataEncryption example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.Sql/servers/server1/encryptionProtector/current\n```\n\n", + "description": "Manages the transparent data encryption configuration for a MSSQL Server\n\n!\u003e **IMPORTANT:** This resource should only be used with pre-existing MS SQL Instances that are over 2 years old. For new MS SQL Instances that will be created through the use of the `azure.mssql.Server` resource, please enable Transparent Data Encryption through `azure.mssql.Server` resource itself by configuring an identity block. By default all new MS SQL Instances are deployed with System Managed Transparent Data Encryption enabled. \n\n\u003e **NOTE:** Once transparent data encryption is enabled on a MS SQL instance, it is not possible to remove TDE. You will be able to switch between 'ServiceManaged' and 'CustomerManaged' keys, but will not be able to remove encryption. For safety when this resource is deleted, the TDE mode will automatically be set to 'ServiceManaged'. See `key_vault_uri` for more information on how to specify the key types. As SQL Server only supports a single configuration for encryption settings, this resource will replace the current encryption settings on the server.\n\n\u003e **Note:** See [documentation](https://docs.microsoft.com/azure/azure-sql/database/transparent-data-encryption-byok-overview) for important information on how handle lifecycle management of the keys to prevent data lockout.\n\n## Example Usage\n\n### With Service Managed Key\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"EastUs\",\n});\nconst exampleServer = new azure.mssql.Server(\"example\", {\n name: \"mssqlserver\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"12.0\",\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"thisIsKat11\",\n minimumTlsVersion: \"1.2\",\n azureadAdministrator: {\n loginUsername: \"AzureAD Admin\",\n objectId: \"00000000-0000-0000-0000-000000000000\",\n },\n tags: {\n environment: \"production\",\n },\n});\nconst exampleServerTransparentDataEncryption = new azure.mssql.ServerTransparentDataEncryption(\"example\", {serverId: exampleServer.id});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"EastUs\")\nexample_server = azure.mssql.Server(\"example\",\n name=\"mssqlserver\",\n resource_group_name=example.name,\n location=example.location,\n version=\"12.0\",\n administrator_login=\"missadministrator\",\n administrator_login_password=\"thisIsKat11\",\n minimum_tls_version=\"1.2\",\n azuread_administrator={\n \"login_username\": \"AzureAD Admin\",\n \"object_id\": \"00000000-0000-0000-0000-000000000000\",\n },\n tags={\n \"environment\": \"production\",\n })\nexample_server_transparent_data_encryption = azure.mssql.ServerTransparentDataEncryption(\"example\", server_id=example_server.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"EastUs\",\n });\n\n var exampleServer = new Azure.MSSql.Server(\"example\", new()\n {\n Name = \"mssqlserver\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"12.0\",\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"thisIsKat11\",\n MinimumTlsVersion = \"1.2\",\n AzureadAdministrator = new Azure.MSSql.Inputs.ServerAzureadAdministratorArgs\n {\n LoginUsername = \"AzureAD Admin\",\n ObjectId = \"00000000-0000-0000-0000-000000000000\",\n },\n Tags = \n {\n { \"environment\", \"production\" },\n },\n });\n\n var exampleServerTransparentDataEncryption = new Azure.MSSql.ServerTransparentDataEncryption(\"example\", new()\n {\n ServerId = exampleServer.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"EastUs\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := mssql.NewServer(ctx, \"example\", \u0026mssql.ServerArgs{\n\t\t\tName: pulumi.String(\"mssqlserver\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"12.0\"),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"thisIsKat11\"),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tAzureadAdministrator: \u0026mssql.ServerAzureadAdministratorArgs{\n\t\t\t\tLoginUsername: pulumi.String(\"AzureAD Admin\"),\n\t\t\t\tObjectId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewServerTransparentDataEncryption(ctx, \"example\", \u0026mssql.ServerTransparentDataEncryptionArgs{\n\t\t\tServerId: exampleServer.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.mssql.Server;\nimport com.pulumi.azure.mssql.ServerArgs;\nimport com.pulumi.azure.mssql.inputs.ServerAzureadAdministratorArgs;\nimport com.pulumi.azure.mssql.ServerTransparentDataEncryption;\nimport com.pulumi.azure.mssql.ServerTransparentDataEncryptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"EastUs\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"mssqlserver\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"12.0\")\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"thisIsKat11\")\n .minimumTlsVersion(\"1.2\")\n .azureadAdministrator(ServerAzureadAdministratorArgs.builder()\n .loginUsername(\"AzureAD Admin\")\n .objectId(\"00000000-0000-0000-0000-000000000000\")\n .build())\n .tags(Map.of(\"environment\", \"production\"))\n .build());\n\n var exampleServerTransparentDataEncryption = new ServerTransparentDataEncryption(\"exampleServerTransparentDataEncryption\", ServerTransparentDataEncryptionArgs.builder()\n .serverId(exampleServer.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: EastUs\n exampleServer:\n type: azure:mssql:Server\n name: example\n properties:\n name: mssqlserver\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '12.0'\n administratorLogin: missadministrator\n administratorLoginPassword: thisIsKat11\n minimumTlsVersion: '1.2'\n azureadAdministrator:\n loginUsername: AzureAD Admin\n objectId: 00000000-0000-0000-0000-000000000000\n tags:\n environment: production\n exampleServerTransparentDataEncryption:\n type: azure:mssql:ServerTransparentDataEncryption\n name: example\n properties:\n serverId: ${exampleServer.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Customer Managed Key\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"EastUs\",\n});\nconst exampleServer = new azure.mssql.Server(\"example\", {\n name: \"mssqlserver\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"12.0\",\n administratorLogin: \"missadministrator\",\n administratorLoginPassword: \"thisIsKat11\",\n minimumTlsVersion: \"1.2\",\n azureadAdministrator: {\n loginUsername: \"AzureAD Admin\",\n objectId: \"00000000-0000-0000-0000-000000000000\",\n },\n tags: {\n environment: \"production\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\n// Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n tenantId: current.then(current =\u003e current.tenantId),\n softDeleteRetentionDays: 7,\n purgeProtectionEnabled: false,\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n tenantId: exampleServer.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleServer.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"byok\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [exampleKeyVault],\n});\nconst exampleServerTransparentDataEncryption = new azure.mssql.ServerTransparentDataEncryption(\"example\", {\n serverId: exampleServer.id,\n keyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"EastUs\")\nexample_server = azure.mssql.Server(\"example\",\n name=\"mssqlserver\",\n resource_group_name=example.name,\n location=example.location,\n version=\"12.0\",\n administrator_login=\"missadministrator\",\n administrator_login_password=\"thisIsKat11\",\n minimum_tls_version=\"1.2\",\n azuread_administrator={\n \"login_username\": \"AzureAD Admin\",\n \"object_id\": \"00000000-0000-0000-0000-000000000000\",\n },\n tags={\n \"environment\": \"production\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\n# Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n tenant_id=current.tenant_id,\n soft_delete_retention_days=7,\n purge_protection_enabled=False,\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n },\n {\n \"tenant_id\": example_server.identity.tenant_id,\n \"object_id\": example_server.identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"byok\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[example_key_vault]))\nexample_server_transparent_data_encryption = azure.mssql.ServerTransparentDataEncryption(\"example\",\n server_id=example_server.id,\n key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"EastUs\",\n });\n\n var exampleServer = new Azure.MSSql.Server(\"example\", new()\n {\n Name = \"mssqlserver\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"12.0\",\n AdministratorLogin = \"missadministrator\",\n AdministratorLoginPassword = \"thisIsKat11\",\n MinimumTlsVersion = \"1.2\",\n AzureadAdministrator = new Azure.MSSql.Inputs.ServerAzureadAdministratorArgs\n {\n LoginUsername = \"AzureAD Admin\",\n ObjectId = \"00000000-0000-0000-0000-000000000000\",\n },\n Tags = \n {\n { \"environment\", \"production\" },\n },\n Identity = new Azure.MSSql.Inputs.ServerIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n // Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SoftDeleteRetentionDays = 7,\n PurgeProtectionEnabled = false,\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = exampleServer.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleServer.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"byok\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleKeyVault,\n },\n });\n\n var exampleServerTransparentDataEncryption = new Azure.MSSql.ServerTransparentDataEncryption(\"example\", new()\n {\n ServerId = exampleServer.Id,\n KeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/mssql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"EastUs\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := mssql.NewServer(ctx, \"example\", \u0026mssql.ServerArgs{\n\t\t\tName: pulumi.String(\"mssqlserver\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"12.0\"),\n\t\t\tAdministratorLogin: pulumi.String(\"missadministrator\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"thisIsKat11\"),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tAzureadAdministrator: \u0026mssql.ServerAzureadAdministratorArgs{\n\t\t\t\tLoginUsername: pulumi.String(\"AzureAD Admin\"),\n\t\t\t\tObjectId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t\tIdentity: \u0026mssql.ServerIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(false),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: exampleServer.Identity.ApplyT(func(identity mssql.ServerIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tObjectId: exampleServer.Identity.ApplyT(func(identity mssql.ServerIdentity) (*string, error) {\n\t\t\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"byok\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleKeyVault,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = mssql.NewServerTransparentDataEncryption(ctx, \"example\", \u0026mssql.ServerTransparentDataEncryptionArgs{\n\t\t\tServerId: exampleServer.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.mssql.Server;\nimport com.pulumi.azure.mssql.ServerArgs;\nimport com.pulumi.azure.mssql.inputs.ServerAzureadAdministratorArgs;\nimport com.pulumi.azure.mssql.inputs.ServerIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.mssql.ServerTransparentDataEncryption;\nimport com.pulumi.azure.mssql.ServerTransparentDataEncryptionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"EastUs\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"mssqlserver\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"12.0\")\n .administratorLogin(\"missadministrator\")\n .administratorLoginPassword(\"thisIsKat11\")\n .minimumTlsVersion(\"1.2\")\n .azureadAdministrator(ServerAzureadAdministratorArgs.builder()\n .loginUsername(\"AzureAD Admin\")\n .objectId(\"00000000-0000-0000-0000-000000000000\")\n .build())\n .tags(Map.of(\"environment\", \"production\"))\n .identity(ServerIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n // Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .softDeleteRetentionDays(7)\n .purgeProtectionEnabled(false)\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"List\",\n \"Create\",\n \"Delete\",\n \"Update\",\n \"Recover\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(exampleServer.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleServer.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"byok\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleKeyVault)\n .build());\n\n var exampleServerTransparentDataEncryption = new ServerTransparentDataEncryption(\"exampleServerTransparentDataEncryption\", ServerTransparentDataEncryptionArgs.builder()\n .serverId(exampleServer.id())\n .keyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: EastUs\n exampleServer:\n type: azure:mssql:Server\n name: example\n properties:\n name: mssqlserver\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '12.0'\n administratorLogin: missadministrator\n administratorLoginPassword: thisIsKat11\n minimumTlsVersion: '1.2'\n azureadAdministrator:\n loginUsername: AzureAD Admin\n objectId: 00000000-0000-0000-0000-000000000000\n tags:\n environment: production\n identity:\n type: SystemAssigned\n # Create a key vault with policies for the deployer to create a key \u0026 SQL Server to wrap/unwrap/get key\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n tenantId: ${current.tenantId}\n softDeleteRetentionDays: 7\n purgeProtectionEnabled: false\n skuName: standard\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - List\n - Create\n - Delete\n - Update\n - Recover\n - Purge\n - GetRotationPolicy\n - tenantId: ${exampleServer.identity.tenantId}\n objectId: ${exampleServer.identity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: byok\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${exampleKeyVault}\n exampleServerTransparentDataEncryption:\n type: azure:mssql:ServerTransparentDataEncryption\n name: example\n properties:\n serverId: ${exampleServer.id}\n keyVaultKeyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSQL Server Transparent Data Encryption can be imported using the resource id, e.g.\n\n```sh\n$ pulumi import azure:mssql/serverTransparentDataEncryption:ServerTransparentDataEncryption example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/group1/providers/Microsoft.Sql/servers/server1/encryptionProtector/current\n```\n\n", "properties": { "autoRotationEnabled": { "type": "boolean", @@ -216815,7 +216815,7 @@ } }, "azure:netapp/account:Account": { - "description": "Manages a NetApp Account.\n\n\u003e **NOTE:** Azure allows only one active directory can be joined to a single subscription at a time for NetApp Account.\n\n## NetApp Account Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"anf-user-assigned-identity\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleAccount = new azure.netapp.Account(\"example\", {\n name: \"netappaccount\",\n location: example.location,\n resourceGroupName: example.name,\n activeDirectory: {\n username: \"aduser\",\n password: \"aduserpwd\",\n smbServerName: \"SMBSERVER\",\n dnsServers: [\"1.2.3.4\"],\n domain: \"westcentralus.com\",\n organizationalUnit: \"OU=FirstLevel\",\n },\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"anf-user-assigned-identity\",\n location=example.location,\n resource_group_name=example.name)\nexample_account = azure.netapp.Account(\"example\",\n name=\"netappaccount\",\n location=example.location,\n resource_group_name=example.name,\n active_directory={\n \"username\": \"aduser\",\n \"password\": \"aduserpwd\",\n \"smb_server_name\": \"SMBSERVER\",\n \"dns_servers\": [\"1.2.3.4\"],\n \"domain\": \"westcentralus.com\",\n \"organizational_unit\": \"OU=FirstLevel\",\n },\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"anf-user-assigned-identity\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleAccount = new Azure.NetApp.Account(\"example\", new()\n {\n Name = \"netappaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ActiveDirectory = new Azure.NetApp.Inputs.AccountActiveDirectoryArgs\n {\n Username = \"aduser\",\n Password = \"aduserpwd\",\n SmbServerName = \"SMBSERVER\",\n DnsServers = new[]\n {\n \"1.2.3.4\",\n },\n Domain = \"westcentralus.com\",\n OrganizationalUnit = \"OU=FirstLevel\",\n },\n Identity = new Azure.NetApp.Inputs.AccountIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/netapp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"anf-user-assigned-identity\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = netapp.NewAccount(ctx, \"example\", \u0026netapp.AccountArgs{\n\t\t\tName: pulumi.String(\"netappaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tActiveDirectory: \u0026netapp.AccountActiveDirectoryArgs{\n\t\t\t\tUsername: pulumi.String(\"aduser\"),\n\t\t\t\tPassword: pulumi.String(\"aduserpwd\"),\n\t\t\t\tSmbServerName: pulumi.String(\"SMBSERVER\"),\n\t\t\t\tDnsServers: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"1.2.3.4\"),\n\t\t\t\t},\n\t\t\t\tDomain: pulumi.String(\"westcentralus.com\"),\n\t\t\t\tOrganizationalUnit: pulumi.String(\"OU=FirstLevel\"),\n\t\t\t},\n\t\t\tIdentity: \u0026netapp.AccountIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.netapp.Account;\nimport com.pulumi.azure.netapp.AccountArgs;\nimport com.pulumi.azure.netapp.inputs.AccountActiveDirectoryArgs;\nimport com.pulumi.azure.netapp.inputs.AccountIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"anf-user-assigned-identity\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"netappaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .activeDirectory(AccountActiveDirectoryArgs.builder()\n .username(\"aduser\")\n .password(\"aduserpwd\")\n .smbServerName(\"SMBSERVER\")\n .dnsServers(\"1.2.3.4\")\n .domain(\"westcentralus.com\")\n .organizationalUnit(\"OU=FirstLevel\")\n .build())\n .identity(AccountIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: anf-user-assigned-identity\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleAccount:\n type: azure:netapp:Account\n name: example\n properties:\n name: netappaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n activeDirectory:\n username: aduser\n password: aduserpwd\n smbServerName: SMBSERVER\n dnsServers:\n - 1.2.3.4\n domain: westcentralus.com\n organizationalUnit: OU=FirstLevel\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetApp Accounts can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:netapp/account:Account example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.NetApp/netAppAccounts/account1\n```\n\n~\u003e **IMPORTANT:** When importing a NetApp account, the `active_directory.password` and `active_directory.server_root_ca_certificate` values *cannot* be retrieved from the Azure API and will need to be redeclared within the resource.\n\n", + "description": "Manages a NetApp Account.\n\n\u003e **NOTE:** Azure allows only one active directory can be joined to a single subscription at a time for NetApp Account.\n\n## NetApp Account Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"anf-user-assigned-identity\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleAccount = new azure.netapp.Account(\"example\", {\n name: \"netappaccount\",\n location: example.location,\n resourceGroupName: example.name,\n activeDirectory: {\n username: \"aduser\",\n password: \"aduserpwd\",\n smbServerName: \"SMBSERVER\",\n dnsServers: [\"1.2.3.4\"],\n domain: \"westcentralus.com\",\n organizationalUnit: \"OU=FirstLevel\",\n },\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"anf-user-assigned-identity\",\n location=example.location,\n resource_group_name=example.name)\nexample_account = azure.netapp.Account(\"example\",\n name=\"netappaccount\",\n location=example.location,\n resource_group_name=example.name,\n active_directory={\n \"username\": \"aduser\",\n \"password\": \"aduserpwd\",\n \"smb_server_name\": \"SMBSERVER\",\n \"dns_servers\": [\"1.2.3.4\"],\n \"domain\": \"westcentralus.com\",\n \"organizational_unit\": \"OU=FirstLevel\",\n },\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"anf-user-assigned-identity\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleAccount = new Azure.NetApp.Account(\"example\", new()\n {\n Name = \"netappaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n ActiveDirectory = new Azure.NetApp.Inputs.AccountActiveDirectoryArgs\n {\n Username = \"aduser\",\n Password = \"aduserpwd\",\n SmbServerName = \"SMBSERVER\",\n DnsServers = new[]\n {\n \"1.2.3.4\",\n },\n Domain = \"westcentralus.com\",\n OrganizationalUnit = \"OU=FirstLevel\",\n },\n Identity = new Azure.NetApp.Inputs.AccountIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/netapp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"anf-user-assigned-identity\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = netapp.NewAccount(ctx, \"example\", \u0026netapp.AccountArgs{\n\t\t\tName: pulumi.String(\"netappaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tActiveDirectory: \u0026netapp.AccountActiveDirectoryArgs{\n\t\t\t\tUsername: pulumi.String(\"aduser\"),\n\t\t\t\tPassword: pulumi.String(\"aduserpwd\"),\n\t\t\t\tSmbServerName: pulumi.String(\"SMBSERVER\"),\n\t\t\t\tDnsServers: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"1.2.3.4\"),\n\t\t\t\t},\n\t\t\t\tDomain: pulumi.String(\"westcentralus.com\"),\n\t\t\t\tOrganizationalUnit: pulumi.String(\"OU=FirstLevel\"),\n\t\t\t},\n\t\t\tIdentity: \u0026netapp.AccountIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.netapp.Account;\nimport com.pulumi.azure.netapp.AccountArgs;\nimport com.pulumi.azure.netapp.inputs.AccountActiveDirectoryArgs;\nimport com.pulumi.azure.netapp.inputs.AccountIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"anf-user-assigned-identity\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"netappaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .activeDirectory(AccountActiveDirectoryArgs.builder()\n .username(\"aduser\")\n .password(\"aduserpwd\")\n .smbServerName(\"SMBSERVER\")\n .dnsServers(\"1.2.3.4\")\n .domain(\"westcentralus.com\")\n .organizationalUnit(\"OU=FirstLevel\")\n .build())\n .identity(AccountIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: anf-user-assigned-identity\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleAccount:\n type: azure:netapp:Account\n name: example\n properties:\n name: netappaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n activeDirectory:\n username: aduser\n password: aduserpwd\n smbServerName: SMBSERVER\n dnsServers:\n - 1.2.3.4\n domain: westcentralus.com\n organizationalUnit: OU=FirstLevel\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetApp Accounts can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:netapp/account:Account example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.NetApp/netAppAccounts/account1\n```\n\n~\u003e **IMPORTANT:** When importing a NetApp account, the `active_directory.password` and `active_directory.server_root_ca_certificate` values *cannot* be retrieved from the Azure API and will need to be redeclared within the resource.\n\n", "properties": { "activeDirectory": { "$ref": "#/types/azure:netapp/AccountActiveDirectory:AccountActiveDirectory", @@ -216923,7 +216923,7 @@ } }, "azure:netapp/accountEncryption:AccountEncryption": { - "description": "Manages a NetApp Account Encryption Resource.\n\nFor more information about Azure NetApp Files Customer-Managed Keys feature, please refer to [Configure customer-managed keys for Azure NetApp Files volume encryption](https://learn.microsoft.com/en-us/azure/azure-netapp-files/configure-customer-managed-keys)\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"anf-user-assigned-identity\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"anfcmkakv\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n enabledForDeployment: true,\n enabledForTemplateDeployment: true,\n purgeProtectionEnabled: true,\n tenantId: \"00000000-0000-0000-0000-000000000000\",\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: \"00000000-0000-0000-0000-000000000000\",\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"WrapKey\",\n \"UnwrapKey\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n },\n {\n tenantId: \"00000000-0000-0000-0000-000000000000\",\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"Encrypt\",\n \"Decrypt\",\n ],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"anfencryptionkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n});\nconst exampleAccount = new azure.netapp.Account(\"example\", {\n name: \"netappaccount\",\n location: example.location,\n resourceGroupName: example.name,\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n});\nconst exampleAccountEncryption = new azure.netapp.AccountEncryption(\"example\", {\n netappAccountId: exampleAccount.id,\n userAssignedIdentityId: exampleUserAssignedIdentity.id,\n encryptionKey: exampleKey.versionlessId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"anf-user-assigned-identity\",\n location=example.location,\n resource_group_name=example.name)\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"anfcmkakv\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n enabled_for_deployment=True,\n enabled_for_template_deployment=True,\n purge_protection_enabled=True,\n tenant_id=\"00000000-0000-0000-0000-000000000000\",\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": \"00000000-0000-0000-0000-000000000000\",\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"WrapKey\",\n \"UnwrapKey\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n },\n {\n \"tenant_id\": \"00000000-0000-0000-0000-000000000000\",\n \"object_id\": example_user_assigned_identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"Encrypt\",\n \"Decrypt\",\n ],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"anfencryptionkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ])\nexample_account = azure.netapp.Account(\"example\",\n name=\"netappaccount\",\n location=example.location,\n resource_group_name=example.name,\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n })\nexample_account_encryption = azure.netapp.AccountEncryption(\"example\",\n netapp_account_id=example_account.id,\n user_assigned_identity_id=example_user_assigned_identity.id,\n encryption_key=example_key.versionless_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"anf-user-assigned-identity\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"anfcmkakv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n EnabledForDeployment = true,\n EnabledForTemplateDeployment = true,\n PurgeProtectionEnabled = true,\n TenantId = \"00000000-0000-0000-0000-000000000000\",\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = \"00000000-0000-0000-0000-000000000000\",\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"WrapKey\",\n \"UnwrapKey\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = \"00000000-0000-0000-0000-000000000000\",\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"Encrypt\",\n \"Decrypt\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"anfencryptionkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n });\n\n var exampleAccount = new Azure.NetApp.Account(\"example\", new()\n {\n Name = \"netappaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Identity = new Azure.NetApp.Inputs.AccountIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n });\n\n var exampleAccountEncryption = new Azure.NetApp.AccountEncryption(\"example\", new()\n {\n NetappAccountId = exampleAccount.Id,\n UserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n EncryptionKey = exampleKey.VersionlessId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/netapp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"anf-user-assigned-identity\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"anfcmkakv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tEnabledForDeployment: pulumi.Bool(true),\n\t\t\tEnabledForTemplateDeployment: pulumi.Bool(true),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t\tpulumi.String(\"SetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"anfencryptionkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := netapp.NewAccount(ctx, \"example\", \u0026netapp.AccountArgs{\n\t\t\tName: pulumi.String(\"netappaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tIdentity: \u0026netapp.AccountIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = netapp.NewAccountEncryption(ctx, \"example\", \u0026netapp.AccountEncryptionArgs{\n\t\t\tNetappAccountId: exampleAccount.ID(),\n\t\t\tUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t\tEncryptionKey: exampleKey.VersionlessId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.netapp.Account;\nimport com.pulumi.azure.netapp.AccountArgs;\nimport com.pulumi.azure.netapp.inputs.AccountIdentityArgs;\nimport com.pulumi.azure.netapp.AccountEncryption;\nimport com.pulumi.azure.netapp.AccountEncryptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"anf-user-assigned-identity\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"anfcmkakv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .enabledForDeployment(true)\n .enabledForTemplateDeployment(true)\n .purgeProtectionEnabled(true)\n .tenantId(\"00000000-0000-0000-0000-000000000000\")\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(\"00000000-0000-0000-0000-000000000000\")\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"WrapKey\",\n \"UnwrapKey\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(\"00000000-0000-0000-0000-000000000000\")\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"Encrypt\",\n \"Decrypt\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"anfencryptionkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"netappaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .identity(AccountIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .build());\n\n var exampleAccountEncryption = new AccountEncryption(\"exampleAccountEncryption\", AccountEncryptionArgs.builder()\n .netappAccountId(exampleAccount.id())\n .userAssignedIdentityId(exampleUserAssignedIdentity.id())\n .encryptionKey(exampleKey.versionlessId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: anf-user-assigned-identity\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: anfcmkakv\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n enabledForDeployment: true\n enabledForTemplateDeployment: true\n purgeProtectionEnabled: true\n tenantId: 00000000-0000-0000-0000-000000000000\n skuName: standard\n accessPolicies:\n - tenantId: 00000000-0000-0000-0000-000000000000\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - WrapKey\n - UnwrapKey\n - GetRotationPolicy\n - SetRotationPolicy\n - tenantId: 00000000-0000-0000-0000-000000000000\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - Encrypt\n - Decrypt\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: anfencryptionkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n exampleAccount:\n type: azure:netapp:Account\n name: example\n properties:\n name: netappaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n exampleAccountEncryption:\n type: azure:netapp:AccountEncryption\n name: example\n properties:\n netappAccountId: ${exampleAccount.id}\n userAssignedIdentityId: ${exampleUserAssignedIdentity.id}\n encryptionKey: ${exampleKey.versionlessId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAccount Encryption Resources can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:netapp/accountEncryption:AccountEncryption example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.NetApp/netAppAccounts/account1\n```\n\n", + "description": "Manages a NetApp Account Encryption Resource.\n\nFor more information about Azure NetApp Files Customer-Managed Keys feature, please refer to [Configure customer-managed keys for Azure NetApp Files volume encryption](https://learn.microsoft.com/en-us/azure/azure-netapp-files/configure-customer-managed-keys)\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity(\"example\", {\n name: \"anf-user-assigned-identity\",\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"anfcmkakv\",\n location: example.location,\n resourceGroupName: example.name,\n enabledForDiskEncryption: true,\n enabledForDeployment: true,\n enabledForTemplateDeployment: true,\n purgeProtectionEnabled: true,\n tenantId: \"00000000-0000-0000-0000-000000000000\",\n skuName: \"standard\",\n accessPolicies: [\n {\n tenantId: \"00000000-0000-0000-0000-000000000000\",\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"WrapKey\",\n \"UnwrapKey\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n },\n {\n tenantId: \"00000000-0000-0000-0000-000000000000\",\n objectId: exampleUserAssignedIdentity.principalId,\n keyPermissions: [\n \"Get\",\n \"Encrypt\",\n \"Decrypt\",\n ],\n },\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"anfencryptionkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n});\nconst exampleAccount = new azure.netapp.Account(\"example\", {\n name: \"netappaccount\",\n location: example.location,\n resourceGroupName: example.name,\n identity: {\n type: \"UserAssigned\",\n identityIds: [exampleUserAssignedIdentity.id],\n },\n});\nconst exampleAccountEncryption = new azure.netapp.AccountEncryption(\"example\", {\n netappAccountId: exampleAccount.id,\n userAssignedIdentityId: exampleUserAssignedIdentity.id,\n encryptionKey: exampleKey.versionlessId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\nexample_user_assigned_identity = azure.authorization.UserAssignedIdentity(\"example\",\n name=\"anf-user-assigned-identity\",\n location=example.location,\n resource_group_name=example.name)\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"anfcmkakv\",\n location=example.location,\n resource_group_name=example.name,\n enabled_for_disk_encryption=True,\n enabled_for_deployment=True,\n enabled_for_template_deployment=True,\n purge_protection_enabled=True,\n tenant_id=\"00000000-0000-0000-0000-000000000000\",\n sku_name=\"standard\",\n access_policies=[\n {\n \"tenant_id\": \"00000000-0000-0000-0000-000000000000\",\n \"object_id\": current.object_id,\n \"key_permissions\": [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"WrapKey\",\n \"UnwrapKey\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n },\n {\n \"tenant_id\": \"00000000-0000-0000-0000-000000000000\",\n \"object_id\": example_user_assigned_identity.principal_id,\n \"key_permissions\": [\n \"Get\",\n \"Encrypt\",\n \"Decrypt\",\n ],\n },\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"anfencryptionkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ])\nexample_account = azure.netapp.Account(\"example\",\n name=\"netappaccount\",\n location=example.location,\n resource_group_name=example.name,\n identity={\n \"type\": \"UserAssigned\",\n \"identity_ids\": [example_user_assigned_identity.id],\n })\nexample_account_encryption = azure.netapp.AccountEncryption(\"example\",\n netapp_account_id=example_account.id,\n user_assigned_identity_id=example_user_assigned_identity.id,\n encryption_key=example_key.versionless_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity(\"example\", new()\n {\n Name = \"anf-user-assigned-identity\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"anfcmkakv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n EnabledForDiskEncryption = true,\n EnabledForDeployment = true,\n EnabledForTemplateDeployment = true,\n PurgeProtectionEnabled = true,\n TenantId = \"00000000-0000-0000-0000-000000000000\",\n SkuName = \"standard\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = \"00000000-0000-0000-0000-000000000000\",\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"WrapKey\",\n \"UnwrapKey\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = \"00000000-0000-0000-0000-000000000000\",\n ObjectId = exampleUserAssignedIdentity.PrincipalId,\n KeyPermissions = new[]\n {\n \"Get\",\n \"Encrypt\",\n \"Decrypt\",\n },\n },\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"anfencryptionkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n });\n\n var exampleAccount = new Azure.NetApp.Account(\"example\", new()\n {\n Name = \"netappaccount\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Identity = new Azure.NetApp.Inputs.AccountIdentityArgs\n {\n Type = \"UserAssigned\",\n IdentityIds = new[]\n {\n exampleUserAssignedIdentity.Id,\n },\n },\n });\n\n var exampleAccountEncryption = new Azure.NetApp.AccountEncryption(\"example\", new()\n {\n NetappAccountId = exampleAccount.Id,\n UserAssignedIdentityId = exampleUserAssignedIdentity.Id,\n EncryptionKey = exampleKey.VersionlessId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/netapp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, \"example\", \u0026authorization.UserAssignedIdentityArgs{\n\t\t\tName: pulumi.String(\"anf-user-assigned-identity\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"anfcmkakv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tEnabledForDiskEncryption: pulumi.Bool(true),\n\t\t\tEnabledForDeployment: pulumi.Bool(true),\n\t\t\tEnabledForTemplateDeployment: pulumi.Bool(true),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t\tTenantId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\t\t\tpulumi.String(\"SetRotationPolicy\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\t\t\tObjectId: exampleUserAssignedIdentity.PrincipalId,\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"anfencryptionkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := netapp.NewAccount(ctx, \"example\", \u0026netapp.AccountArgs{\n\t\t\tName: pulumi.String(\"netappaccount\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tIdentity: \u0026netapp.AccountIdentityArgs{\n\t\t\t\tType: pulumi.String(\"UserAssigned\"),\n\t\t\t\tIdentityIds: pulumi.StringArray{\n\t\t\t\t\texampleUserAssignedIdentity.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = netapp.NewAccountEncryption(ctx, \"example\", \u0026netapp.AccountEncryptionArgs{\n\t\t\tNetappAccountId: exampleAccount.ID(),\n\t\t\tUserAssignedIdentityId: exampleUserAssignedIdentity.ID(),\n\t\t\tEncryptionKey: exampleKey.VersionlessId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.UserAssignedIdentity;\nimport com.pulumi.azure.authorization.UserAssignedIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.netapp.Account;\nimport com.pulumi.azure.netapp.AccountArgs;\nimport com.pulumi.azure.netapp.inputs.AccountIdentityArgs;\nimport com.pulumi.azure.netapp.AccountEncryption;\nimport com.pulumi.azure.netapp.AccountEncryptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleUserAssignedIdentity = new UserAssignedIdentity(\"exampleUserAssignedIdentity\", UserAssignedIdentityArgs.builder()\n .name(\"anf-user-assigned-identity\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"anfcmkakv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .enabledForDiskEncryption(true)\n .enabledForDeployment(true)\n .enabledForTemplateDeployment(true)\n .purgeProtectionEnabled(true)\n .tenantId(\"00000000-0000-0000-0000-000000000000\")\n .skuName(\"standard\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(\"00000000-0000-0000-0000-000000000000\")\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"WrapKey\",\n \"UnwrapKey\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(\"00000000-0000-0000-0000-000000000000\")\n .objectId(exampleUserAssignedIdentity.principalId())\n .keyPermissions( \n \"Get\",\n \"Encrypt\",\n \"Decrypt\")\n .build())\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"anfencryptionkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"netappaccount\")\n .location(example.location())\n .resourceGroupName(example.name())\n .identity(AccountIdentityArgs.builder()\n .type(\"UserAssigned\")\n .identityIds(exampleUserAssignedIdentity.id())\n .build())\n .build());\n\n var exampleAccountEncryption = new AccountEncryption(\"exampleAccountEncryption\", AccountEncryptionArgs.builder()\n .netappAccountId(exampleAccount.id())\n .userAssignedIdentityId(exampleUserAssignedIdentity.id())\n .encryptionKey(exampleKey.versionlessId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleUserAssignedIdentity:\n type: azure:authorization:UserAssignedIdentity\n name: example\n properties:\n name: anf-user-assigned-identity\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: anfcmkakv\n location: ${example.location}\n resourceGroupName: ${example.name}\n enabledForDiskEncryption: true\n enabledForDeployment: true\n enabledForTemplateDeployment: true\n purgeProtectionEnabled: true\n tenantId: 00000000-0000-0000-0000-000000000000\n skuName: standard\n accessPolicies:\n - tenantId: 00000000-0000-0000-0000-000000000000\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - WrapKey\n - UnwrapKey\n - GetRotationPolicy\n - SetRotationPolicy\n - tenantId: 00000000-0000-0000-0000-000000000000\n objectId: ${exampleUserAssignedIdentity.principalId}\n keyPermissions:\n - Get\n - Encrypt\n - Decrypt\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: anfencryptionkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n exampleAccount:\n type: azure:netapp:Account\n name: example\n properties:\n name: netappaccount\n location: ${example.location}\n resourceGroupName: ${example.name}\n identity:\n type: UserAssigned\n identityIds:\n - ${exampleUserAssignedIdentity.id}\n exampleAccountEncryption:\n type: azure:netapp:AccountEncryption\n name: example\n properties:\n netappAccountId: ${exampleAccount.id}\n userAssignedIdentityId: ${exampleUserAssignedIdentity.id}\n encryptionKey: ${exampleKey.versionlessId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAccount Encryption Resources can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:netapp/accountEncryption:AccountEncryption example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.NetApp/netAppAccounts/account1\n```\n\n", "properties": { "encryptionKey": { "type": "string", @@ -222532,7 +222532,7 @@ } }, "azure:network/networkManager:NetworkManager": { - "description": "Manages a Network Managers.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n tags: {\n foo: \"bar\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\",\n tags={\n \"foo\": \"bar\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n Tags = \n {\n { \"foo\", \"bar\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"foo\": pulumi.String(\"bar\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .tags(Map.of(\"foo\", \"bar\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n tags:\n foo: bar\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Managers can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManager:NetworkManager example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1\n```\n\n", + "description": "Manages a Network Managers.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n tags: {\n foo: \"bar\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\",\n tags={\n \"foo\": \"bar\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n Tags = \n {\n { \"foo\", \"bar\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"foo\": pulumi.String(\"bar\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .tags(Map.of(\"foo\", \"bar\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n tags:\n foo: bar\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Managers can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManager:NetworkManager example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1\n```\n\n", "properties": { "crossTenantScopes": { "type": "array", @@ -222680,7 +222680,7 @@ } }, "azure:network/networkManagerAdminRule:NetworkManagerAdminRule": { - "description": "Manages a Network Manager Admin Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-network-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerSecurityAdminConfiguration = new azure.network.NetworkManagerSecurityAdminConfiguration(\"example\", {\n name: \"example-admin-conf\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerAdminRuleCollection = new azure.network.NetworkManagerAdminRuleCollection(\"example\", {\n name: \"example-admin-rule-collection\",\n securityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.id,\n networkGroupIds: [exampleNetworkManagerNetworkGroup.id],\n});\nconst exampleNetworkManagerAdminRule = new azure.network.NetworkManagerAdminRule(\"example\", {\n name: \"example-admin-rule\",\n adminRuleCollectionId: exampleNetworkManagerAdminRuleCollection.id,\n action: \"Deny\",\n direction: \"Outbound\",\n priority: 1,\n protocol: \"Tcp\",\n sourcePortRanges: [\n \"80\",\n \"1024-65535\",\n ],\n destinationPortRanges: [\"80\"],\n sources: [{\n addressPrefixType: \"ServiceTag\",\n addressPrefix: \"Internet\",\n }],\n destinations: [\n {\n addressPrefixType: \"IPPrefix\",\n addressPrefix: \"10.1.0.1\",\n },\n {\n addressPrefixType: \"IPPrefix\",\n addressPrefix: \"10.0.0.0/24\",\n },\n ],\n description: \"example admin rule\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-network-group\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_security_admin_configuration = azure.network.NetworkManagerSecurityAdminConfiguration(\"example\",\n name=\"example-admin-conf\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_admin_rule_collection = azure.network.NetworkManagerAdminRuleCollection(\"example\",\n name=\"example-admin-rule-collection\",\n security_admin_configuration_id=example_network_manager_security_admin_configuration.id,\n network_group_ids=[example_network_manager_network_group.id])\nexample_network_manager_admin_rule = azure.network.NetworkManagerAdminRule(\"example\",\n name=\"example-admin-rule\",\n admin_rule_collection_id=example_network_manager_admin_rule_collection.id,\n action=\"Deny\",\n direction=\"Outbound\",\n priority=1,\n protocol=\"Tcp\",\n source_port_ranges=[\n \"80\",\n \"1024-65535\",\n ],\n destination_port_ranges=[\"80\"],\n sources=[{\n \"address_prefix_type\": \"ServiceTag\",\n \"address_prefix\": \"Internet\",\n }],\n destinations=[\n {\n \"address_prefix_type\": \"IPPrefix\",\n \"address_prefix\": \"10.1.0.1\",\n },\n {\n \"address_prefix_type\": \"IPPrefix\",\n \"address_prefix\": \"10.0.0.0/24\",\n },\n ],\n description=\"example admin rule\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-network-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerSecurityAdminConfiguration = new Azure.Network.NetworkManagerSecurityAdminConfiguration(\"example\", new()\n {\n Name = \"example-admin-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerAdminRuleCollection = new Azure.Network.NetworkManagerAdminRuleCollection(\"example\", new()\n {\n Name = \"example-admin-rule-collection\",\n SecurityAdminConfigurationId = exampleNetworkManagerSecurityAdminConfiguration.Id,\n NetworkGroupIds = new[]\n {\n exampleNetworkManagerNetworkGroup.Id,\n },\n });\n\n var exampleNetworkManagerAdminRule = new Azure.Network.NetworkManagerAdminRule(\"example\", new()\n {\n Name = \"example-admin-rule\",\n AdminRuleCollectionId = exampleNetworkManagerAdminRuleCollection.Id,\n Action = \"Deny\",\n Direction = \"Outbound\",\n Priority = 1,\n Protocol = \"Tcp\",\n SourcePortRanges = new[]\n {\n \"80\",\n \"1024-65535\",\n },\n DestinationPortRanges = new[]\n {\n \"80\",\n },\n Sources = new[]\n {\n new Azure.Network.Inputs.NetworkManagerAdminRuleSourceArgs\n {\n AddressPrefixType = \"ServiceTag\",\n AddressPrefix = \"Internet\",\n },\n },\n Destinations = new[]\n {\n new Azure.Network.Inputs.NetworkManagerAdminRuleDestinationArgs\n {\n AddressPrefixType = \"IPPrefix\",\n AddressPrefix = \"10.1.0.1\",\n },\n new Azure.Network.Inputs.NetworkManagerAdminRuleDestinationArgs\n {\n AddressPrefixType = \"IPPrefix\",\n AddressPrefix = \"10.0.0.0/24\",\n },\n },\n Description = \"example admin rule\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-network-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerSecurityAdminConfiguration, err := network.NewNetworkManagerSecurityAdminConfiguration(ctx, \"example\", \u0026network.NetworkManagerSecurityAdminConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-admin-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerAdminRuleCollection, err := network.NewNetworkManagerAdminRuleCollection(ctx, \"example\", \u0026network.NetworkManagerAdminRuleCollectionArgs{\n\t\t\tName: pulumi.String(\"example-admin-rule-collection\"),\n\t\t\tSecurityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.ID(),\n\t\t\tNetworkGroupIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerNetworkGroup.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerAdminRule(ctx, \"example\", \u0026network.NetworkManagerAdminRuleArgs{\n\t\t\tName: pulumi.String(\"example-admin-rule\"),\n\t\t\tAdminRuleCollectionId: exampleNetworkManagerAdminRuleCollection.ID(),\n\t\t\tAction: pulumi.String(\"Deny\"),\n\t\t\tDirection: pulumi.String(\"Outbound\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tProtocol: pulumi.String(\"Tcp\"),\n\t\t\tSourcePortRanges: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"80\"),\n\t\t\t\tpulumi.String(\"1024-65535\"),\n\t\t\t},\n\t\t\tDestinationPortRanges: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"80\"),\n\t\t\t},\n\t\t\tSources: network.NetworkManagerAdminRuleSourceArray{\n\t\t\t\t\u0026network.NetworkManagerAdminRuleSourceArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"ServiceTag\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"Internet\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tDestinations: network.NetworkManagerAdminRuleDestinationArray{\n\t\t\t\t\u0026network.NetworkManagerAdminRuleDestinationArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"IPPrefix\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"10.1.0.1\"),\n\t\t\t\t},\n\t\t\t\t\u0026network.NetworkManagerAdminRuleDestinationArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"IPPrefix\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"10.0.0.0/24\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example admin rule\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfiguration;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfigurationArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollection;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollectionArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRule;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerAdminRuleSourceArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerAdminRuleDestinationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-network-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerSecurityAdminConfiguration = new NetworkManagerSecurityAdminConfiguration(\"exampleNetworkManagerSecurityAdminConfiguration\", NetworkManagerSecurityAdminConfigurationArgs.builder()\n .name(\"example-admin-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerAdminRuleCollection = new NetworkManagerAdminRuleCollection(\"exampleNetworkManagerAdminRuleCollection\", NetworkManagerAdminRuleCollectionArgs.builder()\n .name(\"example-admin-rule-collection\")\n .securityAdminConfigurationId(exampleNetworkManagerSecurityAdminConfiguration.id())\n .networkGroupIds(exampleNetworkManagerNetworkGroup.id())\n .build());\n\n var exampleNetworkManagerAdminRule = new NetworkManagerAdminRule(\"exampleNetworkManagerAdminRule\", NetworkManagerAdminRuleArgs.builder()\n .name(\"example-admin-rule\")\n .adminRuleCollectionId(exampleNetworkManagerAdminRuleCollection.id())\n .action(\"Deny\")\n .direction(\"Outbound\")\n .priority(1)\n .protocol(\"Tcp\")\n .sourcePortRanges( \n \"80\",\n \"1024-65535\")\n .destinationPortRanges(\"80\")\n .sources(NetworkManagerAdminRuleSourceArgs.builder()\n .addressPrefixType(\"ServiceTag\")\n .addressPrefix(\"Internet\")\n .build())\n .destinations( \n NetworkManagerAdminRuleDestinationArgs.builder()\n .addressPrefixType(\"IPPrefix\")\n .addressPrefix(\"10.1.0.1\")\n .build(),\n NetworkManagerAdminRuleDestinationArgs.builder()\n .addressPrefixType(\"IPPrefix\")\n .addressPrefix(\"10.0.0.0/24\")\n .build())\n .description(\"example admin rule\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-network-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerSecurityAdminConfiguration:\n type: azure:network:NetworkManagerSecurityAdminConfiguration\n name: example\n properties:\n name: example-admin-conf\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerAdminRuleCollection:\n type: azure:network:NetworkManagerAdminRuleCollection\n name: example\n properties:\n name: example-admin-rule-collection\n securityAdminConfigurationId: ${exampleNetworkManagerSecurityAdminConfiguration.id}\n networkGroupIds:\n - ${exampleNetworkManagerNetworkGroup.id}\n exampleNetworkManagerAdminRule:\n type: azure:network:NetworkManagerAdminRule\n name: example\n properties:\n name: example-admin-rule\n adminRuleCollectionId: ${exampleNetworkManagerAdminRuleCollection.id}\n action: Deny\n direction: Outbound\n priority: 1\n protocol: Tcp\n sourcePortRanges:\n - '80'\n - 1024-65535\n destinationPortRanges:\n - '80'\n sources:\n - addressPrefixType: ServiceTag\n addressPrefix: Internet\n destinations:\n - addressPrefixType: IPPrefix\n addressPrefix: 10.1.0.1\n - addressPrefixType: IPPrefix\n addressPrefix: 10.0.0.0/24\n description: example admin rule\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Admin Rule can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerAdminRule:NetworkManagerAdminRule example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/securityAdminConfigurations/configuration1/ruleCollections/ruleCollection1/rules/rule1\n```\n\n", + "description": "Manages a Network Manager Admin Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-network-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerSecurityAdminConfiguration = new azure.network.NetworkManagerSecurityAdminConfiguration(\"example\", {\n name: \"example-admin-conf\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerAdminRuleCollection = new azure.network.NetworkManagerAdminRuleCollection(\"example\", {\n name: \"example-admin-rule-collection\",\n securityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.id,\n networkGroupIds: [exampleNetworkManagerNetworkGroup.id],\n});\nconst exampleNetworkManagerAdminRule = new azure.network.NetworkManagerAdminRule(\"example\", {\n name: \"example-admin-rule\",\n adminRuleCollectionId: exampleNetworkManagerAdminRuleCollection.id,\n action: \"Deny\",\n direction: \"Outbound\",\n priority: 1,\n protocol: \"Tcp\",\n sourcePortRanges: [\n \"80\",\n \"1024-65535\",\n ],\n destinationPortRanges: [\"80\"],\n sources: [{\n addressPrefixType: \"ServiceTag\",\n addressPrefix: \"Internet\",\n }],\n destinations: [\n {\n addressPrefixType: \"IPPrefix\",\n addressPrefix: \"10.1.0.1\",\n },\n {\n addressPrefixType: \"IPPrefix\",\n addressPrefix: \"10.0.0.0/24\",\n },\n ],\n description: \"example admin rule\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-network-group\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_security_admin_configuration = azure.network.NetworkManagerSecurityAdminConfiguration(\"example\",\n name=\"example-admin-conf\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_admin_rule_collection = azure.network.NetworkManagerAdminRuleCollection(\"example\",\n name=\"example-admin-rule-collection\",\n security_admin_configuration_id=example_network_manager_security_admin_configuration.id,\n network_group_ids=[example_network_manager_network_group.id])\nexample_network_manager_admin_rule = azure.network.NetworkManagerAdminRule(\"example\",\n name=\"example-admin-rule\",\n admin_rule_collection_id=example_network_manager_admin_rule_collection.id,\n action=\"Deny\",\n direction=\"Outbound\",\n priority=1,\n protocol=\"Tcp\",\n source_port_ranges=[\n \"80\",\n \"1024-65535\",\n ],\n destination_port_ranges=[\"80\"],\n sources=[{\n \"address_prefix_type\": \"ServiceTag\",\n \"address_prefix\": \"Internet\",\n }],\n destinations=[\n {\n \"address_prefix_type\": \"IPPrefix\",\n \"address_prefix\": \"10.1.0.1\",\n },\n {\n \"address_prefix_type\": \"IPPrefix\",\n \"address_prefix\": \"10.0.0.0/24\",\n },\n ],\n description=\"example admin rule\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-network-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerSecurityAdminConfiguration = new Azure.Network.NetworkManagerSecurityAdminConfiguration(\"example\", new()\n {\n Name = \"example-admin-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerAdminRuleCollection = new Azure.Network.NetworkManagerAdminRuleCollection(\"example\", new()\n {\n Name = \"example-admin-rule-collection\",\n SecurityAdminConfigurationId = exampleNetworkManagerSecurityAdminConfiguration.Id,\n NetworkGroupIds = new[]\n {\n exampleNetworkManagerNetworkGroup.Id,\n },\n });\n\n var exampleNetworkManagerAdminRule = new Azure.Network.NetworkManagerAdminRule(\"example\", new()\n {\n Name = \"example-admin-rule\",\n AdminRuleCollectionId = exampleNetworkManagerAdminRuleCollection.Id,\n Action = \"Deny\",\n Direction = \"Outbound\",\n Priority = 1,\n Protocol = \"Tcp\",\n SourcePortRanges = new[]\n {\n \"80\",\n \"1024-65535\",\n },\n DestinationPortRanges = new[]\n {\n \"80\",\n },\n Sources = new[]\n {\n new Azure.Network.Inputs.NetworkManagerAdminRuleSourceArgs\n {\n AddressPrefixType = \"ServiceTag\",\n AddressPrefix = \"Internet\",\n },\n },\n Destinations = new[]\n {\n new Azure.Network.Inputs.NetworkManagerAdminRuleDestinationArgs\n {\n AddressPrefixType = \"IPPrefix\",\n AddressPrefix = \"10.1.0.1\",\n },\n new Azure.Network.Inputs.NetworkManagerAdminRuleDestinationArgs\n {\n AddressPrefixType = \"IPPrefix\",\n AddressPrefix = \"10.0.0.0/24\",\n },\n },\n Description = \"example admin rule\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-network-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerSecurityAdminConfiguration, err := network.NewNetworkManagerSecurityAdminConfiguration(ctx, \"example\", \u0026network.NetworkManagerSecurityAdminConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-admin-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerAdminRuleCollection, err := network.NewNetworkManagerAdminRuleCollection(ctx, \"example\", \u0026network.NetworkManagerAdminRuleCollectionArgs{\n\t\t\tName: pulumi.String(\"example-admin-rule-collection\"),\n\t\t\tSecurityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.ID(),\n\t\t\tNetworkGroupIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerNetworkGroup.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerAdminRule(ctx, \"example\", \u0026network.NetworkManagerAdminRuleArgs{\n\t\t\tName: pulumi.String(\"example-admin-rule\"),\n\t\t\tAdminRuleCollectionId: exampleNetworkManagerAdminRuleCollection.ID(),\n\t\t\tAction: pulumi.String(\"Deny\"),\n\t\t\tDirection: pulumi.String(\"Outbound\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tProtocol: pulumi.String(\"Tcp\"),\n\t\t\tSourcePortRanges: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"80\"),\n\t\t\t\tpulumi.String(\"1024-65535\"),\n\t\t\t},\n\t\t\tDestinationPortRanges: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"80\"),\n\t\t\t},\n\t\t\tSources: network.NetworkManagerAdminRuleSourceArray{\n\t\t\t\t\u0026network.NetworkManagerAdminRuleSourceArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"ServiceTag\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"Internet\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tDestinations: network.NetworkManagerAdminRuleDestinationArray{\n\t\t\t\t\u0026network.NetworkManagerAdminRuleDestinationArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"IPPrefix\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"10.1.0.1\"),\n\t\t\t\t},\n\t\t\t\t\u0026network.NetworkManagerAdminRuleDestinationArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"IPPrefix\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"10.0.0.0/24\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example admin rule\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfiguration;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfigurationArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollection;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollectionArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRule;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerAdminRuleSourceArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerAdminRuleDestinationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-network-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerSecurityAdminConfiguration = new NetworkManagerSecurityAdminConfiguration(\"exampleNetworkManagerSecurityAdminConfiguration\", NetworkManagerSecurityAdminConfigurationArgs.builder()\n .name(\"example-admin-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerAdminRuleCollection = new NetworkManagerAdminRuleCollection(\"exampleNetworkManagerAdminRuleCollection\", NetworkManagerAdminRuleCollectionArgs.builder()\n .name(\"example-admin-rule-collection\")\n .securityAdminConfigurationId(exampleNetworkManagerSecurityAdminConfiguration.id())\n .networkGroupIds(exampleNetworkManagerNetworkGroup.id())\n .build());\n\n var exampleNetworkManagerAdminRule = new NetworkManagerAdminRule(\"exampleNetworkManagerAdminRule\", NetworkManagerAdminRuleArgs.builder()\n .name(\"example-admin-rule\")\n .adminRuleCollectionId(exampleNetworkManagerAdminRuleCollection.id())\n .action(\"Deny\")\n .direction(\"Outbound\")\n .priority(1)\n .protocol(\"Tcp\")\n .sourcePortRanges( \n \"80\",\n \"1024-65535\")\n .destinationPortRanges(\"80\")\n .sources(NetworkManagerAdminRuleSourceArgs.builder()\n .addressPrefixType(\"ServiceTag\")\n .addressPrefix(\"Internet\")\n .build())\n .destinations( \n NetworkManagerAdminRuleDestinationArgs.builder()\n .addressPrefixType(\"IPPrefix\")\n .addressPrefix(\"10.1.0.1\")\n .build(),\n NetworkManagerAdminRuleDestinationArgs.builder()\n .addressPrefixType(\"IPPrefix\")\n .addressPrefix(\"10.0.0.0/24\")\n .build())\n .description(\"example admin rule\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-network-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerSecurityAdminConfiguration:\n type: azure:network:NetworkManagerSecurityAdminConfiguration\n name: example\n properties:\n name: example-admin-conf\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerAdminRuleCollection:\n type: azure:network:NetworkManagerAdminRuleCollection\n name: example\n properties:\n name: example-admin-rule-collection\n securityAdminConfigurationId: ${exampleNetworkManagerSecurityAdminConfiguration.id}\n networkGroupIds:\n - ${exampleNetworkManagerNetworkGroup.id}\n exampleNetworkManagerAdminRule:\n type: azure:network:NetworkManagerAdminRule\n name: example\n properties:\n name: example-admin-rule\n adminRuleCollectionId: ${exampleNetworkManagerAdminRuleCollection.id}\n action: Deny\n direction: Outbound\n priority: 1\n protocol: Tcp\n sourcePortRanges:\n - '80'\n - 1024-65535\n destinationPortRanges:\n - '80'\n sources:\n - addressPrefixType: ServiceTag\n addressPrefix: Internet\n destinations:\n - addressPrefixType: IPPrefix\n addressPrefix: 10.1.0.1\n - addressPrefixType: IPPrefix\n addressPrefix: 10.0.0.0/24\n description: example admin rule\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Admin Rule can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerAdminRule:NetworkManagerAdminRule example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/securityAdminConfigurations/configuration1/ruleCollections/ruleCollection1/rules/rule1\n```\n\n", "properties": { "action": { "type": "string", @@ -222880,7 +222880,7 @@ } }, "azure:network/networkManagerAdminRuleCollection:NetworkManagerAdminRuleCollection": { - "description": "Manages a Network Manager Admin Rule Collection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-network-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerSecurityAdminConfiguration = new azure.network.NetworkManagerSecurityAdminConfiguration(\"example\", {\n name: \"example-admin-conf\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerAdminRuleCollection = new azure.network.NetworkManagerAdminRuleCollection(\"example\", {\n name: \"example-admin-rule-collection\",\n securityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.id,\n networkGroupIds: [exampleNetworkManagerNetworkGroup.id],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-network-group\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_security_admin_configuration = azure.network.NetworkManagerSecurityAdminConfiguration(\"example\",\n name=\"example-admin-conf\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_admin_rule_collection = azure.network.NetworkManagerAdminRuleCollection(\"example\",\n name=\"example-admin-rule-collection\",\n security_admin_configuration_id=example_network_manager_security_admin_configuration.id,\n network_group_ids=[example_network_manager_network_group.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-network-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerSecurityAdminConfiguration = new Azure.Network.NetworkManagerSecurityAdminConfiguration(\"example\", new()\n {\n Name = \"example-admin-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerAdminRuleCollection = new Azure.Network.NetworkManagerAdminRuleCollection(\"example\", new()\n {\n Name = \"example-admin-rule-collection\",\n SecurityAdminConfigurationId = exampleNetworkManagerSecurityAdminConfiguration.Id,\n NetworkGroupIds = new[]\n {\n exampleNetworkManagerNetworkGroup.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-network-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerSecurityAdminConfiguration, err := network.NewNetworkManagerSecurityAdminConfiguration(ctx, \"example\", \u0026network.NetworkManagerSecurityAdminConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-admin-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerAdminRuleCollection(ctx, \"example\", \u0026network.NetworkManagerAdminRuleCollectionArgs{\n\t\t\tName: pulumi.String(\"example-admin-rule-collection\"),\n\t\t\tSecurityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.ID(),\n\t\t\tNetworkGroupIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerNetworkGroup.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfiguration;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfigurationArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollection;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-network-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerSecurityAdminConfiguration = new NetworkManagerSecurityAdminConfiguration(\"exampleNetworkManagerSecurityAdminConfiguration\", NetworkManagerSecurityAdminConfigurationArgs.builder()\n .name(\"example-admin-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerAdminRuleCollection = new NetworkManagerAdminRuleCollection(\"exampleNetworkManagerAdminRuleCollection\", NetworkManagerAdminRuleCollectionArgs.builder()\n .name(\"example-admin-rule-collection\")\n .securityAdminConfigurationId(exampleNetworkManagerSecurityAdminConfiguration.id())\n .networkGroupIds(exampleNetworkManagerNetworkGroup.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-network-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerSecurityAdminConfiguration:\n type: azure:network:NetworkManagerSecurityAdminConfiguration\n name: example\n properties:\n name: example-admin-conf\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerAdminRuleCollection:\n type: azure:network:NetworkManagerAdminRuleCollection\n name: example\n properties:\n name: example-admin-rule-collection\n securityAdminConfigurationId: ${exampleNetworkManagerSecurityAdminConfiguration.id}\n networkGroupIds:\n - ${exampleNetworkManagerNetworkGroup.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Admin Rule Collection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerAdminRuleCollection:NetworkManagerAdminRuleCollection example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/securityAdminConfigurations/configuration1/ruleCollections/ruleCollection1\n```\n\n", + "description": "Manages a Network Manager Admin Rule Collection.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-network-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerSecurityAdminConfiguration = new azure.network.NetworkManagerSecurityAdminConfiguration(\"example\", {\n name: \"example-admin-conf\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerAdminRuleCollection = new azure.network.NetworkManagerAdminRuleCollection(\"example\", {\n name: \"example-admin-rule-collection\",\n securityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.id,\n networkGroupIds: [exampleNetworkManagerNetworkGroup.id],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-network-group\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_security_admin_configuration = azure.network.NetworkManagerSecurityAdminConfiguration(\"example\",\n name=\"example-admin-conf\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_admin_rule_collection = azure.network.NetworkManagerAdminRuleCollection(\"example\",\n name=\"example-admin-rule-collection\",\n security_admin_configuration_id=example_network_manager_security_admin_configuration.id,\n network_group_ids=[example_network_manager_network_group.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-network-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerSecurityAdminConfiguration = new Azure.Network.NetworkManagerSecurityAdminConfiguration(\"example\", new()\n {\n Name = \"example-admin-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerAdminRuleCollection = new Azure.Network.NetworkManagerAdminRuleCollection(\"example\", new()\n {\n Name = \"example-admin-rule-collection\",\n SecurityAdminConfigurationId = exampleNetworkManagerSecurityAdminConfiguration.Id,\n NetworkGroupIds = new[]\n {\n exampleNetworkManagerNetworkGroup.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-network-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerSecurityAdminConfiguration, err := network.NewNetworkManagerSecurityAdminConfiguration(ctx, \"example\", \u0026network.NetworkManagerSecurityAdminConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-admin-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerAdminRuleCollection(ctx, \"example\", \u0026network.NetworkManagerAdminRuleCollectionArgs{\n\t\t\tName: pulumi.String(\"example-admin-rule-collection\"),\n\t\t\tSecurityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.ID(),\n\t\t\tNetworkGroupIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerNetworkGroup.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfiguration;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfigurationArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollection;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-network-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerSecurityAdminConfiguration = new NetworkManagerSecurityAdminConfiguration(\"exampleNetworkManagerSecurityAdminConfiguration\", NetworkManagerSecurityAdminConfigurationArgs.builder()\n .name(\"example-admin-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerAdminRuleCollection = new NetworkManagerAdminRuleCollection(\"exampleNetworkManagerAdminRuleCollection\", NetworkManagerAdminRuleCollectionArgs.builder()\n .name(\"example-admin-rule-collection\")\n .securityAdminConfigurationId(exampleNetworkManagerSecurityAdminConfiguration.id())\n .networkGroupIds(exampleNetworkManagerNetworkGroup.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-network-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerSecurityAdminConfiguration:\n type: azure:network:NetworkManagerSecurityAdminConfiguration\n name: example\n properties:\n name: example-admin-conf\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerAdminRuleCollection:\n type: azure:network:NetworkManagerAdminRuleCollection\n name: example\n properties:\n name: example-admin-rule-collection\n securityAdminConfigurationId: ${exampleNetworkManagerSecurityAdminConfiguration.id}\n networkGroupIds:\n - ${exampleNetworkManagerNetworkGroup.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Admin Rule Collection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerAdminRuleCollection:NetworkManagerAdminRuleCollection example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/securityAdminConfigurations/configuration1/ruleCollections/ruleCollection1\n```\n\n", "properties": { "description": { "type": "string", @@ -222963,7 +222963,7 @@ } }, "azure:network/networkManagerConnectivityConfiguration:NetworkManagerConnectivityConfiguration": { - "description": "Manages a Network Manager Connectivity Configuration.\n\n\u003e **Note:** The `azure.network.NetworkManagerConnectivityConfiguration` deployment may modify or delete existing Network Peering resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-net\",\n location: example.location,\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n flowTimeoutInMinutes: 10,\n});\nconst example2 = new azure.network.NetworkManagerNetworkGroup(\"example2\", {\n name: \"example-group2\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerConnectivityConfiguration = new azure.network.NetworkManagerConnectivityConfiguration(\"example\", {\n name: \"example-connectivity-conf\",\n networkManagerId: exampleNetworkManager.id,\n connectivityTopology: \"HubAndSpoke\",\n appliesToGroups: [\n {\n groupConnectivity: \"DirectlyConnected\",\n networkGroupId: exampleNetworkManagerNetworkGroup.id,\n },\n {\n groupConnectivity: \"DirectlyConnected\",\n networkGroupId: example2.id,\n },\n ],\n hub: {\n resourceId: exampleVirtualNetwork.id,\n resourceType: \"Microsoft.Network/virtualNetworks\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-net\",\n location=example.location,\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n flow_timeout_in_minutes=10)\nexample2 = azure.network.NetworkManagerNetworkGroup(\"example2\",\n name=\"example-group2\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_connectivity_configuration = azure.network.NetworkManagerConnectivityConfiguration(\"example\",\n name=\"example-connectivity-conf\",\n network_manager_id=example_network_manager.id,\n connectivity_topology=\"HubAndSpoke\",\n applies_to_groups=[\n {\n \"group_connectivity\": \"DirectlyConnected\",\n \"network_group_id\": example_network_manager_network_group.id,\n },\n {\n \"group_connectivity\": \"DirectlyConnected\",\n \"network_group_id\": example2.id,\n },\n ],\n hub={\n \"resource_id\": example_virtual_network.id,\n \"resource_type\": \"Microsoft.Network/virtualNetworks\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-net\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n FlowTimeoutInMinutes = 10,\n });\n\n var example2 = new Azure.Network.NetworkManagerNetworkGroup(\"example2\", new()\n {\n Name = \"example-group2\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerConnectivityConfiguration = new Azure.Network.NetworkManagerConnectivityConfiguration(\"example\", new()\n {\n Name = \"example-connectivity-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n ConnectivityTopology = \"HubAndSpoke\",\n AppliesToGroups = new[]\n {\n new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs\n {\n GroupConnectivity = \"DirectlyConnected\",\n NetworkGroupId = exampleNetworkManagerNetworkGroup.Id,\n },\n new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs\n {\n GroupConnectivity = \"DirectlyConnected\",\n NetworkGroupId = example2.Id,\n },\n },\n Hub = new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationHubArgs\n {\n ResourceId = exampleVirtualNetwork.Id,\n ResourceType = \"Microsoft.Network/virtualNetworks\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-net\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tFlowTimeoutInMinutes: pulumi.Int(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample2, err := network.NewNetworkManagerNetworkGroup(ctx, \"example2\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group2\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerConnectivityConfiguration(ctx, \"example\", \u0026network.NetworkManagerConnectivityConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-connectivity-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tConnectivityTopology: pulumi.String(\"HubAndSpoke\"),\n\t\t\tAppliesToGroups: network.NetworkManagerConnectivityConfigurationAppliesToGroupArray{\n\t\t\t\t\u0026network.NetworkManagerConnectivityConfigurationAppliesToGroupArgs{\n\t\t\t\t\tGroupConnectivity: pulumi.String(\"DirectlyConnected\"),\n\t\t\t\t\tNetworkGroupId: exampleNetworkManagerNetworkGroup.ID(),\n\t\t\t\t},\n\t\t\t\t\u0026network.NetworkManagerConnectivityConfigurationAppliesToGroupArgs{\n\t\t\t\t\tGroupConnectivity: pulumi.String(\"DirectlyConnected\"),\n\t\t\t\t\tNetworkGroupId: example2.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tHub: \u0026network.NetworkManagerConnectivityConfigurationHubArgs{\n\t\t\t\tResourceId: exampleVirtualNetwork.ID(),\n\t\t\t\tResourceType: pulumi.String(\"Microsoft.Network/virtualNetworks\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.NetworkManagerConnectivityConfiguration;\nimport com.pulumi.azure.network.NetworkManagerConnectivityConfigurationArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerConnectivityConfigurationHubArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-net\")\n .location(example.location())\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .flowTimeoutInMinutes(10)\n .build());\n\n var example2 = new NetworkManagerNetworkGroup(\"example2\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group2\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerConnectivityConfiguration = new NetworkManagerConnectivityConfiguration(\"exampleNetworkManagerConnectivityConfiguration\", NetworkManagerConnectivityConfigurationArgs.builder()\n .name(\"example-connectivity-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .connectivityTopology(\"HubAndSpoke\")\n .appliesToGroups( \n NetworkManagerConnectivityConfigurationAppliesToGroupArgs.builder()\n .groupConnectivity(\"DirectlyConnected\")\n .networkGroupId(exampleNetworkManagerNetworkGroup.id())\n .build(),\n NetworkManagerConnectivityConfigurationAppliesToGroupArgs.builder()\n .groupConnectivity(\"DirectlyConnected\")\n .networkGroupId(example2.id())\n .build())\n .hub(NetworkManagerConnectivityConfigurationHubArgs.builder()\n .resourceId(exampleVirtualNetwork.id())\n .resourceType(\"Microsoft.Network/virtualNetworks\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-net\n location: ${example.location}\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n flowTimeoutInMinutes: 10\n example2:\n type: azure:network:NetworkManagerNetworkGroup\n properties:\n name: example-group2\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerConnectivityConfiguration:\n type: azure:network:NetworkManagerConnectivityConfiguration\n name: example\n properties:\n name: example-connectivity-conf\n networkManagerId: ${exampleNetworkManager.id}\n connectivityTopology: HubAndSpoke\n appliesToGroups:\n - groupConnectivity: DirectlyConnected\n networkGroupId: ${exampleNetworkManagerNetworkGroup.id}\n - groupConnectivity: DirectlyConnected\n networkGroupId: ${example2.id}\n hub:\n resourceId: ${exampleVirtualNetwork.id}\n resourceType: Microsoft.Network/virtualNetworks\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Connectivity Configuration can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerConnectivityConfiguration:NetworkManagerConnectivityConfiguration example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/connectivityConfigurations/configuration1\n```\n\n", + "description": "Manages a Network Manager Connectivity Configuration.\n\n\u003e **Note:** The `azure.network.NetworkManagerConnectivityConfiguration` deployment may modify or delete existing Network Peering resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-net\",\n location: example.location,\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n flowTimeoutInMinutes: 10,\n});\nconst example2 = new azure.network.NetworkManagerNetworkGroup(\"example2\", {\n name: \"example-group2\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerConnectivityConfiguration = new azure.network.NetworkManagerConnectivityConfiguration(\"example\", {\n name: \"example-connectivity-conf\",\n networkManagerId: exampleNetworkManager.id,\n connectivityTopology: \"HubAndSpoke\",\n appliesToGroups: [\n {\n groupConnectivity: \"DirectlyConnected\",\n networkGroupId: exampleNetworkManagerNetworkGroup.id,\n },\n {\n groupConnectivity: \"DirectlyConnected\",\n networkGroupId: example2.id,\n },\n ],\n hub: {\n resourceId: exampleVirtualNetwork.id,\n resourceType: \"Microsoft.Network/virtualNetworks\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-net\",\n location=example.location,\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n flow_timeout_in_minutes=10)\nexample2 = azure.network.NetworkManagerNetworkGroup(\"example2\",\n name=\"example-group2\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_connectivity_configuration = azure.network.NetworkManagerConnectivityConfiguration(\"example\",\n name=\"example-connectivity-conf\",\n network_manager_id=example_network_manager.id,\n connectivity_topology=\"HubAndSpoke\",\n applies_to_groups=[\n {\n \"group_connectivity\": \"DirectlyConnected\",\n \"network_group_id\": example_network_manager_network_group.id,\n },\n {\n \"group_connectivity\": \"DirectlyConnected\",\n \"network_group_id\": example2.id,\n },\n ],\n hub={\n \"resource_id\": example_virtual_network.id,\n \"resource_type\": \"Microsoft.Network/virtualNetworks\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-net\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n FlowTimeoutInMinutes = 10,\n });\n\n var example2 = new Azure.Network.NetworkManagerNetworkGroup(\"example2\", new()\n {\n Name = \"example-group2\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerConnectivityConfiguration = new Azure.Network.NetworkManagerConnectivityConfiguration(\"example\", new()\n {\n Name = \"example-connectivity-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n ConnectivityTopology = \"HubAndSpoke\",\n AppliesToGroups = new[]\n {\n new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs\n {\n GroupConnectivity = \"DirectlyConnected\",\n NetworkGroupId = exampleNetworkManagerNetworkGroup.Id,\n },\n new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs\n {\n GroupConnectivity = \"DirectlyConnected\",\n NetworkGroupId = example2.Id,\n },\n },\n Hub = new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationHubArgs\n {\n ResourceId = exampleVirtualNetwork.Id,\n ResourceType = \"Microsoft.Network/virtualNetworks\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-net\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tFlowTimeoutInMinutes: pulumi.Int(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample2, err := network.NewNetworkManagerNetworkGroup(ctx, \"example2\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group2\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerConnectivityConfiguration(ctx, \"example\", \u0026network.NetworkManagerConnectivityConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-connectivity-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tConnectivityTopology: pulumi.String(\"HubAndSpoke\"),\n\t\t\tAppliesToGroups: network.NetworkManagerConnectivityConfigurationAppliesToGroupArray{\n\t\t\t\t\u0026network.NetworkManagerConnectivityConfigurationAppliesToGroupArgs{\n\t\t\t\t\tGroupConnectivity: pulumi.String(\"DirectlyConnected\"),\n\t\t\t\t\tNetworkGroupId: exampleNetworkManagerNetworkGroup.ID(),\n\t\t\t\t},\n\t\t\t\t\u0026network.NetworkManagerConnectivityConfigurationAppliesToGroupArgs{\n\t\t\t\t\tGroupConnectivity: pulumi.String(\"DirectlyConnected\"),\n\t\t\t\t\tNetworkGroupId: example2.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tHub: \u0026network.NetworkManagerConnectivityConfigurationHubArgs{\n\t\t\t\tResourceId: exampleVirtualNetwork.ID(),\n\t\t\t\tResourceType: pulumi.String(\"Microsoft.Network/virtualNetworks\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.NetworkManagerConnectivityConfiguration;\nimport com.pulumi.azure.network.NetworkManagerConnectivityConfigurationArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerConnectivityConfigurationHubArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-net\")\n .location(example.location())\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .flowTimeoutInMinutes(10)\n .build());\n\n var example2 = new NetworkManagerNetworkGroup(\"example2\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group2\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerConnectivityConfiguration = new NetworkManagerConnectivityConfiguration(\"exampleNetworkManagerConnectivityConfiguration\", NetworkManagerConnectivityConfigurationArgs.builder()\n .name(\"example-connectivity-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .connectivityTopology(\"HubAndSpoke\")\n .appliesToGroups( \n NetworkManagerConnectivityConfigurationAppliesToGroupArgs.builder()\n .groupConnectivity(\"DirectlyConnected\")\n .networkGroupId(exampleNetworkManagerNetworkGroup.id())\n .build(),\n NetworkManagerConnectivityConfigurationAppliesToGroupArgs.builder()\n .groupConnectivity(\"DirectlyConnected\")\n .networkGroupId(example2.id())\n .build())\n .hub(NetworkManagerConnectivityConfigurationHubArgs.builder()\n .resourceId(exampleVirtualNetwork.id())\n .resourceType(\"Microsoft.Network/virtualNetworks\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-net\n location: ${example.location}\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n flowTimeoutInMinutes: 10\n example2:\n type: azure:network:NetworkManagerNetworkGroup\n properties:\n name: example-group2\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerConnectivityConfiguration:\n type: azure:network:NetworkManagerConnectivityConfiguration\n name: example\n properties:\n name: example-connectivity-conf\n networkManagerId: ${exampleNetworkManager.id}\n connectivityTopology: HubAndSpoke\n appliesToGroups:\n - groupConnectivity: DirectlyConnected\n networkGroupId: ${exampleNetworkManagerNetworkGroup.id}\n - groupConnectivity: DirectlyConnected\n networkGroupId: ${example2.id}\n hub:\n resourceId: ${exampleVirtualNetwork.id}\n resourceType: Microsoft.Network/virtualNetworks\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Connectivity Configuration can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerConnectivityConfiguration:NetworkManagerConnectivityConfiguration example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/connectivityConfigurations/configuration1\n```\n\n", "properties": { "appliesToGroups": { "type": "array", @@ -223096,7 +223096,7 @@ } }, "azure:network/networkManagerDeployment:NetworkManagerDeployment": { - "description": "Manages a Network Manager Deployment.\n\n\u003e **NOTE on Virtual Network Peering:** Using Network Manager Deployment to deploy Connectivity Configuration may modify or delete existing Virtual Network Peering. At this time you should not use Network Peering resource in conjunction with Network Manager Deployment. Doing so may cause a conflict of Peering configurations.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-net\",\n location: example.location,\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n flowTimeoutInMinutes: 10,\n});\nconst exampleNetworkManagerConnectivityConfiguration = new azure.network.NetworkManagerConnectivityConfiguration(\"example\", {\n name: \"example-connectivity-conf\",\n networkManagerId: exampleNetworkManager.id,\n connectivityTopology: \"HubAndSpoke\",\n appliesToGroups: [{\n groupConnectivity: \"None\",\n networkGroupId: exampleNetworkManagerNetworkGroup.id,\n }],\n hub: {\n resourceId: exampleVirtualNetwork.id,\n resourceType: \"Microsoft.Network/virtualNetworks\",\n },\n});\nconst exampleNetworkManagerDeployment = new azure.network.NetworkManagerDeployment(\"example\", {\n networkManagerId: exampleNetworkManager.id,\n location: \"eastus\",\n scopeAccess: \"Connectivity\",\n configurationIds: [exampleNetworkManagerConnectivityConfiguration.id],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-net\",\n location=example.location,\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n flow_timeout_in_minutes=10)\nexample_network_manager_connectivity_configuration = azure.network.NetworkManagerConnectivityConfiguration(\"example\",\n name=\"example-connectivity-conf\",\n network_manager_id=example_network_manager.id,\n connectivity_topology=\"HubAndSpoke\",\n applies_to_groups=[{\n \"group_connectivity\": \"None\",\n \"network_group_id\": example_network_manager_network_group.id,\n }],\n hub={\n \"resource_id\": example_virtual_network.id,\n \"resource_type\": \"Microsoft.Network/virtualNetworks\",\n })\nexample_network_manager_deployment = azure.network.NetworkManagerDeployment(\"example\",\n network_manager_id=example_network_manager.id,\n location=\"eastus\",\n scope_access=\"Connectivity\",\n configuration_ids=[example_network_manager_connectivity_configuration.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-net\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n FlowTimeoutInMinutes = 10,\n });\n\n var exampleNetworkManagerConnectivityConfiguration = new Azure.Network.NetworkManagerConnectivityConfiguration(\"example\", new()\n {\n Name = \"example-connectivity-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n ConnectivityTopology = \"HubAndSpoke\",\n AppliesToGroups = new[]\n {\n new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs\n {\n GroupConnectivity = \"None\",\n NetworkGroupId = exampleNetworkManagerNetworkGroup.Id,\n },\n },\n Hub = new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationHubArgs\n {\n ResourceId = exampleVirtualNetwork.Id,\n ResourceType = \"Microsoft.Network/virtualNetworks\",\n },\n });\n\n var exampleNetworkManagerDeployment = new Azure.Network.NetworkManagerDeployment(\"example\", new()\n {\n NetworkManagerId = exampleNetworkManager.Id,\n Location = \"eastus\",\n ScopeAccess = \"Connectivity\",\n ConfigurationIds = new[]\n {\n exampleNetworkManagerConnectivityConfiguration.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-net\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tFlowTimeoutInMinutes: pulumi.Int(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerConnectivityConfiguration, err := network.NewNetworkManagerConnectivityConfiguration(ctx, \"example\", \u0026network.NetworkManagerConnectivityConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-connectivity-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tConnectivityTopology: pulumi.String(\"HubAndSpoke\"),\n\t\t\tAppliesToGroups: network.NetworkManagerConnectivityConfigurationAppliesToGroupArray{\n\t\t\t\t\u0026network.NetworkManagerConnectivityConfigurationAppliesToGroupArgs{\n\t\t\t\t\tGroupConnectivity: pulumi.String(\"None\"),\n\t\t\t\t\tNetworkGroupId: exampleNetworkManagerNetworkGroup.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tHub: \u0026network.NetworkManagerConnectivityConfigurationHubArgs{\n\t\t\t\tResourceId: exampleVirtualNetwork.ID(),\n\t\t\t\tResourceType: pulumi.String(\"Microsoft.Network/virtualNetworks\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerDeployment(ctx, \"example\", \u0026network.NetworkManagerDeploymentArgs{\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tLocation: pulumi.String(\"eastus\"),\n\t\t\tScopeAccess: pulumi.String(\"Connectivity\"),\n\t\t\tConfigurationIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerConnectivityConfiguration.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.NetworkManagerConnectivityConfiguration;\nimport com.pulumi.azure.network.NetworkManagerConnectivityConfigurationArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerConnectivityConfigurationHubArgs;\nimport com.pulumi.azure.network.NetworkManagerDeployment;\nimport com.pulumi.azure.network.NetworkManagerDeploymentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-net\")\n .location(example.location())\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .flowTimeoutInMinutes(10)\n .build());\n\n var exampleNetworkManagerConnectivityConfiguration = new NetworkManagerConnectivityConfiguration(\"exampleNetworkManagerConnectivityConfiguration\", NetworkManagerConnectivityConfigurationArgs.builder()\n .name(\"example-connectivity-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .connectivityTopology(\"HubAndSpoke\")\n .appliesToGroups(NetworkManagerConnectivityConfigurationAppliesToGroupArgs.builder()\n .groupConnectivity(\"None\")\n .networkGroupId(exampleNetworkManagerNetworkGroup.id())\n .build())\n .hub(NetworkManagerConnectivityConfigurationHubArgs.builder()\n .resourceId(exampleVirtualNetwork.id())\n .resourceType(\"Microsoft.Network/virtualNetworks\")\n .build())\n .build());\n\n var exampleNetworkManagerDeployment = new NetworkManagerDeployment(\"exampleNetworkManagerDeployment\", NetworkManagerDeploymentArgs.builder()\n .networkManagerId(exampleNetworkManager.id())\n .location(\"eastus\")\n .scopeAccess(\"Connectivity\")\n .configurationIds(exampleNetworkManagerConnectivityConfiguration.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-net\n location: ${example.location}\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n flowTimeoutInMinutes: 10\n exampleNetworkManagerConnectivityConfiguration:\n type: azure:network:NetworkManagerConnectivityConfiguration\n name: example\n properties:\n name: example-connectivity-conf\n networkManagerId: ${exampleNetworkManager.id}\n connectivityTopology: HubAndSpoke\n appliesToGroups:\n - groupConnectivity: None\n networkGroupId: ${exampleNetworkManagerNetworkGroup.id}\n hub:\n resourceId: ${exampleVirtualNetwork.id}\n resourceType: Microsoft.Network/virtualNetworks\n exampleNetworkManagerDeployment:\n type: azure:network:NetworkManagerDeployment\n name: example\n properties:\n networkManagerId: ${exampleNetworkManager.id}\n location: eastus\n scopeAccess: Connectivity\n configurationIds:\n - ${exampleNetworkManagerConnectivityConfiguration.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Triggers)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-net\",\n location: example.location,\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n flowTimeoutInMinutes: 10,\n});\nconst exampleNetworkManagerSecurityAdminConfiguration = new azure.network.NetworkManagerSecurityAdminConfiguration(\"example\", {\n name: \"example-nmsac\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerAdminRuleCollection = new azure.network.NetworkManagerAdminRuleCollection(\"example\", {\n name: \"example-nmarc\",\n securityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.id,\n networkGroupIds: [exampleNetworkManagerNetworkGroup.id],\n});\nconst exampleNetworkManagerAdminRule = new azure.network.NetworkManagerAdminRule(\"example\", {\n name: \"example-nmar\",\n adminRuleCollectionId: exampleNetworkManagerAdminRuleCollection.id,\n action: \"Deny\",\n description: \"example\",\n direction: \"Inbound\",\n priority: 1,\n protocol: \"Tcp\",\n sourcePortRanges: [\"80\"],\n destinationPortRanges: [\"80\"],\n sources: [{\n addressPrefixType: \"ServiceTag\",\n addressPrefix: \"Internet\",\n }],\n destinations: [{\n addressPrefixType: \"IPPrefix\",\n addressPrefix: \"*\",\n }],\n});\nconst exampleNetworkManagerDeployment = new azure.network.NetworkManagerDeployment(\"example\", {\n networkManagerId: exampleNetworkManager.id,\n location: \"eastus\",\n scopeAccess: \"SecurityAdmin\",\n configurationIds: [exampleNetworkManagerSecurityAdminConfiguration.id],\n triggers: {\n source_port_ranges: exampleNetworkManagerAdminRule.sourcePortRanges.apply(sourcePortRanges =\u003e std.joinOutput({\n separator: \",\",\n input: sourcePortRanges,\n })).apply(invoke =\u003e invoke.result),\n },\n}, {\n dependsOn: [exampleNetworkManagerAdminRule],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-net\",\n location=example.location,\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n flow_timeout_in_minutes=10)\nexample_network_manager_security_admin_configuration = azure.network.NetworkManagerSecurityAdminConfiguration(\"example\",\n name=\"example-nmsac\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_admin_rule_collection = azure.network.NetworkManagerAdminRuleCollection(\"example\",\n name=\"example-nmarc\",\n security_admin_configuration_id=example_network_manager_security_admin_configuration.id,\n network_group_ids=[example_network_manager_network_group.id])\nexample_network_manager_admin_rule = azure.network.NetworkManagerAdminRule(\"example\",\n name=\"example-nmar\",\n admin_rule_collection_id=example_network_manager_admin_rule_collection.id,\n action=\"Deny\",\n description=\"example\",\n direction=\"Inbound\",\n priority=1,\n protocol=\"Tcp\",\n source_port_ranges=[\"80\"],\n destination_port_ranges=[\"80\"],\n sources=[{\n \"address_prefix_type\": \"ServiceTag\",\n \"address_prefix\": \"Internet\",\n }],\n destinations=[{\n \"address_prefix_type\": \"IPPrefix\",\n \"address_prefix\": \"*\",\n }])\nexample_network_manager_deployment = azure.network.NetworkManagerDeployment(\"example\",\n network_manager_id=example_network_manager.id,\n location=\"eastus\",\n scope_access=\"SecurityAdmin\",\n configuration_ids=[example_network_manager_security_admin_configuration.id],\n triggers={\n \"source_port_ranges\": example_network_manager_admin_rule.source_port_ranges.apply(lambda source_port_ranges: std.join_output(separator=\",\",\n input=source_port_ranges)).apply(lambda invoke: invoke.result),\n },\n opts = pulumi.ResourceOptions(depends_on=[example_network_manager_admin_rule]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-net\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n FlowTimeoutInMinutes = 10,\n });\n\n var exampleNetworkManagerSecurityAdminConfiguration = new Azure.Network.NetworkManagerSecurityAdminConfiguration(\"example\", new()\n {\n Name = \"example-nmsac\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerAdminRuleCollection = new Azure.Network.NetworkManagerAdminRuleCollection(\"example\", new()\n {\n Name = \"example-nmarc\",\n SecurityAdminConfigurationId = exampleNetworkManagerSecurityAdminConfiguration.Id,\n NetworkGroupIds = new[]\n {\n exampleNetworkManagerNetworkGroup.Id,\n },\n });\n\n var exampleNetworkManagerAdminRule = new Azure.Network.NetworkManagerAdminRule(\"example\", new()\n {\n Name = \"example-nmar\",\n AdminRuleCollectionId = exampleNetworkManagerAdminRuleCollection.Id,\n Action = \"Deny\",\n Description = \"example\",\n Direction = \"Inbound\",\n Priority = 1,\n Protocol = \"Tcp\",\n SourcePortRanges = new[]\n {\n \"80\",\n },\n DestinationPortRanges = new[]\n {\n \"80\",\n },\n Sources = new[]\n {\n new Azure.Network.Inputs.NetworkManagerAdminRuleSourceArgs\n {\n AddressPrefixType = \"ServiceTag\",\n AddressPrefix = \"Internet\",\n },\n },\n Destinations = new[]\n {\n new Azure.Network.Inputs.NetworkManagerAdminRuleDestinationArgs\n {\n AddressPrefixType = \"IPPrefix\",\n AddressPrefix = \"*\",\n },\n },\n });\n\n var exampleNetworkManagerDeployment = new Azure.Network.NetworkManagerDeployment(\"example\", new()\n {\n NetworkManagerId = exampleNetworkManager.Id,\n Location = \"eastus\",\n ScopeAccess = \"SecurityAdmin\",\n ConfigurationIds = new[]\n {\n exampleNetworkManagerSecurityAdminConfiguration.Id,\n },\n Triggers = \n {\n { \"source_port_ranges\", exampleNetworkManagerAdminRule.SourcePortRanges.Apply(sourcePortRanges =\u003e Std.Join.Invoke(new()\n {\n Separator = \",\",\n Input = sourcePortRanges,\n })).Apply(invoke =\u003e invoke.Result) },\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleNetworkManagerAdminRule,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-net\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tFlowTimeoutInMinutes: pulumi.Int(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerSecurityAdminConfiguration, err := network.NewNetworkManagerSecurityAdminConfiguration(ctx, \"example\", \u0026network.NetworkManagerSecurityAdminConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-nmsac\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerAdminRuleCollection, err := network.NewNetworkManagerAdminRuleCollection(ctx, \"example\", \u0026network.NetworkManagerAdminRuleCollectionArgs{\n\t\t\tName: pulumi.String(\"example-nmarc\"),\n\t\t\tSecurityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.ID(),\n\t\t\tNetworkGroupIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerNetworkGroup.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerAdminRule, err := network.NewNetworkManagerAdminRule(ctx, \"example\", \u0026network.NetworkManagerAdminRuleArgs{\n\t\t\tName: pulumi.String(\"example-nmar\"),\n\t\t\tAdminRuleCollectionId: exampleNetworkManagerAdminRuleCollection.ID(),\n\t\t\tAction: pulumi.String(\"Deny\"),\n\t\t\tDescription: pulumi.String(\"example\"),\n\t\t\tDirection: pulumi.String(\"Inbound\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tProtocol: pulumi.String(\"Tcp\"),\n\t\t\tSourcePortRanges: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"80\"),\n\t\t\t},\n\t\t\tDestinationPortRanges: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"80\"),\n\t\t\t},\n\t\t\tSources: network.NetworkManagerAdminRuleSourceArray{\n\t\t\t\t\u0026network.NetworkManagerAdminRuleSourceArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"ServiceTag\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"Internet\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tDestinations: network.NetworkManagerAdminRuleDestinationArray{\n\t\t\t\t\u0026network.NetworkManagerAdminRuleDestinationArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"IPPrefix\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"*\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerDeployment(ctx, \"example\", \u0026network.NetworkManagerDeploymentArgs{\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tLocation: pulumi.String(\"eastus\"),\n\t\t\tScopeAccess: pulumi.String(\"SecurityAdmin\"),\n\t\t\tConfigurationIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerSecurityAdminConfiguration.ID(),\n\t\t\t},\n\t\t\tTriggers: pulumi.StringMap{\n\t\t\t\t\"source_port_ranges\": pulumi.String(exampleNetworkManagerAdminRule.SourcePortRanges.ApplyT(func(sourcePortRanges interface{}) (std.JoinResult, error) {\n\t\t\t\t\treturn std.JoinResult(interface{}(std.JoinOutput(ctx, std.JoinOutputArgs{\n\t\t\t\t\t\tSeparator: \",\",\n\t\t\t\t\t\tInput: sourcePortRanges,\n\t\t\t\t\t}, nil))), nil\n\t\t\t\t}).(std.JoinResultOutput).ApplyT(func(invoke std.JoinResult) (*string, error) {\n\t\t\t\t\treturn invoke.Result, nil\n\t\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleNetworkManagerAdminRule,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfiguration;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfigurationArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollection;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollectionArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRule;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerAdminRuleSourceArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerAdminRuleDestinationArgs;\nimport com.pulumi.azure.network.NetworkManagerDeployment;\nimport com.pulumi.azure.network.NetworkManagerDeploymentArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-net\")\n .location(example.location())\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .flowTimeoutInMinutes(10)\n .build());\n\n var exampleNetworkManagerSecurityAdminConfiguration = new NetworkManagerSecurityAdminConfiguration(\"exampleNetworkManagerSecurityAdminConfiguration\", NetworkManagerSecurityAdminConfigurationArgs.builder()\n .name(\"example-nmsac\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerAdminRuleCollection = new NetworkManagerAdminRuleCollection(\"exampleNetworkManagerAdminRuleCollection\", NetworkManagerAdminRuleCollectionArgs.builder()\n .name(\"example-nmarc\")\n .securityAdminConfigurationId(exampleNetworkManagerSecurityAdminConfiguration.id())\n .networkGroupIds(exampleNetworkManagerNetworkGroup.id())\n .build());\n\n var exampleNetworkManagerAdminRule = new NetworkManagerAdminRule(\"exampleNetworkManagerAdminRule\", NetworkManagerAdminRuleArgs.builder()\n .name(\"example-nmar\")\n .adminRuleCollectionId(exampleNetworkManagerAdminRuleCollection.id())\n .action(\"Deny\")\n .description(\"example\")\n .direction(\"Inbound\")\n .priority(1)\n .protocol(\"Tcp\")\n .sourcePortRanges(\"80\")\n .destinationPortRanges(\"80\")\n .sources(NetworkManagerAdminRuleSourceArgs.builder()\n .addressPrefixType(\"ServiceTag\")\n .addressPrefix(\"Internet\")\n .build())\n .destinations(NetworkManagerAdminRuleDestinationArgs.builder()\n .addressPrefixType(\"IPPrefix\")\n .addressPrefix(\"*\")\n .build())\n .build());\n\n var exampleNetworkManagerDeployment = new NetworkManagerDeployment(\"exampleNetworkManagerDeployment\", NetworkManagerDeploymentArgs.builder()\n .networkManagerId(exampleNetworkManager.id())\n .location(\"eastus\")\n .scopeAccess(\"SecurityAdmin\")\n .configurationIds(exampleNetworkManagerSecurityAdminConfiguration.id())\n .triggers(Map.of(\"source_port_ranges\", exampleNetworkManagerAdminRule.sourcePortRanges().applyValue(sourcePortRanges -\u003e StdFunctions.join()).applyValue(invoke -\u003e invoke.result())))\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleNetworkManagerAdminRule)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-net\n location: ${example.location}\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n flowTimeoutInMinutes: 10\n exampleNetworkManagerSecurityAdminConfiguration:\n type: azure:network:NetworkManagerSecurityAdminConfiguration\n name: example\n properties:\n name: example-nmsac\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerAdminRuleCollection:\n type: azure:network:NetworkManagerAdminRuleCollection\n name: example\n properties:\n name: example-nmarc\n securityAdminConfigurationId: ${exampleNetworkManagerSecurityAdminConfiguration.id}\n networkGroupIds:\n - ${exampleNetworkManagerNetworkGroup.id}\n exampleNetworkManagerAdminRule:\n type: azure:network:NetworkManagerAdminRule\n name: example\n properties:\n name: example-nmar\n adminRuleCollectionId: ${exampleNetworkManagerAdminRuleCollection.id}\n action: Deny\n description: example\n direction: Inbound\n priority: 1\n protocol: Tcp\n sourcePortRanges:\n - '80'\n destinationPortRanges:\n - '80'\n sources:\n - addressPrefixType: ServiceTag\n addressPrefix: Internet\n destinations:\n - addressPrefixType: IPPrefix\n addressPrefix: '*'\n exampleNetworkManagerDeployment:\n type: azure:network:NetworkManagerDeployment\n name: example\n properties:\n networkManagerId: ${exampleNetworkManager.id}\n location: eastus\n scopeAccess: SecurityAdmin\n configurationIds:\n - ${exampleNetworkManagerSecurityAdminConfiguration.id}\n triggers:\n source_port_ranges:\n fn::invoke:\n Function: std:join\n Arguments:\n separator: ','\n input: ${exampleNetworkManagerAdminRule.sourcePortRanges}\n Return: result\n options:\n dependson:\n - ${exampleNetworkManagerAdminRule}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Deployment can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerDeployment:NetworkManagerDeployment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/commit|eastus|Connectivity\n```\n\n", + "description": "Manages a Network Manager Deployment.\n\n\u003e **NOTE on Virtual Network Peering:** Using Network Manager Deployment to deploy Connectivity Configuration may modify or delete existing Virtual Network Peering. At this time you should not use Network Peering resource in conjunction with Network Manager Deployment. Doing so may cause a conflict of Peering configurations.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-net\",\n location: example.location,\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n flowTimeoutInMinutes: 10,\n});\nconst exampleNetworkManagerConnectivityConfiguration = new azure.network.NetworkManagerConnectivityConfiguration(\"example\", {\n name: \"example-connectivity-conf\",\n networkManagerId: exampleNetworkManager.id,\n connectivityTopology: \"HubAndSpoke\",\n appliesToGroups: [{\n groupConnectivity: \"None\",\n networkGroupId: exampleNetworkManagerNetworkGroup.id,\n }],\n hub: {\n resourceId: exampleVirtualNetwork.id,\n resourceType: \"Microsoft.Network/virtualNetworks\",\n },\n});\nconst exampleNetworkManagerDeployment = new azure.network.NetworkManagerDeployment(\"example\", {\n networkManagerId: exampleNetworkManager.id,\n location: \"eastus\",\n scopeAccess: \"Connectivity\",\n configurationIds: [exampleNetworkManagerConnectivityConfiguration.id],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-net\",\n location=example.location,\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n flow_timeout_in_minutes=10)\nexample_network_manager_connectivity_configuration = azure.network.NetworkManagerConnectivityConfiguration(\"example\",\n name=\"example-connectivity-conf\",\n network_manager_id=example_network_manager.id,\n connectivity_topology=\"HubAndSpoke\",\n applies_to_groups=[{\n \"group_connectivity\": \"None\",\n \"network_group_id\": example_network_manager_network_group.id,\n }],\n hub={\n \"resource_id\": example_virtual_network.id,\n \"resource_type\": \"Microsoft.Network/virtualNetworks\",\n })\nexample_network_manager_deployment = azure.network.NetworkManagerDeployment(\"example\",\n network_manager_id=example_network_manager.id,\n location=\"eastus\",\n scope_access=\"Connectivity\",\n configuration_ids=[example_network_manager_connectivity_configuration.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-net\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n FlowTimeoutInMinutes = 10,\n });\n\n var exampleNetworkManagerConnectivityConfiguration = new Azure.Network.NetworkManagerConnectivityConfiguration(\"example\", new()\n {\n Name = \"example-connectivity-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n ConnectivityTopology = \"HubAndSpoke\",\n AppliesToGroups = new[]\n {\n new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs\n {\n GroupConnectivity = \"None\",\n NetworkGroupId = exampleNetworkManagerNetworkGroup.Id,\n },\n },\n Hub = new Azure.Network.Inputs.NetworkManagerConnectivityConfigurationHubArgs\n {\n ResourceId = exampleVirtualNetwork.Id,\n ResourceType = \"Microsoft.Network/virtualNetworks\",\n },\n });\n\n var exampleNetworkManagerDeployment = new Azure.Network.NetworkManagerDeployment(\"example\", new()\n {\n NetworkManagerId = exampleNetworkManager.Id,\n Location = \"eastus\",\n ScopeAccess = \"Connectivity\",\n ConfigurationIds = new[]\n {\n exampleNetworkManagerConnectivityConfiguration.Id,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-net\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tFlowTimeoutInMinutes: pulumi.Int(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerConnectivityConfiguration, err := network.NewNetworkManagerConnectivityConfiguration(ctx, \"example\", \u0026network.NetworkManagerConnectivityConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-connectivity-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tConnectivityTopology: pulumi.String(\"HubAndSpoke\"),\n\t\t\tAppliesToGroups: network.NetworkManagerConnectivityConfigurationAppliesToGroupArray{\n\t\t\t\t\u0026network.NetworkManagerConnectivityConfigurationAppliesToGroupArgs{\n\t\t\t\t\tGroupConnectivity: pulumi.String(\"None\"),\n\t\t\t\t\tNetworkGroupId: exampleNetworkManagerNetworkGroup.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tHub: \u0026network.NetworkManagerConnectivityConfigurationHubArgs{\n\t\t\t\tResourceId: exampleVirtualNetwork.ID(),\n\t\t\t\tResourceType: pulumi.String(\"Microsoft.Network/virtualNetworks\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerDeployment(ctx, \"example\", \u0026network.NetworkManagerDeploymentArgs{\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tLocation: pulumi.String(\"eastus\"),\n\t\t\tScopeAccess: pulumi.String(\"Connectivity\"),\n\t\t\tConfigurationIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerConnectivityConfiguration.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.NetworkManagerConnectivityConfiguration;\nimport com.pulumi.azure.network.NetworkManagerConnectivityConfigurationArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerConnectivityConfigurationAppliesToGroupArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerConnectivityConfigurationHubArgs;\nimport com.pulumi.azure.network.NetworkManagerDeployment;\nimport com.pulumi.azure.network.NetworkManagerDeploymentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-net\")\n .location(example.location())\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .flowTimeoutInMinutes(10)\n .build());\n\n var exampleNetworkManagerConnectivityConfiguration = new NetworkManagerConnectivityConfiguration(\"exampleNetworkManagerConnectivityConfiguration\", NetworkManagerConnectivityConfigurationArgs.builder()\n .name(\"example-connectivity-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .connectivityTopology(\"HubAndSpoke\")\n .appliesToGroups(NetworkManagerConnectivityConfigurationAppliesToGroupArgs.builder()\n .groupConnectivity(\"None\")\n .networkGroupId(exampleNetworkManagerNetworkGroup.id())\n .build())\n .hub(NetworkManagerConnectivityConfigurationHubArgs.builder()\n .resourceId(exampleVirtualNetwork.id())\n .resourceType(\"Microsoft.Network/virtualNetworks\")\n .build())\n .build());\n\n var exampleNetworkManagerDeployment = new NetworkManagerDeployment(\"exampleNetworkManagerDeployment\", NetworkManagerDeploymentArgs.builder()\n .networkManagerId(exampleNetworkManager.id())\n .location(\"eastus\")\n .scopeAccess(\"Connectivity\")\n .configurationIds(exampleNetworkManagerConnectivityConfiguration.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-net\n location: ${example.location}\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n flowTimeoutInMinutes: 10\n exampleNetworkManagerConnectivityConfiguration:\n type: azure:network:NetworkManagerConnectivityConfiguration\n name: example\n properties:\n name: example-connectivity-conf\n networkManagerId: ${exampleNetworkManager.id}\n connectivityTopology: HubAndSpoke\n appliesToGroups:\n - groupConnectivity: None\n networkGroupId: ${exampleNetworkManagerNetworkGroup.id}\n hub:\n resourceId: ${exampleVirtualNetwork.id}\n resourceType: Microsoft.Network/virtualNetworks\n exampleNetworkManagerDeployment:\n type: azure:network:NetworkManagerDeployment\n name: example\n properties:\n networkManagerId: ${exampleNetworkManager.id}\n location: eastus\n scopeAccess: Connectivity\n configurationIds:\n - ${exampleNetworkManagerConnectivityConfiguration.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Triggers)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-net\",\n location: example.location,\n resourceGroupName: example.name,\n addressSpaces: [\"10.0.0.0/16\"],\n flowTimeoutInMinutes: 10,\n});\nconst exampleNetworkManagerSecurityAdminConfiguration = new azure.network.NetworkManagerSecurityAdminConfiguration(\"example\", {\n name: \"example-nmsac\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerAdminRuleCollection = new azure.network.NetworkManagerAdminRuleCollection(\"example\", {\n name: \"example-nmarc\",\n securityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.id,\n networkGroupIds: [exampleNetworkManagerNetworkGroup.id],\n});\nconst exampleNetworkManagerAdminRule = new azure.network.NetworkManagerAdminRule(\"example\", {\n name: \"example-nmar\",\n adminRuleCollectionId: exampleNetworkManagerAdminRuleCollection.id,\n action: \"Deny\",\n description: \"example\",\n direction: \"Inbound\",\n priority: 1,\n protocol: \"Tcp\",\n sourcePortRanges: [\"80\"],\n destinationPortRanges: [\"80\"],\n sources: [{\n addressPrefixType: \"ServiceTag\",\n addressPrefix: \"Internet\",\n }],\n destinations: [{\n addressPrefixType: \"IPPrefix\",\n addressPrefix: \"*\",\n }],\n});\nconst exampleNetworkManagerDeployment = new azure.network.NetworkManagerDeployment(\"example\", {\n networkManagerId: exampleNetworkManager.id,\n location: \"eastus\",\n scopeAccess: \"SecurityAdmin\",\n configurationIds: [exampleNetworkManagerSecurityAdminConfiguration.id],\n triggers: {\n source_port_ranges: exampleNetworkManagerAdminRule.sourcePortRanges.apply(sourcePortRanges =\u003e std.joinOutput({\n separator: \",\",\n input: sourcePortRanges,\n })).apply(invoke =\u003e invoke.result),\n },\n}, {\n dependsOn: [exampleNetworkManagerAdminRule],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-net\",\n location=example.location,\n resource_group_name=example.name,\n address_spaces=[\"10.0.0.0/16\"],\n flow_timeout_in_minutes=10)\nexample_network_manager_security_admin_configuration = azure.network.NetworkManagerSecurityAdminConfiguration(\"example\",\n name=\"example-nmsac\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_admin_rule_collection = azure.network.NetworkManagerAdminRuleCollection(\"example\",\n name=\"example-nmarc\",\n security_admin_configuration_id=example_network_manager_security_admin_configuration.id,\n network_group_ids=[example_network_manager_network_group.id])\nexample_network_manager_admin_rule = azure.network.NetworkManagerAdminRule(\"example\",\n name=\"example-nmar\",\n admin_rule_collection_id=example_network_manager_admin_rule_collection.id,\n action=\"Deny\",\n description=\"example\",\n direction=\"Inbound\",\n priority=1,\n protocol=\"Tcp\",\n source_port_ranges=[\"80\"],\n destination_port_ranges=[\"80\"],\n sources=[{\n \"address_prefix_type\": \"ServiceTag\",\n \"address_prefix\": \"Internet\",\n }],\n destinations=[{\n \"address_prefix_type\": \"IPPrefix\",\n \"address_prefix\": \"*\",\n }])\nexample_network_manager_deployment = azure.network.NetworkManagerDeployment(\"example\",\n network_manager_id=example_network_manager.id,\n location=\"eastus\",\n scope_access=\"SecurityAdmin\",\n configuration_ids=[example_network_manager_security_admin_configuration.id],\n triggers={\n \"source_port_ranges\": example_network_manager_admin_rule.source_port_ranges.apply(lambda source_port_ranges: std.join_output(separator=\",\",\n input=source_port_ranges)).apply(lambda invoke: invoke.result),\n },\n opts = pulumi.ResourceOptions(depends_on=[example_network_manager_admin_rule]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-net\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n FlowTimeoutInMinutes = 10,\n });\n\n var exampleNetworkManagerSecurityAdminConfiguration = new Azure.Network.NetworkManagerSecurityAdminConfiguration(\"example\", new()\n {\n Name = \"example-nmsac\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerAdminRuleCollection = new Azure.Network.NetworkManagerAdminRuleCollection(\"example\", new()\n {\n Name = \"example-nmarc\",\n SecurityAdminConfigurationId = exampleNetworkManagerSecurityAdminConfiguration.Id,\n NetworkGroupIds = new[]\n {\n exampleNetworkManagerNetworkGroup.Id,\n },\n });\n\n var exampleNetworkManagerAdminRule = new Azure.Network.NetworkManagerAdminRule(\"example\", new()\n {\n Name = \"example-nmar\",\n AdminRuleCollectionId = exampleNetworkManagerAdminRuleCollection.Id,\n Action = \"Deny\",\n Description = \"example\",\n Direction = \"Inbound\",\n Priority = 1,\n Protocol = \"Tcp\",\n SourcePortRanges = new[]\n {\n \"80\",\n },\n DestinationPortRanges = new[]\n {\n \"80\",\n },\n Sources = new[]\n {\n new Azure.Network.Inputs.NetworkManagerAdminRuleSourceArgs\n {\n AddressPrefixType = \"ServiceTag\",\n AddressPrefix = \"Internet\",\n },\n },\n Destinations = new[]\n {\n new Azure.Network.Inputs.NetworkManagerAdminRuleDestinationArgs\n {\n AddressPrefixType = \"IPPrefix\",\n AddressPrefix = \"*\",\n },\n },\n });\n\n var exampleNetworkManagerDeployment = new Azure.Network.NetworkManagerDeployment(\"example\", new()\n {\n NetworkManagerId = exampleNetworkManager.Id,\n Location = \"eastus\",\n ScopeAccess = \"SecurityAdmin\",\n ConfigurationIds = new[]\n {\n exampleNetworkManagerSecurityAdminConfiguration.Id,\n },\n Triggers = \n {\n { \"source_port_ranges\", exampleNetworkManagerAdminRule.SourcePortRanges.Apply(sourcePortRanges =\u003e Std.Join.Invoke(new()\n {\n Separator = \",\",\n Input = sourcePortRanges,\n })).Apply(invoke =\u003e invoke.Result) },\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleNetworkManagerAdminRule,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-net\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tFlowTimeoutInMinutes: pulumi.Int(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerSecurityAdminConfiguration, err := network.NewNetworkManagerSecurityAdminConfiguration(ctx, \"example\", \u0026network.NetworkManagerSecurityAdminConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-nmsac\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerAdminRuleCollection, err := network.NewNetworkManagerAdminRuleCollection(ctx, \"example\", \u0026network.NetworkManagerAdminRuleCollectionArgs{\n\t\t\tName: pulumi.String(\"example-nmarc\"),\n\t\t\tSecurityAdminConfigurationId: exampleNetworkManagerSecurityAdminConfiguration.ID(),\n\t\t\tNetworkGroupIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerNetworkGroup.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerAdminRule, err := network.NewNetworkManagerAdminRule(ctx, \"example\", \u0026network.NetworkManagerAdminRuleArgs{\n\t\t\tName: pulumi.String(\"example-nmar\"),\n\t\t\tAdminRuleCollectionId: exampleNetworkManagerAdminRuleCollection.ID(),\n\t\t\tAction: pulumi.String(\"Deny\"),\n\t\t\tDescription: pulumi.String(\"example\"),\n\t\t\tDirection: pulumi.String(\"Inbound\"),\n\t\t\tPriority: pulumi.Int(1),\n\t\t\tProtocol: pulumi.String(\"Tcp\"),\n\t\t\tSourcePortRanges: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"80\"),\n\t\t\t},\n\t\t\tDestinationPortRanges: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"80\"),\n\t\t\t},\n\t\t\tSources: network.NetworkManagerAdminRuleSourceArray{\n\t\t\t\t\u0026network.NetworkManagerAdminRuleSourceArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"ServiceTag\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"Internet\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tDestinations: network.NetworkManagerAdminRuleDestinationArray{\n\t\t\t\t\u0026network.NetworkManagerAdminRuleDestinationArgs{\n\t\t\t\t\tAddressPrefixType: pulumi.String(\"IPPrefix\"),\n\t\t\t\t\tAddressPrefix: pulumi.String(\"*\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerDeployment(ctx, \"example\", \u0026network.NetworkManagerDeploymentArgs{\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tLocation: pulumi.String(\"eastus\"),\n\t\t\tScopeAccess: pulumi.String(\"SecurityAdmin\"),\n\t\t\tConfigurationIds: pulumi.StringArray{\n\t\t\t\texampleNetworkManagerSecurityAdminConfiguration.ID(),\n\t\t\t},\n\t\t\tTriggers: pulumi.StringMap{\n\t\t\t\t\"source_port_ranges\": pulumi.String(exampleNetworkManagerAdminRule.SourcePortRanges.ApplyT(func(sourcePortRanges interface{}) (std.JoinResult, error) {\n\t\t\t\t\treturn std.JoinResult(interface{}(std.JoinOutput(ctx, std.JoinOutputArgs{\n\t\t\t\t\t\tSeparator: \",\",\n\t\t\t\t\t\tInput: sourcePortRanges,\n\t\t\t\t\t}, nil))), nil\n\t\t\t\t}).(std.JoinResultOutput).ApplyT(func(invoke std.JoinResult) (*string, error) {\n\t\t\t\t\treturn invoke.Result, nil\n\t\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleNetworkManagerAdminRule,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfiguration;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfigurationArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollection;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleCollectionArgs;\nimport com.pulumi.azure.network.NetworkManagerAdminRule;\nimport com.pulumi.azure.network.NetworkManagerAdminRuleArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerAdminRuleSourceArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerAdminRuleDestinationArgs;\nimport com.pulumi.azure.network.NetworkManagerDeployment;\nimport com.pulumi.azure.network.NetworkManagerDeploymentArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-net\")\n .location(example.location())\n .resourceGroupName(example.name())\n .addressSpaces(\"10.0.0.0/16\")\n .flowTimeoutInMinutes(10)\n .build());\n\n var exampleNetworkManagerSecurityAdminConfiguration = new NetworkManagerSecurityAdminConfiguration(\"exampleNetworkManagerSecurityAdminConfiguration\", NetworkManagerSecurityAdminConfigurationArgs.builder()\n .name(\"example-nmsac\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerAdminRuleCollection = new NetworkManagerAdminRuleCollection(\"exampleNetworkManagerAdminRuleCollection\", NetworkManagerAdminRuleCollectionArgs.builder()\n .name(\"example-nmarc\")\n .securityAdminConfigurationId(exampleNetworkManagerSecurityAdminConfiguration.id())\n .networkGroupIds(exampleNetworkManagerNetworkGroup.id())\n .build());\n\n var exampleNetworkManagerAdminRule = new NetworkManagerAdminRule(\"exampleNetworkManagerAdminRule\", NetworkManagerAdminRuleArgs.builder()\n .name(\"example-nmar\")\n .adminRuleCollectionId(exampleNetworkManagerAdminRuleCollection.id())\n .action(\"Deny\")\n .description(\"example\")\n .direction(\"Inbound\")\n .priority(1)\n .protocol(\"Tcp\")\n .sourcePortRanges(\"80\")\n .destinationPortRanges(\"80\")\n .sources(NetworkManagerAdminRuleSourceArgs.builder()\n .addressPrefixType(\"ServiceTag\")\n .addressPrefix(\"Internet\")\n .build())\n .destinations(NetworkManagerAdminRuleDestinationArgs.builder()\n .addressPrefixType(\"IPPrefix\")\n .addressPrefix(\"*\")\n .build())\n .build());\n\n var exampleNetworkManagerDeployment = new NetworkManagerDeployment(\"exampleNetworkManagerDeployment\", NetworkManagerDeploymentArgs.builder()\n .networkManagerId(exampleNetworkManager.id())\n .location(\"eastus\")\n .scopeAccess(\"SecurityAdmin\")\n .configurationIds(exampleNetworkManagerSecurityAdminConfiguration.id())\n .triggers(Map.of(\"source_port_ranges\", exampleNetworkManagerAdminRule.sourcePortRanges().applyValue(sourcePortRanges -\u003e StdFunctions.join()).applyValue(invoke -\u003e invoke.result())))\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleNetworkManagerAdminRule)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-net\n location: ${example.location}\n resourceGroupName: ${example.name}\n addressSpaces:\n - 10.0.0.0/16\n flowTimeoutInMinutes: 10\n exampleNetworkManagerSecurityAdminConfiguration:\n type: azure:network:NetworkManagerSecurityAdminConfiguration\n name: example\n properties:\n name: example-nmsac\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerAdminRuleCollection:\n type: azure:network:NetworkManagerAdminRuleCollection\n name: example\n properties:\n name: example-nmarc\n securityAdminConfigurationId: ${exampleNetworkManagerSecurityAdminConfiguration.id}\n networkGroupIds:\n - ${exampleNetworkManagerNetworkGroup.id}\n exampleNetworkManagerAdminRule:\n type: azure:network:NetworkManagerAdminRule\n name: example\n properties:\n name: example-nmar\n adminRuleCollectionId: ${exampleNetworkManagerAdminRuleCollection.id}\n action: Deny\n description: example\n direction: Inbound\n priority: 1\n protocol: Tcp\n sourcePortRanges:\n - '80'\n destinationPortRanges:\n - '80'\n sources:\n - addressPrefixType: ServiceTag\n addressPrefix: Internet\n destinations:\n - addressPrefixType: IPPrefix\n addressPrefix: '*'\n exampleNetworkManagerDeployment:\n type: azure:network:NetworkManagerDeployment\n name: example\n properties:\n networkManagerId: ${exampleNetworkManager.id}\n location: eastus\n scopeAccess: SecurityAdmin\n configurationIds:\n - ${exampleNetworkManagerSecurityAdminConfiguration.id}\n triggers:\n source_port_ranges:\n fn::invoke:\n Function: std:join\n Arguments:\n separator: ','\n input: ${exampleNetworkManagerAdminRule.sourcePortRanges}\n Return: result\n options:\n dependson:\n - ${exampleNetworkManagerAdminRule}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Deployment can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerDeployment:NetworkManagerDeployment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/commit|eastus|Connectivity\n```\n\n", "properties": { "configurationIds": { "type": "array", @@ -223204,7 +223204,7 @@ } }, "azure:network/networkManagerManagementGroupConnection:NetworkManagerManagementGroupConnection": { - "description": "Manages a Network Manager Management Group Connection which may cross tenants.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.management.Group(\"example\", {});\nconst alt = azure.core.getSubscription({\n subscriptionId: \"00000000-0000-0000-0000-000000000000\",\n});\nconst exampleGroupSubscriptionAssociation = new azure.management.GroupSubscriptionAssociation(\"example\", {\n managementGroupId: example.id,\n subscriptionId: alt.then(alt =\u003e alt.id),\n});\nconst current = azure.core.getSubscription({});\nconst currentGetClientConfig = azure.core.getClientConfig({});\nconst networkContributor = new azure.authorization.Assignment(\"network_contributor\", {\n scope: example.id,\n roleDefinitionName: \"Network Contributor\",\n principalId: currentGetClientConfig.then(currentGetClientConfig =\u003e currentGetClientConfig.objectId),\n});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-networkmanager\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\"SecurityAdmin\"],\n});\nconst exampleNetworkManagerManagementGroupConnection = new azure.network.NetworkManagerManagementGroupConnection(\"example\", {\n name: \"example-nmmgc\",\n managementGroupId: example.id,\n networkManagerId: exampleNetworkManager.id,\n description: \"example\",\n}, {\n dependsOn: [networkContributor],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.management.Group(\"example\")\nalt = azure.core.get_subscription(subscription_id=\"00000000-0000-0000-0000-000000000000\")\nexample_group_subscription_association = azure.management.GroupSubscriptionAssociation(\"example\",\n management_group_id=example.id,\n subscription_id=alt.id)\ncurrent = azure.core.get_subscription()\ncurrent_get_client_config = azure.core.get_client_config()\nnetwork_contributor = azure.authorization.Assignment(\"network_contributor\",\n scope=example.id,\n role_definition_name=\"Network Contributor\",\n principal_id=current_get_client_config.object_id)\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-networkmanager\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\"SecurityAdmin\"])\nexample_network_manager_management_group_connection = azure.network.NetworkManagerManagementGroupConnection(\"example\",\n name=\"example-nmmgc\",\n management_group_id=example.id,\n network_manager_id=example_network_manager.id,\n description=\"example\",\n opts = pulumi.ResourceOptions(depends_on=[network_contributor]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Management.Group(\"example\");\n\n var alt = Azure.Core.GetSubscription.Invoke(new()\n {\n SubscriptionId = \"00000000-0000-0000-0000-000000000000\",\n });\n\n var exampleGroupSubscriptionAssociation = new Azure.Management.GroupSubscriptionAssociation(\"example\", new()\n {\n ManagementGroupId = example.Id,\n SubscriptionId = alt.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var currentGetClientConfig = Azure.Core.GetClientConfig.Invoke();\n\n var networkContributor = new Azure.Authorization.Assignment(\"network_contributor\", new()\n {\n Scope = example.Id,\n RoleDefinitionName = \"Network Contributor\",\n PrincipalId = currentGetClientConfig.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-networkmanager\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"SecurityAdmin\",\n },\n });\n\n var exampleNetworkManagerManagementGroupConnection = new Azure.Network.NetworkManagerManagementGroupConnection(\"example\", new()\n {\n Name = \"example-nmmgc\",\n ManagementGroupId = example.Id,\n NetworkManagerId = exampleNetworkManager.Id,\n Description = \"example\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n networkContributor,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := management.NewGroup(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\talt, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{\n\t\t\tSubscriptionId: pulumi.StringRef(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewGroupSubscriptionAssociation(ctx, \"example\", \u0026management.GroupSubscriptionAssociationArgs{\n\t\t\tManagementGroupId: example.ID(),\n\t\t\tSubscriptionId: pulumi.String(alt.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrentGetClientConfig, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tnetworkContributor, err := authorization.NewAssignment(ctx, \"network_contributor\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: example.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Network Contributor\"),\n\t\t\tPrincipalId: pulumi.String(currentGetClientConfig.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-networkmanager\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerManagementGroupConnection(ctx, \"example\", \u0026network.NetworkManagerManagementGroupConnectionArgs{\n\t\t\tName: pulumi.String(\"example-nmmgc\"),\n\t\t\tManagementGroupId: example.ID(),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tDescription: pulumi.String(\"example\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tnetworkContributor,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.GroupSubscriptionAssociation;\nimport com.pulumi.azure.management.GroupSubscriptionAssociationArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerManagementGroupConnection;\nimport com.pulumi.azure.network.NetworkManagerManagementGroupConnectionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new Group(\"example\");\n\n final var alt = CoreFunctions.getSubscription(GetSubscriptionArgs.builder()\n .subscriptionId(\"00000000-0000-0000-0000-000000000000\")\n .build());\n\n var exampleGroupSubscriptionAssociation = new GroupSubscriptionAssociation(\"exampleGroupSubscriptionAssociation\", GroupSubscriptionAssociationArgs.builder()\n .managementGroupId(example.id())\n .subscriptionId(alt.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n final var currentGetClientConfig = CoreFunctions.getClientConfig();\n\n var networkContributor = new Assignment(\"networkContributor\", AssignmentArgs.builder()\n .scope(example.id())\n .roleDefinitionName(\"Network Contributor\")\n .principalId(currentGetClientConfig.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-networkmanager\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses(\"SecurityAdmin\")\n .build());\n\n var exampleNetworkManagerManagementGroupConnection = new NetworkManagerManagementGroupConnection(\"exampleNetworkManagerManagementGroupConnection\", NetworkManagerManagementGroupConnectionArgs.builder()\n .name(\"example-nmmgc\")\n .managementGroupId(example.id())\n .networkManagerId(exampleNetworkManager.id())\n .description(\"example\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(networkContributor)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:management:Group\n exampleGroupSubscriptionAssociation:\n type: azure:management:GroupSubscriptionAssociation\n name: example\n properties:\n managementGroupId: ${example.id}\n subscriptionId: ${alt.id}\n networkContributor:\n type: azure:authorization:Assignment\n name: network_contributor\n properties:\n scope: ${example.id}\n roleDefinitionName: Network Contributor\n principalId: ${currentGetClientConfig.objectId}\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-networkmanager\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - SecurityAdmin\n exampleNetworkManagerManagementGroupConnection:\n type: azure:network:NetworkManagerManagementGroupConnection\n name: example\n properties:\n name: example-nmmgc\n managementGroupId: ${example.id}\n networkManagerId: ${exampleNetworkManager.id}\n description: example\n options:\n dependson:\n - ${networkContributor}\nvariables:\n alt:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments:\n subscriptionId: 00000000-0000-0000-0000-000000000000\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n currentGetClientConfig:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Management Group Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerManagementGroupConnection:NetworkManagerManagementGroupConnection example /providers/Microsoft.Management/managementGroups/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/networkManagerConnections/networkManagerConnection1\n```\n\n", + "description": "Manages a Network Manager Management Group Connection which may cross tenants.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.management.Group(\"example\", {});\nconst alt = azure.core.getSubscription({\n subscriptionId: \"00000000-0000-0000-0000-000000000000\",\n});\nconst exampleGroupSubscriptionAssociation = new azure.management.GroupSubscriptionAssociation(\"example\", {\n managementGroupId: example.id,\n subscriptionId: alt.then(alt =\u003e alt.id),\n});\nconst current = azure.core.getSubscription({});\nconst currentGetClientConfig = azure.core.getClientConfig({});\nconst networkContributor = new azure.authorization.Assignment(\"network_contributor\", {\n scope: example.id,\n roleDefinitionName: \"Network Contributor\",\n principalId: currentGetClientConfig.then(currentGetClientConfig =\u003e currentGetClientConfig.objectId),\n});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-networkmanager\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\"SecurityAdmin\"],\n});\nconst exampleNetworkManagerManagementGroupConnection = new azure.network.NetworkManagerManagementGroupConnection(\"example\", {\n name: \"example-nmmgc\",\n managementGroupId: example.id,\n networkManagerId: exampleNetworkManager.id,\n description: \"example\",\n}, {\n dependsOn: [networkContributor],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.management.Group(\"example\")\nalt = azure.core.get_subscription(subscription_id=\"00000000-0000-0000-0000-000000000000\")\nexample_group_subscription_association = azure.management.GroupSubscriptionAssociation(\"example\",\n management_group_id=example.id,\n subscription_id=alt.id)\ncurrent = azure.core.get_subscription()\ncurrent_get_client_config = azure.core.get_client_config()\nnetwork_contributor = azure.authorization.Assignment(\"network_contributor\",\n scope=example.id,\n role_definition_name=\"Network Contributor\",\n principal_id=current_get_client_config.object_id)\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-networkmanager\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\"SecurityAdmin\"])\nexample_network_manager_management_group_connection = azure.network.NetworkManagerManagementGroupConnection(\"example\",\n name=\"example-nmmgc\",\n management_group_id=example.id,\n network_manager_id=example_network_manager.id,\n description=\"example\",\n opts = pulumi.ResourceOptions(depends_on=[network_contributor]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Management.Group(\"example\");\n\n var alt = Azure.Core.GetSubscription.Invoke(new()\n {\n SubscriptionId = \"00000000-0000-0000-0000-000000000000\",\n });\n\n var exampleGroupSubscriptionAssociation = new Azure.Management.GroupSubscriptionAssociation(\"example\", new()\n {\n ManagementGroupId = example.Id,\n SubscriptionId = alt.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var currentGetClientConfig = Azure.Core.GetClientConfig.Invoke();\n\n var networkContributor = new Azure.Authorization.Assignment(\"network_contributor\", new()\n {\n Scope = example.Id,\n RoleDefinitionName = \"Network Contributor\",\n PrincipalId = currentGetClientConfig.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-networkmanager\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"SecurityAdmin\",\n },\n });\n\n var exampleNetworkManagerManagementGroupConnection = new Azure.Network.NetworkManagerManagementGroupConnection(\"example\", new()\n {\n Name = \"example-nmmgc\",\n ManagementGroupId = example.Id,\n NetworkManagerId = exampleNetworkManager.Id,\n Description = \"example\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n networkContributor,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := management.NewGroup(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\talt, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{\n\t\t\tSubscriptionId: pulumi.StringRef(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.NewGroupSubscriptionAssociation(ctx, \"example\", \u0026management.GroupSubscriptionAssociationArgs{\n\t\t\tManagementGroupId: example.ID(),\n\t\t\tSubscriptionId: pulumi.String(alt.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrentGetClientConfig, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tnetworkContributor, err := authorization.NewAssignment(ctx, \"network_contributor\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: example.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Network Contributor\"),\n\t\t\tPrincipalId: pulumi.String(currentGetClientConfig.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-networkmanager\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerManagementGroupConnection(ctx, \"example\", \u0026network.NetworkManagerManagementGroupConnectionArgs{\n\t\t\tName: pulumi.String(\"example-nmmgc\"),\n\t\t\tManagementGroupId: example.ID(),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tDescription: pulumi.String(\"example\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tnetworkContributor,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.GroupSubscriptionAssociation;\nimport com.pulumi.azure.management.GroupSubscriptionAssociationArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerManagementGroupConnection;\nimport com.pulumi.azure.network.NetworkManagerManagementGroupConnectionArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new Group(\"example\");\n\n final var alt = CoreFunctions.getSubscription(GetSubscriptionArgs.builder()\n .subscriptionId(\"00000000-0000-0000-0000-000000000000\")\n .build());\n\n var exampleGroupSubscriptionAssociation = new GroupSubscriptionAssociation(\"exampleGroupSubscriptionAssociation\", GroupSubscriptionAssociationArgs.builder()\n .managementGroupId(example.id())\n .subscriptionId(alt.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n final var currentGetClientConfig = CoreFunctions.getClientConfig();\n\n var networkContributor = new Assignment(\"networkContributor\", AssignmentArgs.builder()\n .scope(example.id())\n .roleDefinitionName(\"Network Contributor\")\n .principalId(currentGetClientConfig.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-networkmanager\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses(\"SecurityAdmin\")\n .build());\n\n var exampleNetworkManagerManagementGroupConnection = new NetworkManagerManagementGroupConnection(\"exampleNetworkManagerManagementGroupConnection\", NetworkManagerManagementGroupConnectionArgs.builder()\n .name(\"example-nmmgc\")\n .managementGroupId(example.id())\n .networkManagerId(exampleNetworkManager.id())\n .description(\"example\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(networkContributor)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:management:Group\n exampleGroupSubscriptionAssociation:\n type: azure:management:GroupSubscriptionAssociation\n name: example\n properties:\n managementGroupId: ${example.id}\n subscriptionId: ${alt.id}\n networkContributor:\n type: azure:authorization:Assignment\n name: network_contributor\n properties:\n scope: ${example.id}\n roleDefinitionName: Network Contributor\n principalId: ${currentGetClientConfig.objectId}\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-networkmanager\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - SecurityAdmin\n exampleNetworkManagerManagementGroupConnection:\n type: azure:network:NetworkManagerManagementGroupConnection\n name: example\n properties:\n name: example-nmmgc\n managementGroupId: ${example.id}\n networkManagerId: ${exampleNetworkManager.id}\n description: example\n options:\n dependson:\n - ${networkContributor}\nvariables:\n alt:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments:\n subscriptionId: 00000000-0000-0000-0000-000000000000\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n currentGetClientConfig:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Management Group Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerManagementGroupConnection:NetworkManagerManagementGroupConnection example /providers/Microsoft.Management/managementGroups/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/networkManagerConnections/networkManagerConnection1\n```\n\n", "properties": { "connectionState": { "type": "string", @@ -223289,7 +223289,7 @@ } }, "azure:network/networkManagerNetworkGroup:NetworkManagerNetworkGroup": { - "description": "Manages a Network Manager Network Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Network Group can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerNetworkGroup:NetworkManagerNetworkGroup example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/networkGroups/networkGroup1\n```\n\n", + "description": "Manages a Network Manager Network Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Network Group can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerNetworkGroup:NetworkManagerNetworkGroup example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/networkGroups/networkGroup1\n```\n\n", "properties": { "description": { "type": "string", @@ -223349,7 +223349,7 @@ } }, "azure:network/networkManagerScopeConnection:NetworkManagerScopeConnection": { - "description": "Manages a Network Manager Scope Connection which may cross tenants.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst currentGetSubscription = azure.core.getSubscription({});\nconst alt = azure.core.getSubscription({\n subscriptionId: \"00000000-0000-0000-0000-000000000000\",\n});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-networkmanager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [currentGetSubscription.then(currentGetSubscription =\u003e currentGetSubscription.id)],\n },\n scopeAccesses: [\"SecurityAdmin\"],\n});\nconst exampleNetworkManagerScopeConnection = new azure.network.NetworkManagerScopeConnection(\"example\", {\n name: \"example-nsc\",\n networkManagerId: exampleNetworkManager.id,\n tenantId: current.then(current =\u003e current.tenantId),\n targetScopeId: alt.then(alt =\u003e alt.id),\n description: \"example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\ncurrent_get_subscription = azure.core.get_subscription()\nalt = azure.core.get_subscription(subscription_id=\"00000000-0000-0000-0000-000000000000\")\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-networkmanager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current_get_subscription.id],\n },\n scope_accesses=[\"SecurityAdmin\"])\nexample_network_manager_scope_connection = azure.network.NetworkManagerScopeConnection(\"example\",\n name=\"example-nsc\",\n network_manager_id=example_network_manager.id,\n tenant_id=current.tenant_id,\n target_scope_id=alt.id,\n description=\"example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var currentGetSubscription = Azure.Core.GetSubscription.Invoke();\n\n var alt = Azure.Core.GetSubscription.Invoke(new()\n {\n SubscriptionId = \"00000000-0000-0000-0000-000000000000\",\n });\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-networkmanager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n currentGetSubscription.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"SecurityAdmin\",\n },\n });\n\n var exampleNetworkManagerScopeConnection = new Azure.Network.NetworkManagerScopeConnection(\"example\", new()\n {\n Name = \"example-nsc\",\n NetworkManagerId = exampleNetworkManager.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n TargetScopeId = alt.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Description = \"example\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrentGetSubscription, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\talt, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{\n\t\t\tSubscriptionId: pulumi.StringRef(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-networkmanager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(currentGetSubscription.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerScopeConnection(ctx, \"example\", \u0026network.NetworkManagerScopeConnectionArgs{\n\t\t\tName: pulumi.String(\"example-nsc\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tTargetScopeId: pulumi.String(alt.Id),\n\t\t\tDescription: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerScopeConnection;\nimport com.pulumi.azure.network.NetworkManagerScopeConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n final var currentGetSubscription = CoreFunctions.getSubscription();\n\n final var alt = CoreFunctions.getSubscription(GetSubscriptionArgs.builder()\n .subscriptionId(\"00000000-0000-0000-0000-000000000000\")\n .build());\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-networkmanager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(currentGetSubscription.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses(\"SecurityAdmin\")\n .build());\n\n var exampleNetworkManagerScopeConnection = new NetworkManagerScopeConnection(\"exampleNetworkManagerScopeConnection\", NetworkManagerScopeConnectionArgs.builder()\n .name(\"example-nsc\")\n .networkManagerId(exampleNetworkManager.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .targetScopeId(alt.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .description(\"example\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-networkmanager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${currentGetSubscription.id}\n scopeAccesses:\n - SecurityAdmin\n exampleNetworkManagerScopeConnection:\n type: azure:network:NetworkManagerScopeConnection\n name: example\n properties:\n name: example-nsc\n networkManagerId: ${exampleNetworkManager.id}\n tenantId: ${current.tenantId}\n targetScopeId: ${alt.id}\n description: example\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n currentGetSubscription:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n alt:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments:\n subscriptionId: 00000000-0000-0000-0000-000000000000\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Scope Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerScopeConnection:NetworkManagerScopeConnection example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/scopeConnections/scopeConnection1\n```\n\n", + "description": "Manages a Network Manager Scope Connection which may cross tenants.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getClientConfig({});\nconst currentGetSubscription = azure.core.getSubscription({});\nconst alt = azure.core.getSubscription({\n subscriptionId: \"00000000-0000-0000-0000-000000000000\",\n});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-networkmanager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [currentGetSubscription.then(currentGetSubscription =\u003e currentGetSubscription.id)],\n },\n scopeAccesses: [\"SecurityAdmin\"],\n});\nconst exampleNetworkManagerScopeConnection = new azure.network.NetworkManagerScopeConnection(\"example\", {\n name: \"example-nsc\",\n networkManagerId: exampleNetworkManager.id,\n tenantId: current.then(current =\u003e current.tenantId),\n targetScopeId: alt.then(alt =\u003e alt.id),\n description: \"example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_client_config()\ncurrent_get_subscription = azure.core.get_subscription()\nalt = azure.core.get_subscription(subscription_id=\"00000000-0000-0000-0000-000000000000\")\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-networkmanager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current_get_subscription.id],\n },\n scope_accesses=[\"SecurityAdmin\"])\nexample_network_manager_scope_connection = azure.network.NetworkManagerScopeConnection(\"example\",\n name=\"example-nsc\",\n network_manager_id=example_network_manager.id,\n tenant_id=current.tenant_id,\n target_scope_id=alt.id,\n description=\"example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var currentGetSubscription = Azure.Core.GetSubscription.Invoke();\n\n var alt = Azure.Core.GetSubscription.Invoke(new()\n {\n SubscriptionId = \"00000000-0000-0000-0000-000000000000\",\n });\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-networkmanager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n currentGetSubscription.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"SecurityAdmin\",\n },\n });\n\n var exampleNetworkManagerScopeConnection = new Azure.Network.NetworkManagerScopeConnection(\"example\", new()\n {\n Name = \"example-nsc\",\n NetworkManagerId = exampleNetworkManager.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n TargetScopeId = alt.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Description = \"example\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrentGetSubscription, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\talt, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{\n\t\t\tSubscriptionId: pulumi.StringRef(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-networkmanager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(currentGetSubscription.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerScopeConnection(ctx, \"example\", \u0026network.NetworkManagerScopeConnectionArgs{\n\t\t\tName: pulumi.String(\"example-nsc\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tTargetScopeId: pulumi.String(alt.Id),\n\t\t\tDescription: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerScopeConnection;\nimport com.pulumi.azure.network.NetworkManagerScopeConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n final var currentGetSubscription = CoreFunctions.getSubscription();\n\n final var alt = CoreFunctions.getSubscription(GetSubscriptionArgs.builder()\n .subscriptionId(\"00000000-0000-0000-0000-000000000000\")\n .build());\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-networkmanager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(currentGetSubscription.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses(\"SecurityAdmin\")\n .build());\n\n var exampleNetworkManagerScopeConnection = new NetworkManagerScopeConnection(\"exampleNetworkManagerScopeConnection\", NetworkManagerScopeConnectionArgs.builder()\n .name(\"example-nsc\")\n .networkManagerId(exampleNetworkManager.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .targetScopeId(alt.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .description(\"example\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-networkmanager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${currentGetSubscription.id}\n scopeAccesses:\n - SecurityAdmin\n exampleNetworkManagerScopeConnection:\n type: azure:network:NetworkManagerScopeConnection\n name: example\n properties:\n name: example-nsc\n networkManagerId: ${exampleNetworkManager.id}\n tenantId: ${current.tenantId}\n targetScopeId: ${alt.id}\n description: example\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n currentGetSubscription:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n alt:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments:\n subscriptionId: 00000000-0000-0000-0000-000000000000\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Scope Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerScopeConnection:NetworkManagerScopeConnection example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/scopeConnections/scopeConnection1\n```\n\n", "properties": { "connectionState": { "type": "string", @@ -223446,7 +223446,7 @@ } }, "azure:network/networkManagerSecurityAdminConfiguration:NetworkManagerSecurityAdminConfiguration": { - "description": "Manages a Network Manager Security Admin Configuration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-network-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerSecurityAdminConfiguration = new azure.network.NetworkManagerSecurityAdminConfiguration(\"example\", {\n name: \"example-admin-conf\",\n networkManagerId: exampleNetworkManager.id,\n description: \"example admin conf\",\n applyOnNetworkIntentPolicyBasedServices: \"None\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-network-group\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_security_admin_configuration = azure.network.NetworkManagerSecurityAdminConfiguration(\"example\",\n name=\"example-admin-conf\",\n network_manager_id=example_network_manager.id,\n description=\"example admin conf\",\n apply_on_network_intent_policy_based_services=\"None\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-network-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerSecurityAdminConfiguration = new Azure.Network.NetworkManagerSecurityAdminConfiguration(\"example\", new()\n {\n Name = \"example-admin-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n Description = \"example admin conf\",\n ApplyOnNetworkIntentPolicyBasedServices = \"None\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-network-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerSecurityAdminConfiguration(ctx, \"example\", \u0026network.NetworkManagerSecurityAdminConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-admin-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tDescription: pulumi.String(\"example admin conf\"),\n\t\t\tApplyOnNetworkIntentPolicyBasedServices: pulumi.String(\"None\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfiguration;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfigurationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-network-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerSecurityAdminConfiguration = new NetworkManagerSecurityAdminConfiguration(\"exampleNetworkManagerSecurityAdminConfiguration\", NetworkManagerSecurityAdminConfigurationArgs.builder()\n .name(\"example-admin-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .description(\"example admin conf\")\n .applyOnNetworkIntentPolicyBasedServices(\"None\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-network-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerSecurityAdminConfiguration:\n type: azure:network:NetworkManagerSecurityAdminConfiguration\n name: example\n properties:\n name: example-admin-conf\n networkManagerId: ${exampleNetworkManager.id}\n description: example admin conf\n applyOnNetworkIntentPolicyBasedServices: None\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Security Admin Configuration can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerSecurityAdminConfiguration:NetworkManagerSecurityAdminConfiguration example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/securityAdminConfigurations/configuration1\n```\n\n", + "description": "Manages a Network Manager Security Admin Configuration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-network-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst exampleNetworkManagerSecurityAdminConfiguration = new azure.network.NetworkManagerSecurityAdminConfiguration(\"example\", {\n name: \"example-admin-conf\",\n networkManagerId: exampleNetworkManager.id,\n description: \"example admin conf\",\n applyOnNetworkIntentPolicyBasedServices: \"None\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-network-group\",\n network_manager_id=example_network_manager.id)\nexample_network_manager_security_admin_configuration = azure.network.NetworkManagerSecurityAdminConfiguration(\"example\",\n name=\"example-admin-conf\",\n network_manager_id=example_network_manager.id,\n description=\"example admin conf\",\n apply_on_network_intent_policy_based_services=\"None\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-network-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var exampleNetworkManagerSecurityAdminConfiguration = new Azure.Network.NetworkManagerSecurityAdminConfiguration(\"example\", new()\n {\n Name = \"example-admin-conf\",\n NetworkManagerId = exampleNetworkManager.Id,\n Description = \"example admin conf\",\n ApplyOnNetworkIntentPolicyBasedServices = \"None\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-network-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerSecurityAdminConfiguration(ctx, \"example\", \u0026network.NetworkManagerSecurityAdminConfigurationArgs{\n\t\t\tName: pulumi.String(\"example-admin-conf\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tDescription: pulumi.String(\"example admin conf\"),\n\t\t\tApplyOnNetworkIntentPolicyBasedServices: pulumi.String(\"None\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfiguration;\nimport com.pulumi.azure.network.NetworkManagerSecurityAdminConfigurationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-network-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n var exampleNetworkManagerSecurityAdminConfiguration = new NetworkManagerSecurityAdminConfiguration(\"exampleNetworkManagerSecurityAdminConfiguration\", NetworkManagerSecurityAdminConfigurationArgs.builder()\n .name(\"example-admin-conf\")\n .networkManagerId(exampleNetworkManager.id())\n .description(\"example admin conf\")\n .applyOnNetworkIntentPolicyBasedServices(\"None\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-network-group\n networkManagerId: ${exampleNetworkManager.id}\n exampleNetworkManagerSecurityAdminConfiguration:\n type: azure:network:NetworkManagerSecurityAdminConfiguration\n name: example\n properties:\n name: example-admin-conf\n networkManagerId: ${exampleNetworkManager.id}\n description: example admin conf\n applyOnNetworkIntentPolicyBasedServices: None\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Security Admin Configuration can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerSecurityAdminConfiguration:NetworkManagerSecurityAdminConfiguration example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/securityAdminConfigurations/configuration1\n```\n\n", "properties": { "applyOnNetworkIntentPolicyBasedServices": { "type": "string", @@ -223518,7 +223518,7 @@ } }, "azure:network/networkManagerStaticMember:NetworkManagerStaticMember": { - "description": "Manages a Network Manager Static Member.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n description: \"example network group\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n resourceGroupName: example.name,\n addressSpaces: [\"192.168.1.0/24\"],\n location: example.location,\n});\nconst exampleNetworkManagerStaticMember = new azure.network.NetworkManagerStaticMember(\"example\", {\n name: \"example-nmsm\",\n networkGroupId: exampleNetworkManagerNetworkGroup.id,\n targetVirtualNetworkId: exampleVirtualNetwork.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id,\n description=\"example network group\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n resource_group_name=example.name,\n address_spaces=[\"192.168.1.0/24\"],\n location=example.location)\nexample_network_manager_static_member = azure.network.NetworkManagerStaticMember(\"example\",\n name=\"example-nmsm\",\n network_group_id=example_network_manager_network_group.id,\n target_virtual_network_id=example_virtual_network.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n Description = \"example network group\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"192.168.1.0/24\",\n },\n Location = example.Location,\n });\n\n var exampleNetworkManagerStaticMember = new Azure.Network.NetworkManagerStaticMember(\"example\", new()\n {\n Name = \"example-nmsm\",\n NetworkGroupId = exampleNetworkManagerNetworkGroup.Id,\n TargetVirtualNetworkId = exampleVirtualNetwork.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tDescription: pulumi.String(\"example network group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.1.0/24\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerStaticMember(ctx, \"example\", \u0026network.NetworkManagerStaticMemberArgs{\n\t\t\tName: pulumi.String(\"example-nmsm\"),\n\t\t\tNetworkGroupId: exampleNetworkManagerNetworkGroup.ID(),\n\t\t\tTargetVirtualNetworkId: exampleVirtualNetwork.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.NetworkManagerStaticMember;\nimport com.pulumi.azure.network.NetworkManagerStaticMemberArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .description(\"example network group\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .resourceGroupName(example.name())\n .addressSpaces(\"192.168.1.0/24\")\n .location(example.location())\n .build());\n\n var exampleNetworkManagerStaticMember = new NetworkManagerStaticMember(\"exampleNetworkManagerStaticMember\", NetworkManagerStaticMemberArgs.builder()\n .name(\"example-nmsm\")\n .networkGroupId(exampleNetworkManagerNetworkGroup.id())\n .targetVirtualNetworkId(exampleVirtualNetwork.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\n description: example network group\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n resourceGroupName: ${example.name}\n addressSpaces:\n - 192.168.1.0/24\n location: ${example.location}\n exampleNetworkManagerStaticMember:\n type: azure:network:NetworkManagerStaticMember\n name: example\n properties:\n name: example-nmsm\n networkGroupId: ${exampleNetworkManagerNetworkGroup.id}\n targetVirtualNetworkId: ${exampleVirtualNetwork.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Static Member can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerStaticMember:NetworkManagerStaticMember example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/networkGroups/networkGroup1/staticMembers/staticMember1\n```\n\n", + "description": "Manages a Network Manager Static Member.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n description: \"example network group\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n resourceGroupName: example.name,\n addressSpaces: [\"192.168.1.0/24\"],\n location: example.location,\n});\nconst exampleNetworkManagerStaticMember = new azure.network.NetworkManagerStaticMember(\"example\", {\n name: \"example-nmsm\",\n networkGroupId: exampleNetworkManagerNetworkGroup.id,\n targetVirtualNetworkId: exampleVirtualNetwork.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id,\n description=\"example network group\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n resource_group_name=example.name,\n address_spaces=[\"192.168.1.0/24\"],\n location=example.location)\nexample_network_manager_static_member = azure.network.NetworkManagerStaticMember(\"example\",\n name=\"example-nmsm\",\n network_group_id=example_network_manager_network_group.id,\n target_virtual_network_id=example_virtual_network.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n Description = \"example network group\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n ResourceGroupName = example.Name,\n AddressSpaces = new[]\n {\n \"192.168.1.0/24\",\n },\n Location = example.Location,\n });\n\n var exampleNetworkManagerStaticMember = new Azure.Network.NetworkManagerStaticMember(\"example\", new()\n {\n Name = \"example-nmsm\",\n NetworkGroupId = exampleNetworkManagerNetworkGroup.Id,\n TargetVirtualNetworkId = exampleVirtualNetwork.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tDescription: pulumi.String(\"example network group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.1.0/24\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerStaticMember(ctx, \"example\", \u0026network.NetworkManagerStaticMemberArgs{\n\t\t\tName: pulumi.String(\"example-nmsm\"),\n\t\t\tNetworkGroupId: exampleNetworkManagerNetworkGroup.ID(),\n\t\t\tTargetVirtualNetworkId: exampleVirtualNetwork.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.NetworkManagerStaticMember;\nimport com.pulumi.azure.network.NetworkManagerStaticMemberArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .description(\"example network group\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .resourceGroupName(example.name())\n .addressSpaces(\"192.168.1.0/24\")\n .location(example.location())\n .build());\n\n var exampleNetworkManagerStaticMember = new NetworkManagerStaticMember(\"exampleNetworkManagerStaticMember\", NetworkManagerStaticMemberArgs.builder()\n .name(\"example-nmsm\")\n .networkGroupId(exampleNetworkManagerNetworkGroup.id())\n .targetVirtualNetworkId(exampleVirtualNetwork.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\n description: example network group\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n resourceGroupName: ${example.name}\n addressSpaces:\n - 192.168.1.0/24\n location: ${example.location}\n exampleNetworkManagerStaticMember:\n type: azure:network:NetworkManagerStaticMember\n name: example\n properties:\n name: example-nmsm\n networkGroupId: ${exampleNetworkManagerNetworkGroup.id}\n targetVirtualNetworkId: ${exampleVirtualNetwork.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Manager Static Member can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerStaticMember:NetworkManagerStaticMember example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Network/networkManagers/networkManager1/networkGroups/networkGroup1/staticMembers/staticMember1\n```\n\n", "properties": { "name": { "type": "string", @@ -223591,7 +223591,7 @@ } }, "azure:network/networkManagerSubscriptionConnection:NetworkManagerSubscriptionConnection": { - "description": "Manages a Network Manager Subscription Connection which may cross tenants.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-networkmanager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\"SecurityAdmin\"],\n});\nconst exampleNetworkManagerSubscriptionConnection = new azure.network.NetworkManagerSubscriptionConnection(\"example\", {\n name: \"example-nsnmc\",\n subscriptionId: current.then(current =\u003e current.id),\n networkManagerId: exampleNetworkManager.id,\n description: \"example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-networkmanager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\"SecurityAdmin\"])\nexample_network_manager_subscription_connection = azure.network.NetworkManagerSubscriptionConnection(\"example\",\n name=\"example-nsnmc\",\n subscription_id=current.id,\n network_manager_id=example_network_manager.id,\n description=\"example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-networkmanager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"SecurityAdmin\",\n },\n });\n\n var exampleNetworkManagerSubscriptionConnection = new Azure.Network.NetworkManagerSubscriptionConnection(\"example\", new()\n {\n Name = \"example-nsnmc\",\n SubscriptionId = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n NetworkManagerId = exampleNetworkManager.Id,\n Description = \"example\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-networkmanager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerSubscriptionConnection(ctx, \"example\", \u0026network.NetworkManagerSubscriptionConnectionArgs{\n\t\t\tName: pulumi.String(\"example-nsnmc\"),\n\t\t\tSubscriptionId: pulumi.String(current.Id),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tDescription: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerSubscriptionConnection;\nimport com.pulumi.azure.network.NetworkManagerSubscriptionConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-networkmanager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses(\"SecurityAdmin\")\n .build());\n\n var exampleNetworkManagerSubscriptionConnection = new NetworkManagerSubscriptionConnection(\"exampleNetworkManagerSubscriptionConnection\", NetworkManagerSubscriptionConnectionArgs.builder()\n .name(\"example-nsnmc\")\n .subscriptionId(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .networkManagerId(exampleNetworkManager.id())\n .description(\"example\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-networkmanager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - SecurityAdmin\n exampleNetworkManagerSubscriptionConnection:\n type: azure:network:NetworkManagerSubscriptionConnection\n name: example\n properties:\n name: example-nsnmc\n subscriptionId: ${current.id}\n networkManagerId: ${exampleNetworkManager.id}\n description: example\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Subscription Network Manager Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerSubscriptionConnection:NetworkManagerSubscriptionConnection example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/networkManagerConnections/networkManagerConnection1\n```\n\n", + "description": "Manages a Network Manager Subscription Connection which may cross tenants.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-networkmanager\",\n location: example.location,\n resourceGroupName: example.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\"SecurityAdmin\"],\n});\nconst exampleNetworkManagerSubscriptionConnection = new azure.network.NetworkManagerSubscriptionConnection(\"example\", {\n name: \"example-nsnmc\",\n subscriptionId: current.then(current =\u003e current.id),\n networkManagerId: exampleNetworkManager.id,\n description: \"example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-networkmanager\",\n location=example.location,\n resource_group_name=example.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\"SecurityAdmin\"])\nexample_network_manager_subscription_connection = azure.network.NetworkManagerSubscriptionConnection(\"example\",\n name=\"example-nsnmc\",\n subscription_id=current.id,\n network_manager_id=example_network_manager.id,\n description=\"example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-networkmanager\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"SecurityAdmin\",\n },\n });\n\n var exampleNetworkManagerSubscriptionConnection = new Azure.Network.NetworkManagerSubscriptionConnection(\"example\", new()\n {\n Name = \"example-nsnmc\",\n SubscriptionId = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n NetworkManagerId = exampleNetworkManager.Id,\n Description = \"example\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-networkmanager\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = network.NewNetworkManagerSubscriptionConnection(ctx, \"example\", \u0026network.NetworkManagerSubscriptionConnectionArgs{\n\t\t\tName: pulumi.String(\"example-nsnmc\"),\n\t\t\tSubscriptionId: pulumi.String(current.Id),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t\tDescription: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerSubscriptionConnection;\nimport com.pulumi.azure.network.NetworkManagerSubscriptionConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-networkmanager\")\n .location(example.location())\n .resourceGroupName(example.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses(\"SecurityAdmin\")\n .build());\n\n var exampleNetworkManagerSubscriptionConnection = new NetworkManagerSubscriptionConnection(\"exampleNetworkManagerSubscriptionConnection\", NetworkManagerSubscriptionConnectionArgs.builder()\n .name(\"example-nsnmc\")\n .subscriptionId(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .networkManagerId(exampleNetworkManager.id())\n .description(\"example\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-networkmanager\n location: ${example.location}\n resourceGroupName: ${example.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - SecurityAdmin\n exampleNetworkManagerSubscriptionConnection:\n type: azure:network:NetworkManagerSubscriptionConnection\n name: example\n properties:\n name: example-nsnmc\n subscriptionId: ${current.id}\n networkManagerId: ${exampleNetworkManager.id}\n description: example\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nNetwork Subscription Network Manager Connection can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:network/networkManagerSubscriptionConnection:NetworkManagerSubscriptionConnection example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/networkManagerConnections/networkManagerConnection1\n```\n\n", "properties": { "connectionState": { "type": "string", @@ -230337,7 +230337,7 @@ } }, "azure:newrelic/monitor:Monitor": { - "description": "Manages an Azure Native New Relic Monitor.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"East US\",\n});\nconst exampleMonitor = new azure.newrelic.Monitor(\"example\", {\n name: \"example-nrm\",\n resourceGroupName: example.name,\n location: example.location,\n plan: {\n effectiveDate: \"2023-06-06T00:00:00Z\",\n },\n user: {\n email: \"user@example.com\",\n firstName: \"Example\",\n lastName: \"User\",\n phoneNumber: \"+12313803556\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"East US\")\nexample_monitor = azure.newrelic.Monitor(\"example\",\n name=\"example-nrm\",\n resource_group_name=example.name,\n location=example.location,\n plan={\n \"effective_date\": \"2023-06-06T00:00:00Z\",\n },\n user={\n \"email\": \"user@example.com\",\n \"first_name\": \"Example\",\n \"last_name\": \"User\",\n \"phone_number\": \"+12313803556\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"East US\",\n });\n\n var exampleMonitor = new Azure.NewRelic.Monitor(\"example\", new()\n {\n Name = \"example-nrm\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Plan = new Azure.NewRelic.Inputs.MonitorPlanArgs\n {\n EffectiveDate = \"2023-06-06T00:00:00Z\",\n },\n User = new Azure.NewRelic.Inputs.MonitorUserArgs\n {\n Email = \"user@example.com\",\n FirstName = \"Example\",\n LastName = \"User\",\n PhoneNumber = \"+12313803556\",\n },\n Identity = new Azure.NewRelic.Inputs.MonitorIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/newrelic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"East US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = newrelic.NewMonitor(ctx, \"example\", \u0026newrelic.MonitorArgs{\n\t\t\tName: pulumi.String(\"example-nrm\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tPlan: \u0026newrelic.MonitorPlanArgs{\n\t\t\t\tEffectiveDate: pulumi.String(\"2023-06-06T00:00:00Z\"),\n\t\t\t},\n\t\t\tUser: \u0026newrelic.MonitorUserArgs{\n\t\t\t\tEmail: pulumi.String(\"user@example.com\"),\n\t\t\t\tFirstName: pulumi.String(\"Example\"),\n\t\t\t\tLastName: pulumi.String(\"User\"),\n\t\t\t\tPhoneNumber: pulumi.String(\"+12313803556\"),\n\t\t\t},\n\t\t\tIdentity: \u0026newrelic.MonitorIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.newrelic.Monitor;\nimport com.pulumi.azure.newrelic.MonitorArgs;\nimport com.pulumi.azure.newrelic.inputs.MonitorPlanArgs;\nimport com.pulumi.azure.newrelic.inputs.MonitorUserArgs;\nimport com.pulumi.azure.newrelic.inputs.MonitorIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"East US\")\n .build());\n\n var exampleMonitor = new Monitor(\"exampleMonitor\", MonitorArgs.builder()\n .name(\"example-nrm\")\n .resourceGroupName(example.name())\n .location(example.location())\n .plan(MonitorPlanArgs.builder()\n .effectiveDate(\"2023-06-06T00:00:00Z\")\n .build())\n .user(MonitorUserArgs.builder()\n .email(\"user@example.com\")\n .firstName(\"Example\")\n .lastName(\"User\")\n .phoneNumber(\"+12313803556\")\n .build())\n .identity(MonitorIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: East US\n exampleMonitor:\n type: azure:newrelic:Monitor\n name: example\n properties:\n name: example-nrm\n resourceGroupName: ${example.name}\n location: ${example.location}\n plan:\n effectiveDate: 2023-06-06T00:00:00Z\n user:\n email: user@example.com\n firstName: Example\n lastName: User\n phoneNumber: '+12313803556'\n identity:\n type: SystemAssigned\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Role Assignment\n\nTo enable metrics flow, perform role assignment on the identity created above. `Monitoring reader(43d0d8ad-25c7-4714-9337-8ba259a9fe05)` role is required .\n\n### Role assignment on the monitor created\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst monitoringReader = azure.authorization.getRoleDefinition({\n name: \"Monitoring Reader\",\n});\nconst example = new azure.authorization.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: Promise.all([primary, monitoringReader]).then(([primary, monitoringReader]) =\u003e `${primary.id}${monitoringReader.id}`),\n principalId: exampleAzurermNewRelicMonitor.identity[0].principalId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nmonitoring_reader = azure.authorization.get_role_definition(name=\"Monitoring Reader\")\nexample = azure.authorization.Assignment(\"example\",\n scope=primary.id,\n role_definition_id=f\"{primary.id}{monitoring_reader.id}\",\n principal_id=example_azurerm_new_relic_monitor[\"identity\"][0][\"principalId\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var monitoringReader = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Monitoring Reader\",\n });\n\n var example = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = Output.Tuple(primary, monitoringReader).Apply(values =\u003e\n {\n var primary = values.Item1;\n var monitoringReader = values.Item2;\n return $\"{primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id)}{monitoringReader.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id)}\";\n }),\n PrincipalId = exampleAzurermNewRelicMonitor.Identity[0].PrincipalId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmonitoringReader, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Monitoring Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: pulumi.Sprintf(\"%v%v\", primary.Id, monitoringReader.Id),\n\t\t\tPrincipalId: pulumi.Any(exampleAzurermNewRelicMonitor.Identity[0].PrincipalId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var monitoringReader = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Monitoring Reader\")\n .build());\n\n var example = new Assignment(\"example\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(String.format(\"%s%s\", primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()),monitoringReader.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())))\n .principalId(exampleAzurermNewRelicMonitor.identity()[0].principalId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:authorization:Assignment\n properties:\n scope: ${primary.id}\n roleDefinitionId: ${primary.id}${monitoringReader.id}\n principalId: ${exampleAzurermNewRelicMonitor.identity[0].principalId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n monitoringReader:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Monitoring Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAzure Native New Relic Monitor can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:newrelic/monitor:Monitor example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/NewRelic.Observability/monitors/monitor1\n```\n\n", + "description": "Manages an Azure Native New Relic Monitor.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"East US\",\n});\nconst exampleMonitor = new azure.newrelic.Monitor(\"example\", {\n name: \"example-nrm\",\n resourceGroupName: example.name,\n location: example.location,\n plan: {\n effectiveDate: \"2023-06-06T00:00:00Z\",\n },\n user: {\n email: \"user@example.com\",\n firstName: \"Example\",\n lastName: \"User\",\n phoneNumber: \"+12313803556\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"East US\")\nexample_monitor = azure.newrelic.Monitor(\"example\",\n name=\"example-nrm\",\n resource_group_name=example.name,\n location=example.location,\n plan={\n \"effective_date\": \"2023-06-06T00:00:00Z\",\n },\n user={\n \"email\": \"user@example.com\",\n \"first_name\": \"Example\",\n \"last_name\": \"User\",\n \"phone_number\": \"+12313803556\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"East US\",\n });\n\n var exampleMonitor = new Azure.NewRelic.Monitor(\"example\", new()\n {\n Name = \"example-nrm\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Plan = new Azure.NewRelic.Inputs.MonitorPlanArgs\n {\n EffectiveDate = \"2023-06-06T00:00:00Z\",\n },\n User = new Azure.NewRelic.Inputs.MonitorUserArgs\n {\n Email = \"user@example.com\",\n FirstName = \"Example\",\n LastName = \"User\",\n PhoneNumber = \"+12313803556\",\n },\n Identity = new Azure.NewRelic.Inputs.MonitorIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/newrelic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"East US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = newrelic.NewMonitor(ctx, \"example\", \u0026newrelic.MonitorArgs{\n\t\t\tName: pulumi.String(\"example-nrm\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tPlan: \u0026newrelic.MonitorPlanArgs{\n\t\t\t\tEffectiveDate: pulumi.String(\"2023-06-06T00:00:00Z\"),\n\t\t\t},\n\t\t\tUser: \u0026newrelic.MonitorUserArgs{\n\t\t\t\tEmail: pulumi.String(\"user@example.com\"),\n\t\t\t\tFirstName: pulumi.String(\"Example\"),\n\t\t\t\tLastName: pulumi.String(\"User\"),\n\t\t\t\tPhoneNumber: pulumi.String(\"+12313803556\"),\n\t\t\t},\n\t\t\tIdentity: \u0026newrelic.MonitorIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.newrelic.Monitor;\nimport com.pulumi.azure.newrelic.MonitorArgs;\nimport com.pulumi.azure.newrelic.inputs.MonitorPlanArgs;\nimport com.pulumi.azure.newrelic.inputs.MonitorUserArgs;\nimport com.pulumi.azure.newrelic.inputs.MonitorIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"East US\")\n .build());\n\n var exampleMonitor = new Monitor(\"exampleMonitor\", MonitorArgs.builder()\n .name(\"example-nrm\")\n .resourceGroupName(example.name())\n .location(example.location())\n .plan(MonitorPlanArgs.builder()\n .effectiveDate(\"2023-06-06T00:00:00Z\")\n .build())\n .user(MonitorUserArgs.builder()\n .email(\"user@example.com\")\n .firstName(\"Example\")\n .lastName(\"User\")\n .phoneNumber(\"+12313803556\")\n .build())\n .identity(MonitorIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: East US\n exampleMonitor:\n type: azure:newrelic:Monitor\n name: example\n properties:\n name: example-nrm\n resourceGroupName: ${example.name}\n location: ${example.location}\n plan:\n effectiveDate: 2023-06-06T00:00:00Z\n user:\n email: user@example.com\n firstName: Example\n lastName: User\n phoneNumber: '+12313803556'\n identity:\n type: SystemAssigned\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Role Assignment\n\nTo enable metrics flow, perform role assignment on the identity created above. `Monitoring reader(43d0d8ad-25c7-4714-9337-8ba259a9fe05)` role is required .\n\n### Role assignment on the monitor created\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst monitoringReader = azure.authorization.getRoleDefinition({\n name: \"Monitoring Reader\",\n});\nconst example = new azure.authorization.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: Promise.all([primary, monitoringReader]).then(([primary, monitoringReader]) =\u003e `${primary.id}${monitoringReader.id}`),\n principalId: exampleAzurermNewRelicMonitor.identity[0].principalId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nmonitoring_reader = azure.authorization.get_role_definition(name=\"Monitoring Reader\")\nexample = azure.authorization.Assignment(\"example\",\n scope=primary.id,\n role_definition_id=f\"{primary.id}{monitoring_reader.id}\",\n principal_id=example_azurerm_new_relic_monitor[\"identity\"][0][\"principalId\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var monitoringReader = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Monitoring Reader\",\n });\n\n var example = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = Output.Tuple(primary, monitoringReader).Apply(values =\u003e\n {\n var primary = values.Item1;\n var monitoringReader = values.Item2;\n return $\"{primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id)}{monitoringReader.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id)}\";\n }),\n PrincipalId = exampleAzurermNewRelicMonitor.Identity[0].PrincipalId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmonitoringReader, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Monitoring Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: pulumi.Sprintf(\"%v%v\", primary.Id, monitoringReader.Id),\n\t\t\tPrincipalId: pulumi.Any(exampleAzurermNewRelicMonitor.Identity[0].PrincipalId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var monitoringReader = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Monitoring Reader\")\n .build());\n\n var example = new Assignment(\"example\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(String.format(\"%s%s\", primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()),monitoringReader.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())))\n .principalId(exampleAzurermNewRelicMonitor.identity()[0].principalId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:authorization:Assignment\n properties:\n scope: ${primary.id}\n roleDefinitionId: ${primary.id}${monitoringReader.id}\n principalId: ${exampleAzurermNewRelicMonitor.identity[0].principalId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n monitoringReader:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Monitoring Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAzure Native New Relic Monitor can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:newrelic/monitor:Monitor example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/NewRelic.Observability/monitors/monitor1\n```\n\n", "properties": { "accountCreationSource": { "type": "string", @@ -230658,7 +230658,7 @@ } }, "azure:nginx/certificate:Certificate": { - "description": "Manages a Certificate for an NGINX Deployment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst examplePublicIp = new azure.network.PublicIp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n allocationMethod: \"Static\",\n sku: \"Standard\",\n tags: {\n environment: \"Production\",\n },\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.0.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.2.0/24\"],\n delegations: [{\n name: \"delegation\",\n serviceDelegation: {\n name: \"NGINX.NGINXPLUS/nginxDeployments\",\n actions: [\"Microsoft.Network/virtualNetworks/subnets/join/action\"],\n },\n }],\n});\nconst exampleDeployment = new azure.nginx.Deployment(\"example\", {\n name: \"example-nginx\",\n resourceGroupName: example.name,\n sku: \"publicpreview_Monthly_gmz7xq9ge3py\",\n location: example.location,\n managedResourceGroup: \"example\",\n diagnoseSupportEnabled: true,\n frontendPublic: {\n ipAddresses: [examplePublicIp.id],\n },\n networkInterfaces: [{\n subnetId: exampleSubnet.id,\n }],\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\nconst exampleCertificate2 = new azure.nginx.Certificate(\"example\", {\n name: \"examplecert\",\n nginxDeploymentId: exampleDeployment.id,\n keyVirtualPath: \"/src/cert/soservermekey.key\",\n certificateVirtualPath: \"/src/cert/server.cert\",\n keyVaultSecretId: exampleCertificate.secretId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\nexample_public_ip = azure.network.PublicIp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n allocation_method=\"Static\",\n sku=\"Standard\",\n tags={\n \"environment\": \"Production\",\n })\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.0.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.2.0/24\"],\n delegations=[{\n \"name\": \"delegation\",\n \"service_delegation\": {\n \"name\": \"NGINX.NGINXPLUS/nginxDeployments\",\n \"actions\": [\"Microsoft.Network/virtualNetworks/subnets/join/action\"],\n },\n }])\nexample_deployment = azure.nginx.Deployment(\"example\",\n name=\"example-nginx\",\n resource_group_name=example.name,\n sku=\"publicpreview_Monthly_gmz7xq9ge3py\",\n location=example.location,\n managed_resource_group=\"example\",\n diagnose_support_enabled=True,\n frontend_public={\n \"ip_addresses\": [example_public_ip.id],\n },\n network_interfaces=[{\n \"subnet_id\": example_subnet.id,\n }])\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\nexample_certificate2 = azure.nginx.Certificate(\"example\",\n name=\"examplecert\",\n nginx_deployment_id=example_deployment.id,\n key_virtual_path=\"/src/cert/soservermekey.key\",\n certificate_virtual_path=\"/src/cert/server.cert\",\n key_vault_secret_id=example_certificate.secret_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var examplePublicIp = new Azure.Network.PublicIp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AllocationMethod = \"Static\",\n Sku = \"Standard\",\n Tags = \n {\n { \"environment\", \"Production\" },\n },\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.2.0/24\",\n },\n Delegations = new[]\n {\n new Azure.Network.Inputs.SubnetDelegationArgs\n {\n Name = \"delegation\",\n ServiceDelegation = new Azure.Network.Inputs.SubnetDelegationServiceDelegationArgs\n {\n Name = \"NGINX.NGINXPLUS/nginxDeployments\",\n Actions = new[]\n {\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n },\n },\n },\n },\n });\n\n var exampleDeployment = new Azure.Nginx.Deployment(\"example\", new()\n {\n Name = \"example-nginx\",\n ResourceGroupName = example.Name,\n Sku = \"publicpreview_Monthly_gmz7xq9ge3py\",\n Location = example.Location,\n ManagedResourceGroup = \"example\",\n DiagnoseSupportEnabled = true,\n FrontendPublic = new Azure.Nginx.Inputs.DeploymentFrontendPublicArgs\n {\n IpAddresses = new[]\n {\n examplePublicIp.Id,\n },\n },\n NetworkInterfaces = new[]\n {\n new Azure.Nginx.Inputs.DeploymentNetworkInterfaceArgs\n {\n SubnetId = exampleSubnet.Id,\n },\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n var exampleCertificate2 = new Azure.Nginx.Certificate(\"example\", new()\n {\n Name = \"examplecert\",\n NginxDeploymentId = exampleDeployment.Id,\n KeyVirtualPath = \"/src/cert/soservermekey.key\",\n CertificateVirtualPath = \"/src/cert/server.cert\",\n KeyVaultSecretId = exampleCertificate.SecretId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/nginx\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePublicIp, err := network.NewPublicIp(ctx, \"example\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.2.0/24\"),\n\t\t\t},\n\t\t\tDelegations: network.SubnetDelegationArray{\n\t\t\t\t\u0026network.SubnetDelegationArgs{\n\t\t\t\t\tName: pulumi.String(\"delegation\"),\n\t\t\t\t\tServiceDelegation: \u0026network.SubnetDelegationServiceDelegationArgs{\n\t\t\t\t\t\tName: pulumi.String(\"NGINX.NGINXPLUS/nginxDeployments\"),\n\t\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/join/action\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDeployment, err := nginx.NewDeployment(ctx, \"example\", \u0026nginx.DeploymentArgs{\n\t\t\tName: pulumi.String(\"example-nginx\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"publicpreview_Monthly_gmz7xq9ge3py\"),\n\t\t\tLocation: example.Location,\n\t\t\tManagedResourceGroup: pulumi.String(\"example\"),\n\t\t\tDiagnoseSupportEnabled: pulumi.Bool(true),\n\t\t\tFrontendPublic: \u0026nginx.DeploymentFrontendPublicArgs{\n\t\t\t\tIpAddresses: pulumi.StringArray{\n\t\t\t\t\texamplePublicIp.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tNetworkInterfaces: nginx.DeploymentNetworkInterfaceArray{\n\t\t\t\t\u0026nginx.DeploymentNetworkInterfaceArgs{\n\t\t\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = nginx.NewCertificate(ctx, \"example\", \u0026nginx.CertificateArgs{\n\t\t\tName: pulumi.String(\"examplecert\"),\n\t\t\tNginxDeploymentId: exampleDeployment.ID(),\n\t\t\tKeyVirtualPath: pulumi.String(\"/src/cert/soservermekey.key\"),\n\t\t\tCertificateVirtualPath: pulumi.String(\"/src/cert/server.cert\"),\n\t\t\tKeyVaultSecretId: exampleCertificate.SecretId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationServiceDelegationArgs;\nimport com.pulumi.azure.nginx.Deployment;\nimport com.pulumi.azure.nginx.DeploymentArgs;\nimport com.pulumi.azure.nginx.inputs.DeploymentFrontendPublicArgs;\nimport com.pulumi.azure.nginx.inputs.DeploymentNetworkInterfaceArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.nginx.Certificate;\nimport com.pulumi.azure.nginx.CertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n var examplePublicIp = new PublicIp(\"examplePublicIp\", PublicIpArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .allocationMethod(\"Static\")\n .sku(\"Standard\")\n .tags(Map.of(\"environment\", \"Production\"))\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.0.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.2.0/24\")\n .delegations(SubnetDelegationArgs.builder()\n .name(\"delegation\")\n .serviceDelegation(SubnetDelegationServiceDelegationArgs.builder()\n .name(\"NGINX.NGINXPLUS/nginxDeployments\")\n .actions(\"Microsoft.Network/virtualNetworks/subnets/join/action\")\n .build())\n .build())\n .build());\n\n var exampleDeployment = new Deployment(\"exampleDeployment\", DeploymentArgs.builder()\n .name(\"example-nginx\")\n .resourceGroupName(example.name())\n .sku(\"publicpreview_Monthly_gmz7xq9ge3py\")\n .location(example.location())\n .managedResourceGroup(\"example\")\n .diagnoseSupportEnabled(true)\n .frontendPublic(DeploymentFrontendPublicArgs.builder()\n .ipAddresses(examplePublicIp.id())\n .build())\n .networkInterfaces(DeploymentNetworkInterfaceArgs.builder()\n .subnetId(exampleSubnet.id())\n .build())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n var exampleCertificate2 = new Certificate(\"exampleCertificate2\", CertificateArgs.builder()\n .name(\"examplecert\")\n .nginxDeploymentId(exampleDeployment.id())\n .keyVirtualPath(\"/src/cert/soservermekey.key\")\n .certificateVirtualPath(\"/src/cert/server.cert\")\n .keyVaultSecretId(exampleCertificate.secretId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n examplePublicIp:\n type: azure:network:PublicIp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n allocationMethod: Static\n sku: Standard\n tags:\n environment: Production\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.0.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.2.0/24\n delegations:\n - name: delegation\n serviceDelegation:\n name: NGINX.NGINXPLUS/nginxDeployments\n actions:\n - Microsoft.Network/virtualNetworks/subnets/join/action\n exampleDeployment:\n type: azure:nginx:Deployment\n name: example\n properties:\n name: example-nginx\n resourceGroupName: ${example.name}\n sku: publicpreview_Monthly_gmz7xq9ge3py\n location: ${example.location}\n managedResourceGroup: example\n diagnoseSupportEnabled: true\n frontendPublic:\n ipAddresses:\n - ${examplePublicIp.id}\n networkInterfaces:\n - subnetId: ${exampleSubnet.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - SetIssuers\n - Update\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\n exampleCertificate2:\n type: azure:nginx:Certificate\n name: example\n properties:\n name: examplecert\n nginxDeploymentId: ${exampleDeployment.id}\n keyVirtualPath: /src/cert/soservermekey.key\n certificateVirtualPath: /src/cert/server.cert\n keyVaultSecretId: ${exampleCertificate.secretId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn NGINX Certificate can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:nginx/certificate:Certificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Nginx.NginxPlus/nginxDeployments/deploy1/certificates/cer1\n```\n\n", + "description": "Manages a Certificate for an NGINX Deployment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-rg\",\n location: \"West Europe\",\n});\nconst examplePublicIp = new azure.network.PublicIp(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n allocationMethod: \"Static\",\n sku: \"Standard\",\n tags: {\n environment: \"Production\",\n },\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.0.0.0/16\"],\n location: example.location,\n resourceGroupName: example.name,\n});\nconst exampleSubnet = new azure.network.Subnet(\"example\", {\n name: \"example-subnet\",\n resourceGroupName: example.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.2.0/24\"],\n delegations: [{\n name: \"delegation\",\n serviceDelegation: {\n name: \"NGINX.NGINXPLUS/nginxDeployments\",\n actions: [\"Microsoft.Network/virtualNetworks/subnets/join/action\"],\n },\n }],\n});\nconst exampleDeployment = new azure.nginx.Deployment(\"example\", {\n name: \"example-nginx\",\n resourceGroupName: example.name,\n sku: \"publicpreview_Monthly_gmz7xq9ge3py\",\n location: example.location,\n managedResourceGroup: \"example\",\n diagnoseSupportEnabled: true,\n frontendPublic: {\n ipAddresses: [examplePublicIp.id],\n },\n networkInterfaces: [{\n subnetId: exampleSubnet.id,\n }],\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n }],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\nconst exampleCertificate2 = new azure.nginx.Certificate(\"example\", {\n name: \"examplecert\",\n nginxDeploymentId: exampleDeployment.id,\n keyVirtualPath: \"/src/cert/soservermekey.key\",\n certificateVirtualPath: \"/src/cert/server.cert\",\n keyVaultSecretId: exampleCertificate.secretId,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-rg\",\n location=\"West Europe\")\nexample_public_ip = azure.network.PublicIp(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n allocation_method=\"Static\",\n sku=\"Standard\",\n tags={\n \"environment\": \"Production\",\n })\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.0.0.0/16\"],\n location=example.location,\n resource_group_name=example.name)\nexample_subnet = azure.network.Subnet(\"example\",\n name=\"example-subnet\",\n resource_group_name=example.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.2.0/24\"],\n delegations=[{\n \"name\": \"delegation\",\n \"service_delegation\": {\n \"name\": \"NGINX.NGINXPLUS/nginxDeployments\",\n \"actions\": [\"Microsoft.Network/virtualNetworks/subnets/join/action\"],\n },\n }])\nexample_deployment = azure.nginx.Deployment(\"example\",\n name=\"example-nginx\",\n resource_group_name=example.name,\n sku=\"publicpreview_Monthly_gmz7xq9ge3py\",\n location=example.location,\n managed_resource_group=\"example\",\n diagnose_support_enabled=True,\n frontend_public={\n \"ip_addresses\": [example_public_ip.id],\n },\n network_interfaces=[{\n \"subnet_id\": example_subnet.id,\n }])\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n ],\n }])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\nexample_certificate2 = azure.nginx.Certificate(\"example\",\n name=\"examplecert\",\n nginx_deployment_id=example_deployment.id,\n key_virtual_path=\"/src/cert/soservermekey.key\",\n certificate_virtual_path=\"/src/cert/server.cert\",\n key_vault_secret_id=example_certificate.secret_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-rg\",\n Location = \"West Europe\",\n });\n\n var examplePublicIp = new Azure.Network.PublicIp(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AllocationMethod = \"Static\",\n Sku = \"Standard\",\n Tags = \n {\n { \"environment\", \"Production\" },\n },\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.0.0.0/16\",\n },\n Location = example.Location,\n ResourceGroupName = example.Name,\n });\n\n var exampleSubnet = new Azure.Network.Subnet(\"example\", new()\n {\n Name = \"example-subnet\",\n ResourceGroupName = example.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.2.0/24\",\n },\n Delegations = new[]\n {\n new Azure.Network.Inputs.SubnetDelegationArgs\n {\n Name = \"delegation\",\n ServiceDelegation = new Azure.Network.Inputs.SubnetDelegationServiceDelegationArgs\n {\n Name = \"NGINX.NGINXPLUS/nginxDeployments\",\n Actions = new[]\n {\n \"Microsoft.Network/virtualNetworks/subnets/join/action\",\n },\n },\n },\n },\n });\n\n var exampleDeployment = new Azure.Nginx.Deployment(\"example\", new()\n {\n Name = \"example-nginx\",\n ResourceGroupName = example.Name,\n Sku = \"publicpreview_Monthly_gmz7xq9ge3py\",\n Location = example.Location,\n ManagedResourceGroup = \"example\",\n DiagnoseSupportEnabled = true,\n FrontendPublic = new Azure.Nginx.Inputs.DeploymentFrontendPublicArgs\n {\n IpAddresses = new[]\n {\n examplePublicIp.Id,\n },\n },\n NetworkInterfaces = new[]\n {\n new Azure.Nginx.Inputs.DeploymentNetworkInterfaceArgs\n {\n SubnetId = exampleSubnet.Id,\n },\n },\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n var exampleCertificate2 = new Azure.Nginx.Certificate(\"example\", new()\n {\n Name = \"examplecert\",\n NginxDeploymentId = exampleDeployment.Id,\n KeyVirtualPath = \"/src/cert/soservermekey.key\",\n CertificateVirtualPath = \"/src/cert/server.cert\",\n KeyVaultSecretId = exampleCertificate.SecretId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/nginx\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-rg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texamplePublicIp, err := network.NewPublicIp(ctx, \"example\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"Production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t},\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleSubnet, err := network.NewSubnet(ctx, \"example\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"example-subnet\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.2.0/24\"),\n\t\t\t},\n\t\t\tDelegations: network.SubnetDelegationArray{\n\t\t\t\t\u0026network.SubnetDelegationArgs{\n\t\t\t\t\tName: pulumi.String(\"delegation\"),\n\t\t\t\t\tServiceDelegation: \u0026network.SubnetDelegationServiceDelegationArgs{\n\t\t\t\t\t\tName: pulumi.String(\"NGINX.NGINXPLUS/nginxDeployments\"),\n\t\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"Microsoft.Network/virtualNetworks/subnets/join/action\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDeployment, err := nginx.NewDeployment(ctx, \"example\", \u0026nginx.DeploymentArgs{\n\t\t\tName: pulumi.String(\"example-nginx\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"publicpreview_Monthly_gmz7xq9ge3py\"),\n\t\t\tLocation: example.Location,\n\t\t\tManagedResourceGroup: pulumi.String(\"example\"),\n\t\t\tDiagnoseSupportEnabled: pulumi.Bool(true),\n\t\t\tFrontendPublic: \u0026nginx.DeploymentFrontendPublicArgs{\n\t\t\t\tIpAddresses: pulumi.StringArray{\n\t\t\t\t\texamplePublicIp.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t\tNetworkInterfaces: nginx.DeploymentNetworkInterfaceArray{\n\t\t\t\t\u0026nginx.DeploymentNetworkInterfaceArgs{\n\t\t\t\t\tSubnetId: exampleSubnet.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\t\t\tpulumi.String(\"DeleteIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"GetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Import\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t\tpulumi.String(\"ListIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t\tpulumi.String(\"ManageIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"SetIssuers\"),\n\t\t\t\t\t\tpulumi.String(\"Update\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = nginx.NewCertificate(ctx, \"example\", \u0026nginx.CertificateArgs{\n\t\t\tName: pulumi.String(\"examplecert\"),\n\t\t\tNginxDeploymentId: exampleDeployment.ID(),\n\t\t\tKeyVirtualPath: pulumi.String(\"/src/cert/soservermekey.key\"),\n\t\t\tCertificateVirtualPath: pulumi.String(\"/src/cert/server.cert\"),\n\t\t\tKeyVaultSecretId: exampleCertificate.SecretId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationArgs;\nimport com.pulumi.azure.network.inputs.SubnetDelegationServiceDelegationArgs;\nimport com.pulumi.azure.nginx.Deployment;\nimport com.pulumi.azure.nginx.DeploymentArgs;\nimport com.pulumi.azure.nginx.inputs.DeploymentFrontendPublicArgs;\nimport com.pulumi.azure.nginx.inputs.DeploymentNetworkInterfaceArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.nginx.Certificate;\nimport com.pulumi.azure.nginx.CertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-rg\")\n .location(\"West Europe\")\n .build());\n\n var examplePublicIp = new PublicIp(\"examplePublicIp\", PublicIpArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .allocationMethod(\"Static\")\n .sku(\"Standard\")\n .tags(Map.of(\"environment\", \"Production\"))\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.0.0.0/16\")\n .location(example.location())\n .resourceGroupName(example.name())\n .build());\n\n var exampleSubnet = new Subnet(\"exampleSubnet\", SubnetArgs.builder()\n .name(\"example-subnet\")\n .resourceGroupName(example.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.2.0/24\")\n .delegations(SubnetDelegationArgs.builder()\n .name(\"delegation\")\n .serviceDelegation(SubnetDelegationServiceDelegationArgs.builder()\n .name(\"NGINX.NGINXPLUS/nginxDeployments\")\n .actions(\"Microsoft.Network/virtualNetworks/subnets/join/action\")\n .build())\n .build())\n .build());\n\n var exampleDeployment = new Deployment(\"exampleDeployment\", DeploymentArgs.builder()\n .name(\"example-nginx\")\n .resourceGroupName(example.name())\n .sku(\"publicpreview_Monthly_gmz7xq9ge3py\")\n .location(example.location())\n .managedResourceGroup(\"example\")\n .diagnoseSupportEnabled(true)\n .frontendPublic(DeploymentFrontendPublicArgs.builder()\n .ipAddresses(examplePublicIp.id())\n .build())\n .networkInterfaces(DeploymentNetworkInterfaceArgs.builder()\n .subnetId(exampleSubnet.id())\n .build())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Delete\",\n \"DeleteIssuers\",\n \"Get\",\n \"GetIssuers\",\n \"Import\",\n \"List\",\n \"ListIssuers\",\n \"ManageContacts\",\n \"ManageIssuers\",\n \"SetIssuers\",\n \"Update\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n var exampleCertificate2 = new Certificate(\"exampleCertificate2\", CertificateArgs.builder()\n .name(\"examplecert\")\n .nginxDeploymentId(exampleDeployment.id())\n .keyVirtualPath(\"/src/cert/soservermekey.key\")\n .certificateVirtualPath(\"/src/cert/server.cert\")\n .keyVaultSecretId(exampleCertificate.secretId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-rg\n location: West Europe\n examplePublicIp:\n type: azure:network:PublicIp\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n allocationMethod: Static\n sku: Standard\n tags:\n environment: Production\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.0.0.0/16\n location: ${example.location}\n resourceGroupName: ${example.name}\n exampleSubnet:\n type: azure:network:Subnet\n name: example\n properties:\n name: example-subnet\n resourceGroupName: ${example.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.2.0/24\n delegations:\n - name: delegation\n serviceDelegation:\n name: NGINX.NGINXPLUS/nginxDeployments\n actions:\n - Microsoft.Network/virtualNetworks/subnets/join/action\n exampleDeployment:\n type: azure:nginx:Deployment\n name: example\n properties:\n name: example-nginx\n resourceGroupName: ${example.name}\n sku: publicpreview_Monthly_gmz7xq9ge3py\n location: ${example.location}\n managedResourceGroup: example\n diagnoseSupportEnabled: true\n frontendPublic:\n ipAddresses:\n - ${examplePublicIp.id}\n networkInterfaces:\n - subnetId: ${exampleSubnet.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Delete\n - DeleteIssuers\n - Get\n - GetIssuers\n - Import\n - List\n - ListIssuers\n - ManageContacts\n - ManageIssuers\n - SetIssuers\n - Update\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\n exampleCertificate2:\n type: azure:nginx:Certificate\n name: example\n properties:\n name: examplecert\n nginxDeploymentId: ${exampleDeployment.id}\n keyVirtualPath: /src/cert/soservermekey.key\n certificateVirtualPath: /src/cert/server.cert\n keyVaultSecretId: ${exampleCertificate.secretId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAn NGINX Certificate can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:nginx/certificate:Certificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Nginx.NginxPlus/nginxDeployments/deploy1/certificates/cer1\n```\n\n", "properties": { "certificateVirtualPath": { "type": "string", @@ -233961,7 +233961,7 @@ } }, "azure:pim/activeRoleAssignment:ActiveRoleAssignment": { - "description": "Manages a PIM Active Role Assignment.\n\n## Example Usage\n\n### Subscription)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as time from \"@pulumiverse/time\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleGetRoleDefinition = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleStatic = new time.Static(\"example\", {});\nconst exampleActiveRoleAssignment = new azure.pim.ActiveRoleAssignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: Promise.all([primary, exampleGetRoleDefinition]).then(([primary, exampleGetRoleDefinition]) =\u003e `${primary.id}${exampleGetRoleDefinition.id}`),\n principalId: example.then(example =\u003e example.objectId),\n schedule: {\n startDateTime: exampleStatic.rfc3339,\n expiration: {\n durationHours: 8,\n },\n },\n justification: \"Expiration Duration Set\",\n ticket: {\n number: \"1\",\n system: \"example ticket system\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumiverse_time as time\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_get_role_definition = azure.authorization.get_role_definition(name=\"Reader\")\nexample_static = time.Static(\"example\")\nexample_active_role_assignment = azure.pim.ActiveRoleAssignment(\"example\",\n scope=primary.id,\n role_definition_id=f\"{primary.id}{example_get_role_definition.id}\",\n principal_id=example.object_id,\n schedule={\n \"start_date_time\": example_static.rfc3339,\n \"expiration\": {\n \"duration_hours\": 8,\n },\n },\n justification=\"Expiration Duration Set\",\n ticket={\n \"number\": \"1\",\n \"system\": \"example ticket system\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Time = Pulumiverse.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetRoleDefinition = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleStatic = new Time.Static(\"example\");\n\n var exampleActiveRoleAssignment = new Azure.Pim.ActiveRoleAssignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = Output.Tuple(primary, exampleGetRoleDefinition).Apply(values =\u003e\n {\n var primary = values.Item1;\n var exampleGetRoleDefinition = values.Item2;\n return $\"{primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id)}{exampleGetRoleDefinition.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id)}\";\n }),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Schedule = new Azure.Pim.Inputs.ActiveRoleAssignmentScheduleArgs\n {\n StartDateTime = exampleStatic.Rfc3339,\n Expiration = new Azure.Pim.Inputs.ActiveRoleAssignmentScheduleExpirationArgs\n {\n DurationHours = 8,\n },\n },\n Justification = \"Expiration Duration Set\",\n Ticket = new Azure.Pim.Inputs.ActiveRoleAssignmentTicketArgs\n {\n Number = \"1\",\n System = \"example ticket system\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/pim\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumiverse/pulumi-time/sdk/go/time\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetRoleDefinition, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStatic, err := time.NewStatic(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = pim.NewActiveRoleAssignment(ctx, \"example\", \u0026pim.ActiveRoleAssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: pulumi.Sprintf(\"%v%v\", primary.Id, exampleGetRoleDefinition.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tSchedule: \u0026pim.ActiveRoleAssignmentScheduleArgs{\n\t\t\t\tStartDateTime: exampleStatic.Rfc3339,\n\t\t\t\tExpiration: \u0026pim.ActiveRoleAssignmentScheduleExpirationArgs{\n\t\t\t\t\tDurationHours: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tJustification: pulumi.String(\"Expiration Duration Set\"),\n\t\t\tTicket: \u0026pim.ActiveRoleAssignmentTicketArgs{\n\t\t\t\tNumber: pulumi.String(\"1\"),\n\t\t\t\tSystem: pulumi.String(\"example ticket system\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.time.Static;\nimport com.pulumi.azure.pim.ActiveRoleAssignment;\nimport com.pulumi.azure.pim.ActiveRoleAssignmentArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentScheduleArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentScheduleExpirationArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentTicketArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetRoleDefinition = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleStatic = new Static(\"exampleStatic\");\n\n var exampleActiveRoleAssignment = new ActiveRoleAssignment(\"exampleActiveRoleAssignment\", ActiveRoleAssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(String.format(\"%s%s\", primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()),exampleGetRoleDefinition.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .schedule(ActiveRoleAssignmentScheduleArgs.builder()\n .startDateTime(exampleStatic.rfc3339())\n .expiration(ActiveRoleAssignmentScheduleExpirationArgs.builder()\n .durationHours(8)\n .build())\n .build())\n .justification(\"Expiration Duration Set\")\n .ticket(ActiveRoleAssignmentTicketArgs.builder()\n .number(\"1\")\n .system(\"example ticket system\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleStatic:\n type: time:Static\n name: example\n exampleActiveRoleAssignment:\n type: azure:pim:ActiveRoleAssignment\n name: example\n properties:\n scope: ${primary.id}\n roleDefinitionId: ${primary.id}${exampleGetRoleDefinition.id}\n principalId: ${example.objectId}\n schedule:\n startDateTime: ${exampleStatic.rfc3339}\n expiration:\n durationHours: 8\n justification: Expiration Duration Set\n ticket:\n number: '1'\n system: example ticket system\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetRoleDefinition:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Management Group)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as time from \"@pulumiverse/time\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleGetRoleDefinition = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleGroup = new azure.management.Group(\"example\", {name: \"Example-Management-Group\"});\nconst exampleStatic = new time.Static(\"example\", {});\nconst exampleActiveRoleAssignment = new azure.pim.ActiveRoleAssignment(\"example\", {\n scope: exampleGroup.id,\n roleDefinitionId: exampleGetRoleDefinition.then(exampleGetRoleDefinition =\u003e exampleGetRoleDefinition.id),\n principalId: example.then(example =\u003e example.objectId),\n schedule: {\n startDateTime: exampleStatic.rfc3339,\n expiration: {\n durationHours: 8,\n },\n },\n justification: \"Expiration Duration Set\",\n ticket: {\n number: \"1\",\n system: \"example ticket system\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumiverse_time as time\n\nexample = azure.core.get_client_config()\nexample_get_role_definition = azure.authorization.get_role_definition(name=\"Reader\")\nexample_group = azure.management.Group(\"example\", name=\"Example-Management-Group\")\nexample_static = time.Static(\"example\")\nexample_active_role_assignment = azure.pim.ActiveRoleAssignment(\"example\",\n scope=example_group.id,\n role_definition_id=example_get_role_definition.id,\n principal_id=example.object_id,\n schedule={\n \"start_date_time\": example_static.rfc3339,\n \"expiration\": {\n \"duration_hours\": 8,\n },\n },\n justification=\"Expiration Duration Set\",\n ticket={\n \"number\": \"1\",\n \"system\": \"example ticket system\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Time = Pulumiverse.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetRoleDefinition = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleGroup = new Azure.Management.Group(\"example\", new()\n {\n Name = \"Example-Management-Group\",\n });\n\n var exampleStatic = new Time.Static(\"example\");\n\n var exampleActiveRoleAssignment = new Azure.Pim.ActiveRoleAssignment(\"example\", new()\n {\n Scope = exampleGroup.Id,\n RoleDefinitionId = exampleGetRoleDefinition.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Schedule = new Azure.Pim.Inputs.ActiveRoleAssignmentScheduleArgs\n {\n StartDateTime = exampleStatic.Rfc3339,\n Expiration = new Azure.Pim.Inputs.ActiveRoleAssignmentScheduleExpirationArgs\n {\n DurationHours = 8,\n },\n },\n Justification = \"Expiration Duration Set\",\n Ticket = new Azure.Pim.Inputs.ActiveRoleAssignmentTicketArgs\n {\n Number = \"1\",\n System = \"example ticket system\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/pim\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumiverse/pulumi-time/sdk/go/time\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetRoleDefinition, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGroup, err := management.NewGroup(ctx, \"example\", \u0026management.GroupArgs{\n\t\t\tName: pulumi.String(\"Example-Management-Group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStatic, err := time.NewStatic(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = pim.NewActiveRoleAssignment(ctx, \"example\", \u0026pim.ActiveRoleAssignmentArgs{\n\t\t\tScope: exampleGroup.ID(),\n\t\t\tRoleDefinitionId: pulumi.String(exampleGetRoleDefinition.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tSchedule: \u0026pim.ActiveRoleAssignmentScheduleArgs{\n\t\t\t\tStartDateTime: exampleStatic.Rfc3339,\n\t\t\t\tExpiration: \u0026pim.ActiveRoleAssignmentScheduleExpirationArgs{\n\t\t\t\t\tDurationHours: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tJustification: pulumi.String(\"Expiration Duration Set\"),\n\t\t\tTicket: \u0026pim.ActiveRoleAssignmentTicketArgs{\n\t\t\t\tNumber: pulumi.String(\"1\"),\n\t\t\t\tSystem: pulumi.String(\"example ticket system\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.management.GroupArgs;\nimport com.pulumi.time.Static;\nimport com.pulumi.azure.pim.ActiveRoleAssignment;\nimport com.pulumi.azure.pim.ActiveRoleAssignmentArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentScheduleArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentScheduleExpirationArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentTicketArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetRoleDefinition = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleGroup = new Group(\"exampleGroup\", GroupArgs.builder()\n .name(\"Example-Management-Group\")\n .build());\n\n var exampleStatic = new Static(\"exampleStatic\");\n\n var exampleActiveRoleAssignment = new ActiveRoleAssignment(\"exampleActiveRoleAssignment\", ActiveRoleAssignmentArgs.builder()\n .scope(exampleGroup.id())\n .roleDefinitionId(exampleGetRoleDefinition.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .schedule(ActiveRoleAssignmentScheduleArgs.builder()\n .startDateTime(exampleStatic.rfc3339())\n .expiration(ActiveRoleAssignmentScheduleExpirationArgs.builder()\n .durationHours(8)\n .build())\n .build())\n .justification(\"Expiration Duration Set\")\n .ticket(ActiveRoleAssignmentTicketArgs.builder()\n .number(\"1\")\n .system(\"example ticket system\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleGroup:\n type: azure:management:Group\n name: example\n properties:\n name: Example-Management-Group\n exampleStatic:\n type: time:Static\n name: example\n exampleActiveRoleAssignment:\n type: azure:pim:ActiveRoleAssignment\n name: example\n properties:\n scope: ${exampleGroup.id}\n roleDefinitionId: ${exampleGetRoleDefinition.id}\n principalId: ${example.objectId}\n schedule:\n startDateTime: ${exampleStatic.rfc3339}\n expiration:\n durationHours: 8\n justification: Expiration Duration Set\n ticket:\n number: '1'\n system: example ticket system\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetRoleDefinition:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPIM Active Role Assignments can be imported using the following composite resource ID, e.g.\n\n```sh\n$ pulumi import azure:pim/activeRoleAssignment:ActiveRoleAssignment example /subscriptions/00000000-0000-0000-0000-000000000000|/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/00000000-0000-0000-0000-000000000000|00000000-0000-0000-0000-000000000000\n```\n\n", + "description": "Manages a PIM Active Role Assignment.\n\n## Example Usage\n\n### Subscription)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as time from \"@pulumiverse/time\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleGetRoleDefinition = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleStatic = new time.Static(\"example\", {});\nconst exampleActiveRoleAssignment = new azure.pim.ActiveRoleAssignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: Promise.all([primary, exampleGetRoleDefinition]).then(([primary, exampleGetRoleDefinition]) =\u003e `${primary.id}${exampleGetRoleDefinition.id}`),\n principalId: example.then(example =\u003e example.objectId),\n schedule: {\n startDateTime: exampleStatic.rfc3339,\n expiration: {\n durationHours: 8,\n },\n },\n justification: \"Expiration Duration Set\",\n ticket: {\n number: \"1\",\n system: \"example ticket system\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumiverse_time as time\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_get_role_definition = azure.authorization.get_role_definition(name=\"Reader\")\nexample_static = time.Static(\"example\")\nexample_active_role_assignment = azure.pim.ActiveRoleAssignment(\"example\",\n scope=primary.id,\n role_definition_id=f\"{primary.id}{example_get_role_definition.id}\",\n principal_id=example.object_id,\n schedule={\n \"start_date_time\": example_static.rfc3339,\n \"expiration\": {\n \"duration_hours\": 8,\n },\n },\n justification=\"Expiration Duration Set\",\n ticket={\n \"number\": \"1\",\n \"system\": \"example ticket system\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Time = Pulumiverse.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetRoleDefinition = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleStatic = new Time.Static(\"example\");\n\n var exampleActiveRoleAssignment = new Azure.Pim.ActiveRoleAssignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = Output.Tuple(primary, exampleGetRoleDefinition).Apply(values =\u003e\n {\n var primary = values.Item1;\n var exampleGetRoleDefinition = values.Item2;\n return $\"{primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id)}{exampleGetRoleDefinition.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id)}\";\n }),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Schedule = new Azure.Pim.Inputs.ActiveRoleAssignmentScheduleArgs\n {\n StartDateTime = exampleStatic.Rfc3339,\n Expiration = new Azure.Pim.Inputs.ActiveRoleAssignmentScheduleExpirationArgs\n {\n DurationHours = 8,\n },\n },\n Justification = \"Expiration Duration Set\",\n Ticket = new Azure.Pim.Inputs.ActiveRoleAssignmentTicketArgs\n {\n Number = \"1\",\n System = \"example ticket system\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/pim\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumiverse/pulumi-time/sdk/go/time\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetRoleDefinition, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStatic, err := time.NewStatic(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = pim.NewActiveRoleAssignment(ctx, \"example\", \u0026pim.ActiveRoleAssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: pulumi.Sprintf(\"%v%v\", primary.Id, exampleGetRoleDefinition.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tSchedule: \u0026pim.ActiveRoleAssignmentScheduleArgs{\n\t\t\t\tStartDateTime: exampleStatic.Rfc3339,\n\t\t\t\tExpiration: \u0026pim.ActiveRoleAssignmentScheduleExpirationArgs{\n\t\t\t\t\tDurationHours: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tJustification: pulumi.String(\"Expiration Duration Set\"),\n\t\t\tTicket: \u0026pim.ActiveRoleAssignmentTicketArgs{\n\t\t\t\tNumber: pulumi.String(\"1\"),\n\t\t\t\tSystem: pulumi.String(\"example ticket system\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.time.Static;\nimport com.pulumi.azure.pim.ActiveRoleAssignment;\nimport com.pulumi.azure.pim.ActiveRoleAssignmentArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentScheduleArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentScheduleExpirationArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentTicketArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetRoleDefinition = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleStatic = new Static(\"exampleStatic\");\n\n var exampleActiveRoleAssignment = new ActiveRoleAssignment(\"exampleActiveRoleAssignment\", ActiveRoleAssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(String.format(\"%s%s\", primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()),exampleGetRoleDefinition.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .schedule(ActiveRoleAssignmentScheduleArgs.builder()\n .startDateTime(exampleStatic.rfc3339())\n .expiration(ActiveRoleAssignmentScheduleExpirationArgs.builder()\n .durationHours(8)\n .build())\n .build())\n .justification(\"Expiration Duration Set\")\n .ticket(ActiveRoleAssignmentTicketArgs.builder()\n .number(\"1\")\n .system(\"example ticket system\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleStatic:\n type: time:Static\n name: example\n exampleActiveRoleAssignment:\n type: azure:pim:ActiveRoleAssignment\n name: example\n properties:\n scope: ${primary.id}\n roleDefinitionId: ${primary.id}${exampleGetRoleDefinition.id}\n principalId: ${example.objectId}\n schedule:\n startDateTime: ${exampleStatic.rfc3339}\n expiration:\n durationHours: 8\n justification: Expiration Duration Set\n ticket:\n number: '1'\n system: example ticket system\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetRoleDefinition:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Management Group)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as time from \"@pulumiverse/time\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleGetRoleDefinition = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleGroup = new azure.management.Group(\"example\", {name: \"Example-Management-Group\"});\nconst exampleStatic = new time.Static(\"example\", {});\nconst exampleActiveRoleAssignment = new azure.pim.ActiveRoleAssignment(\"example\", {\n scope: exampleGroup.id,\n roleDefinitionId: exampleGetRoleDefinition.then(exampleGetRoleDefinition =\u003e exampleGetRoleDefinition.id),\n principalId: example.then(example =\u003e example.objectId),\n schedule: {\n startDateTime: exampleStatic.rfc3339,\n expiration: {\n durationHours: 8,\n },\n },\n justification: \"Expiration Duration Set\",\n ticket: {\n number: \"1\",\n system: \"example ticket system\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumiverse_time as time\n\nexample = azure.core.get_client_config()\nexample_get_role_definition = azure.authorization.get_role_definition(name=\"Reader\")\nexample_group = azure.management.Group(\"example\", name=\"Example-Management-Group\")\nexample_static = time.Static(\"example\")\nexample_active_role_assignment = azure.pim.ActiveRoleAssignment(\"example\",\n scope=example_group.id,\n role_definition_id=example_get_role_definition.id,\n principal_id=example.object_id,\n schedule={\n \"start_date_time\": example_static.rfc3339,\n \"expiration\": {\n \"duration_hours\": 8,\n },\n },\n justification=\"Expiration Duration Set\",\n ticket={\n \"number\": \"1\",\n \"system\": \"example ticket system\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Time = Pulumiverse.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetRoleDefinition = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleGroup = new Azure.Management.Group(\"example\", new()\n {\n Name = \"Example-Management-Group\",\n });\n\n var exampleStatic = new Time.Static(\"example\");\n\n var exampleActiveRoleAssignment = new Azure.Pim.ActiveRoleAssignment(\"example\", new()\n {\n Scope = exampleGroup.Id,\n RoleDefinitionId = exampleGetRoleDefinition.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Schedule = new Azure.Pim.Inputs.ActiveRoleAssignmentScheduleArgs\n {\n StartDateTime = exampleStatic.Rfc3339,\n Expiration = new Azure.Pim.Inputs.ActiveRoleAssignmentScheduleExpirationArgs\n {\n DurationHours = 8,\n },\n },\n Justification = \"Expiration Duration Set\",\n Ticket = new Azure.Pim.Inputs.ActiveRoleAssignmentTicketArgs\n {\n Number = \"1\",\n System = \"example ticket system\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/pim\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumiverse/pulumi-time/sdk/go/time\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetRoleDefinition, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGroup, err := management.NewGroup(ctx, \"example\", \u0026management.GroupArgs{\n\t\t\tName: pulumi.String(\"Example-Management-Group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStatic, err := time.NewStatic(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = pim.NewActiveRoleAssignment(ctx, \"example\", \u0026pim.ActiveRoleAssignmentArgs{\n\t\t\tScope: exampleGroup.ID(),\n\t\t\tRoleDefinitionId: pulumi.String(exampleGetRoleDefinition.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tSchedule: \u0026pim.ActiveRoleAssignmentScheduleArgs{\n\t\t\t\tStartDateTime: exampleStatic.Rfc3339,\n\t\t\t\tExpiration: \u0026pim.ActiveRoleAssignmentScheduleExpirationArgs{\n\t\t\t\t\tDurationHours: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tJustification: pulumi.String(\"Expiration Duration Set\"),\n\t\t\tTicket: \u0026pim.ActiveRoleAssignmentTicketArgs{\n\t\t\t\tNumber: pulumi.String(\"1\"),\n\t\t\t\tSystem: pulumi.String(\"example ticket system\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.management.GroupArgs;\nimport com.pulumi.time.Static;\nimport com.pulumi.azure.pim.ActiveRoleAssignment;\nimport com.pulumi.azure.pim.ActiveRoleAssignmentArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentScheduleArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentScheduleExpirationArgs;\nimport com.pulumi.azure.pim.inputs.ActiveRoleAssignmentTicketArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetRoleDefinition = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleGroup = new Group(\"exampleGroup\", GroupArgs.builder()\n .name(\"Example-Management-Group\")\n .build());\n\n var exampleStatic = new Static(\"exampleStatic\");\n\n var exampleActiveRoleAssignment = new ActiveRoleAssignment(\"exampleActiveRoleAssignment\", ActiveRoleAssignmentArgs.builder()\n .scope(exampleGroup.id())\n .roleDefinitionId(exampleGetRoleDefinition.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .schedule(ActiveRoleAssignmentScheduleArgs.builder()\n .startDateTime(exampleStatic.rfc3339())\n .expiration(ActiveRoleAssignmentScheduleExpirationArgs.builder()\n .durationHours(8)\n .build())\n .build())\n .justification(\"Expiration Duration Set\")\n .ticket(ActiveRoleAssignmentTicketArgs.builder()\n .number(\"1\")\n .system(\"example ticket system\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleGroup:\n type: azure:management:Group\n name: example\n properties:\n name: Example-Management-Group\n exampleStatic:\n type: time:Static\n name: example\n exampleActiveRoleAssignment:\n type: azure:pim:ActiveRoleAssignment\n name: example\n properties:\n scope: ${exampleGroup.id}\n roleDefinitionId: ${exampleGetRoleDefinition.id}\n principalId: ${example.objectId}\n schedule:\n startDateTime: ${exampleStatic.rfc3339}\n expiration:\n durationHours: 8\n justification: Expiration Duration Set\n ticket:\n number: '1'\n system: example ticket system\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetRoleDefinition:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPIM Active Role Assignments can be imported using the following composite resource ID, e.g.\n\n```sh\n$ pulumi import azure:pim/activeRoleAssignment:ActiveRoleAssignment example /subscriptions/00000000-0000-0000-0000-000000000000|/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/00000000-0000-0000-0000-000000000000|00000000-0000-0000-0000-000000000000\n```\n\n", "properties": { "justification": { "type": "string", @@ -234080,7 +234080,7 @@ } }, "azure:pim/eligibleRoleAssignment:EligibleRoleAssignment": { - "description": "Manages a PIM Eligible Role Assignment.\n\n## Example Usage\n\n### Subscription)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as time from \"@pulumiverse/time\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleGetRoleDefinition = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleStatic = new time.Static(\"example\", {});\nconst exampleEligibleRoleAssignment = new azure.pim.EligibleRoleAssignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: Promise.all([primary, exampleGetRoleDefinition]).then(([primary, exampleGetRoleDefinition]) =\u003e `${primary.id}${exampleGetRoleDefinition.id}`),\n principalId: example.then(example =\u003e example.objectId),\n schedule: {\n startDateTime: exampleStatic.rfc3339,\n expiration: {\n durationHours: 8,\n },\n },\n justification: \"Expiration Duration Set\",\n ticket: {\n number: \"1\",\n system: \"example ticket system\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumiverse_time as time\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_get_role_definition = azure.authorization.get_role_definition(name=\"Reader\")\nexample_static = time.Static(\"example\")\nexample_eligible_role_assignment = azure.pim.EligibleRoleAssignment(\"example\",\n scope=primary.id,\n role_definition_id=f\"{primary.id}{example_get_role_definition.id}\",\n principal_id=example.object_id,\n schedule={\n \"start_date_time\": example_static.rfc3339,\n \"expiration\": {\n \"duration_hours\": 8,\n },\n },\n justification=\"Expiration Duration Set\",\n ticket={\n \"number\": \"1\",\n \"system\": \"example ticket system\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Time = Pulumiverse.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetRoleDefinition = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleStatic = new Time.Static(\"example\");\n\n var exampleEligibleRoleAssignment = new Azure.Pim.EligibleRoleAssignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = Output.Tuple(primary, exampleGetRoleDefinition).Apply(values =\u003e\n {\n var primary = values.Item1;\n var exampleGetRoleDefinition = values.Item2;\n return $\"{primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id)}{exampleGetRoleDefinition.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id)}\";\n }),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Schedule = new Azure.Pim.Inputs.EligibleRoleAssignmentScheduleArgs\n {\n StartDateTime = exampleStatic.Rfc3339,\n Expiration = new Azure.Pim.Inputs.EligibleRoleAssignmentScheduleExpirationArgs\n {\n DurationHours = 8,\n },\n },\n Justification = \"Expiration Duration Set\",\n Ticket = new Azure.Pim.Inputs.EligibleRoleAssignmentTicketArgs\n {\n Number = \"1\",\n System = \"example ticket system\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/pim\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumiverse/pulumi-time/sdk/go/time\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetRoleDefinition, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStatic, err := time.NewStatic(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = pim.NewEligibleRoleAssignment(ctx, \"example\", \u0026pim.EligibleRoleAssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: pulumi.Sprintf(\"%v%v\", primary.Id, exampleGetRoleDefinition.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tSchedule: \u0026pim.EligibleRoleAssignmentScheduleArgs{\n\t\t\t\tStartDateTime: exampleStatic.Rfc3339,\n\t\t\t\tExpiration: \u0026pim.EligibleRoleAssignmentScheduleExpirationArgs{\n\t\t\t\t\tDurationHours: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tJustification: pulumi.String(\"Expiration Duration Set\"),\n\t\t\tTicket: \u0026pim.EligibleRoleAssignmentTicketArgs{\n\t\t\t\tNumber: pulumi.String(\"1\"),\n\t\t\t\tSystem: pulumi.String(\"example ticket system\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.time.Static;\nimport com.pulumi.azure.pim.EligibleRoleAssignment;\nimport com.pulumi.azure.pim.EligibleRoleAssignmentArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentScheduleArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentScheduleExpirationArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentTicketArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetRoleDefinition = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleStatic = new Static(\"exampleStatic\");\n\n var exampleEligibleRoleAssignment = new EligibleRoleAssignment(\"exampleEligibleRoleAssignment\", EligibleRoleAssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(String.format(\"%s%s\", primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()),exampleGetRoleDefinition.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .schedule(EligibleRoleAssignmentScheduleArgs.builder()\n .startDateTime(exampleStatic.rfc3339())\n .expiration(EligibleRoleAssignmentScheduleExpirationArgs.builder()\n .durationHours(8)\n .build())\n .build())\n .justification(\"Expiration Duration Set\")\n .ticket(EligibleRoleAssignmentTicketArgs.builder()\n .number(\"1\")\n .system(\"example ticket system\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleStatic:\n type: time:Static\n name: example\n exampleEligibleRoleAssignment:\n type: azure:pim:EligibleRoleAssignment\n name: example\n properties:\n scope: ${primary.id}\n roleDefinitionId: ${primary.id}${exampleGetRoleDefinition.id}\n principalId: ${example.objectId}\n schedule:\n startDateTime: ${exampleStatic.rfc3339}\n expiration:\n durationHours: 8\n justification: Expiration Duration Set\n ticket:\n number: '1'\n system: example ticket system\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetRoleDefinition:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Management Group)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as time from \"@pulumiverse/time\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleGetRoleDefinition = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleGroup = new azure.management.Group(\"example\", {name: \"Example-Management-Group\"});\nconst exampleStatic = new time.Static(\"example\", {});\nconst exampleEligibleRoleAssignment = new azure.pim.EligibleRoleAssignment(\"example\", {\n scope: exampleGroup.id,\n roleDefinitionId: exampleGetRoleDefinition.then(exampleGetRoleDefinition =\u003e exampleGetRoleDefinition.id),\n principalId: example.then(example =\u003e example.objectId),\n schedule: {\n startDateTime: exampleStatic.rfc3339,\n expiration: {\n durationHours: 8,\n },\n },\n justification: \"Expiration Duration Set\",\n ticket: {\n number: \"1\",\n system: \"example ticket system\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumiverse_time as time\n\nexample = azure.core.get_client_config()\nexample_get_role_definition = azure.authorization.get_role_definition(name=\"Reader\")\nexample_group = azure.management.Group(\"example\", name=\"Example-Management-Group\")\nexample_static = time.Static(\"example\")\nexample_eligible_role_assignment = azure.pim.EligibleRoleAssignment(\"example\",\n scope=example_group.id,\n role_definition_id=example_get_role_definition.id,\n principal_id=example.object_id,\n schedule={\n \"start_date_time\": example_static.rfc3339,\n \"expiration\": {\n \"duration_hours\": 8,\n },\n },\n justification=\"Expiration Duration Set\",\n ticket={\n \"number\": \"1\",\n \"system\": \"example ticket system\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Time = Pulumiverse.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetRoleDefinition = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleGroup = new Azure.Management.Group(\"example\", new()\n {\n Name = \"Example-Management-Group\",\n });\n\n var exampleStatic = new Time.Static(\"example\");\n\n var exampleEligibleRoleAssignment = new Azure.Pim.EligibleRoleAssignment(\"example\", new()\n {\n Scope = exampleGroup.Id,\n RoleDefinitionId = exampleGetRoleDefinition.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Schedule = new Azure.Pim.Inputs.EligibleRoleAssignmentScheduleArgs\n {\n StartDateTime = exampleStatic.Rfc3339,\n Expiration = new Azure.Pim.Inputs.EligibleRoleAssignmentScheduleExpirationArgs\n {\n DurationHours = 8,\n },\n },\n Justification = \"Expiration Duration Set\",\n Ticket = new Azure.Pim.Inputs.EligibleRoleAssignmentTicketArgs\n {\n Number = \"1\",\n System = \"example ticket system\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/pim\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumiverse/pulumi-time/sdk/go/time\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetRoleDefinition, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGroup, err := management.NewGroup(ctx, \"example\", \u0026management.GroupArgs{\n\t\t\tName: pulumi.String(\"Example-Management-Group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStatic, err := time.NewStatic(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = pim.NewEligibleRoleAssignment(ctx, \"example\", \u0026pim.EligibleRoleAssignmentArgs{\n\t\t\tScope: exampleGroup.ID(),\n\t\t\tRoleDefinitionId: pulumi.String(exampleGetRoleDefinition.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tSchedule: \u0026pim.EligibleRoleAssignmentScheduleArgs{\n\t\t\t\tStartDateTime: exampleStatic.Rfc3339,\n\t\t\t\tExpiration: \u0026pim.EligibleRoleAssignmentScheduleExpirationArgs{\n\t\t\t\t\tDurationHours: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tJustification: pulumi.String(\"Expiration Duration Set\"),\n\t\t\tTicket: \u0026pim.EligibleRoleAssignmentTicketArgs{\n\t\t\t\tNumber: pulumi.String(\"1\"),\n\t\t\t\tSystem: pulumi.String(\"example ticket system\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.management.GroupArgs;\nimport com.pulumi.time.Static;\nimport com.pulumi.azure.pim.EligibleRoleAssignment;\nimport com.pulumi.azure.pim.EligibleRoleAssignmentArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentScheduleArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentScheduleExpirationArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentTicketArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetRoleDefinition = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleGroup = new Group(\"exampleGroup\", GroupArgs.builder()\n .name(\"Example-Management-Group\")\n .build());\n\n var exampleStatic = new Static(\"exampleStatic\");\n\n var exampleEligibleRoleAssignment = new EligibleRoleAssignment(\"exampleEligibleRoleAssignment\", EligibleRoleAssignmentArgs.builder()\n .scope(exampleGroup.id())\n .roleDefinitionId(exampleGetRoleDefinition.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .schedule(EligibleRoleAssignmentScheduleArgs.builder()\n .startDateTime(exampleStatic.rfc3339())\n .expiration(EligibleRoleAssignmentScheduleExpirationArgs.builder()\n .durationHours(8)\n .build())\n .build())\n .justification(\"Expiration Duration Set\")\n .ticket(EligibleRoleAssignmentTicketArgs.builder()\n .number(\"1\")\n .system(\"example ticket system\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleGroup:\n type: azure:management:Group\n name: example\n properties:\n name: Example-Management-Group\n exampleStatic:\n type: time:Static\n name: example\n exampleEligibleRoleAssignment:\n type: azure:pim:EligibleRoleAssignment\n name: example\n properties:\n scope: ${exampleGroup.id}\n roleDefinitionId: ${exampleGetRoleDefinition.id}\n principalId: ${example.objectId}\n schedule:\n startDateTime: ${exampleStatic.rfc3339}\n expiration:\n durationHours: 8\n justification: Expiration Duration Set\n ticket:\n number: '1'\n system: example ticket system\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetRoleDefinition:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPIM Eligible Role Assignments can be imported using the following composite resource ID, e.g.\n\n```sh\n$ pulumi import azure:pim/eligibleRoleAssignment:EligibleRoleAssignment example /subscriptions/00000000-0000-0000-0000-000000000000|/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/00000000-0000-0000-0000-000000000000|00000000-0000-0000-0000-000000000000\n```\n\n", + "description": "Manages a PIM Eligible Role Assignment.\n\n## Example Usage\n\n### Subscription)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as time from \"@pulumiverse/time\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleGetRoleDefinition = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleStatic = new time.Static(\"example\", {});\nconst exampleEligibleRoleAssignment = new azure.pim.EligibleRoleAssignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: Promise.all([primary, exampleGetRoleDefinition]).then(([primary, exampleGetRoleDefinition]) =\u003e `${primary.id}${exampleGetRoleDefinition.id}`),\n principalId: example.then(example =\u003e example.objectId),\n schedule: {\n startDateTime: exampleStatic.rfc3339,\n expiration: {\n durationHours: 8,\n },\n },\n justification: \"Expiration Duration Set\",\n ticket: {\n number: \"1\",\n system: \"example ticket system\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumiverse_time as time\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_get_role_definition = azure.authorization.get_role_definition(name=\"Reader\")\nexample_static = time.Static(\"example\")\nexample_eligible_role_assignment = azure.pim.EligibleRoleAssignment(\"example\",\n scope=primary.id,\n role_definition_id=f\"{primary.id}{example_get_role_definition.id}\",\n principal_id=example.object_id,\n schedule={\n \"start_date_time\": example_static.rfc3339,\n \"expiration\": {\n \"duration_hours\": 8,\n },\n },\n justification=\"Expiration Duration Set\",\n ticket={\n \"number\": \"1\",\n \"system\": \"example ticket system\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Time = Pulumiverse.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetRoleDefinition = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleStatic = new Time.Static(\"example\");\n\n var exampleEligibleRoleAssignment = new Azure.Pim.EligibleRoleAssignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = Output.Tuple(primary, exampleGetRoleDefinition).Apply(values =\u003e\n {\n var primary = values.Item1;\n var exampleGetRoleDefinition = values.Item2;\n return $\"{primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id)}{exampleGetRoleDefinition.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id)}\";\n }),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Schedule = new Azure.Pim.Inputs.EligibleRoleAssignmentScheduleArgs\n {\n StartDateTime = exampleStatic.Rfc3339,\n Expiration = new Azure.Pim.Inputs.EligibleRoleAssignmentScheduleExpirationArgs\n {\n DurationHours = 8,\n },\n },\n Justification = \"Expiration Duration Set\",\n Ticket = new Azure.Pim.Inputs.EligibleRoleAssignmentTicketArgs\n {\n Number = \"1\",\n System = \"example ticket system\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/pim\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumiverse/pulumi-time/sdk/go/time\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetRoleDefinition, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStatic, err := time.NewStatic(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = pim.NewEligibleRoleAssignment(ctx, \"example\", \u0026pim.EligibleRoleAssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: pulumi.Sprintf(\"%v%v\", primary.Id, exampleGetRoleDefinition.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tSchedule: \u0026pim.EligibleRoleAssignmentScheduleArgs{\n\t\t\t\tStartDateTime: exampleStatic.Rfc3339,\n\t\t\t\tExpiration: \u0026pim.EligibleRoleAssignmentScheduleExpirationArgs{\n\t\t\t\t\tDurationHours: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tJustification: pulumi.String(\"Expiration Duration Set\"),\n\t\t\tTicket: \u0026pim.EligibleRoleAssignmentTicketArgs{\n\t\t\t\tNumber: pulumi.String(\"1\"),\n\t\t\t\tSystem: pulumi.String(\"example ticket system\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.time.Static;\nimport com.pulumi.azure.pim.EligibleRoleAssignment;\nimport com.pulumi.azure.pim.EligibleRoleAssignmentArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentScheduleArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentScheduleExpirationArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentTicketArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetRoleDefinition = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleStatic = new Static(\"exampleStatic\");\n\n var exampleEligibleRoleAssignment = new EligibleRoleAssignment(\"exampleEligibleRoleAssignment\", EligibleRoleAssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(String.format(\"%s%s\", primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()),exampleGetRoleDefinition.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .schedule(EligibleRoleAssignmentScheduleArgs.builder()\n .startDateTime(exampleStatic.rfc3339())\n .expiration(EligibleRoleAssignmentScheduleExpirationArgs.builder()\n .durationHours(8)\n .build())\n .build())\n .justification(\"Expiration Duration Set\")\n .ticket(EligibleRoleAssignmentTicketArgs.builder()\n .number(\"1\")\n .system(\"example ticket system\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleStatic:\n type: time:Static\n name: example\n exampleEligibleRoleAssignment:\n type: azure:pim:EligibleRoleAssignment\n name: example\n properties:\n scope: ${primary.id}\n roleDefinitionId: ${primary.id}${exampleGetRoleDefinition.id}\n principalId: ${example.objectId}\n schedule:\n startDateTime: ${exampleStatic.rfc3339}\n expiration:\n durationHours: 8\n justification: Expiration Duration Set\n ticket:\n number: '1'\n system: example ticket system\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetRoleDefinition:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Management Group)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as time from \"@pulumiverse/time\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleGetRoleDefinition = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleGroup = new azure.management.Group(\"example\", {name: \"Example-Management-Group\"});\nconst exampleStatic = new time.Static(\"example\", {});\nconst exampleEligibleRoleAssignment = new azure.pim.EligibleRoleAssignment(\"example\", {\n scope: exampleGroup.id,\n roleDefinitionId: exampleGetRoleDefinition.then(exampleGetRoleDefinition =\u003e exampleGetRoleDefinition.id),\n principalId: example.then(example =\u003e example.objectId),\n schedule: {\n startDateTime: exampleStatic.rfc3339,\n expiration: {\n durationHours: 8,\n },\n },\n justification: \"Expiration Duration Set\",\n ticket: {\n number: \"1\",\n system: \"example ticket system\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumiverse_time as time\n\nexample = azure.core.get_client_config()\nexample_get_role_definition = azure.authorization.get_role_definition(name=\"Reader\")\nexample_group = azure.management.Group(\"example\", name=\"Example-Management-Group\")\nexample_static = time.Static(\"example\")\nexample_eligible_role_assignment = azure.pim.EligibleRoleAssignment(\"example\",\n scope=example_group.id,\n role_definition_id=example_get_role_definition.id,\n principal_id=example.object_id,\n schedule={\n \"start_date_time\": example_static.rfc3339,\n \"expiration\": {\n \"duration_hours\": 8,\n },\n },\n justification=\"Expiration Duration Set\",\n ticket={\n \"number\": \"1\",\n \"system\": \"example ticket system\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Time = Pulumiverse.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetRoleDefinition = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleGroup = new Azure.Management.Group(\"example\", new()\n {\n Name = \"Example-Management-Group\",\n });\n\n var exampleStatic = new Time.Static(\"example\");\n\n var exampleEligibleRoleAssignment = new Azure.Pim.EligibleRoleAssignment(\"example\", new()\n {\n Scope = exampleGroup.Id,\n RoleDefinitionId = exampleGetRoleDefinition.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n Schedule = new Azure.Pim.Inputs.EligibleRoleAssignmentScheduleArgs\n {\n StartDateTime = exampleStatic.Rfc3339,\n Expiration = new Azure.Pim.Inputs.EligibleRoleAssignmentScheduleExpirationArgs\n {\n DurationHours = 8,\n },\n },\n Justification = \"Expiration Duration Set\",\n Ticket = new Azure.Pim.Inputs.EligibleRoleAssignmentTicketArgs\n {\n Number = \"1\",\n System = \"example ticket system\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/pim\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumiverse/pulumi-time/sdk/go/time\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGetRoleDefinition, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleGroup, err := management.NewGroup(ctx, \"example\", \u0026management.GroupArgs{\n\t\t\tName: pulumi.String(\"Example-Management-Group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleStatic, err := time.NewStatic(ctx, \"example\", nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = pim.NewEligibleRoleAssignment(ctx, \"example\", \u0026pim.EligibleRoleAssignmentArgs{\n\t\t\tScope: exampleGroup.ID(),\n\t\t\tRoleDefinitionId: pulumi.String(exampleGetRoleDefinition.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tSchedule: \u0026pim.EligibleRoleAssignmentScheduleArgs{\n\t\t\t\tStartDateTime: exampleStatic.Rfc3339,\n\t\t\t\tExpiration: \u0026pim.EligibleRoleAssignmentScheduleExpirationArgs{\n\t\t\t\t\tDurationHours: pulumi.Int(8),\n\t\t\t\t},\n\t\t\t},\n\t\t\tJustification: pulumi.String(\"Expiration Duration Set\"),\n\t\t\tTicket: \u0026pim.EligibleRoleAssignmentTicketArgs{\n\t\t\t\tNumber: pulumi.String(\"1\"),\n\t\t\t\tSystem: pulumi.String(\"example ticket system\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.management.Group;\nimport com.pulumi.azure.management.GroupArgs;\nimport com.pulumi.time.Static;\nimport com.pulumi.azure.pim.EligibleRoleAssignment;\nimport com.pulumi.azure.pim.EligibleRoleAssignmentArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentScheduleArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentScheduleExpirationArgs;\nimport com.pulumi.azure.pim.inputs.EligibleRoleAssignmentTicketArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetRoleDefinition = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleGroup = new Group(\"exampleGroup\", GroupArgs.builder()\n .name(\"Example-Management-Group\")\n .build());\n\n var exampleStatic = new Static(\"exampleStatic\");\n\n var exampleEligibleRoleAssignment = new EligibleRoleAssignment(\"exampleEligibleRoleAssignment\", EligibleRoleAssignmentArgs.builder()\n .scope(exampleGroup.id())\n .roleDefinitionId(exampleGetRoleDefinition.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .schedule(EligibleRoleAssignmentScheduleArgs.builder()\n .startDateTime(exampleStatic.rfc3339())\n .expiration(EligibleRoleAssignmentScheduleExpirationArgs.builder()\n .durationHours(8)\n .build())\n .build())\n .justification(\"Expiration Duration Set\")\n .ticket(EligibleRoleAssignmentTicketArgs.builder()\n .number(\"1\")\n .system(\"example ticket system\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleGroup:\n type: azure:management:Group\n name: example\n properties:\n name: Example-Management-Group\n exampleStatic:\n type: time:Static\n name: example\n exampleEligibleRoleAssignment:\n type: azure:pim:EligibleRoleAssignment\n name: example\n properties:\n scope: ${exampleGroup.id}\n roleDefinitionId: ${exampleGetRoleDefinition.id}\n principalId: ${example.objectId}\n schedule:\n startDateTime: ${exampleStatic.rfc3339}\n expiration:\n durationHours: 8\n justification: Expiration Duration Set\n ticket:\n number: '1'\n system: example ticket system\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetRoleDefinition:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPIM Eligible Role Assignments can be imported using the following composite resource ID, e.g.\n\n```sh\n$ pulumi import azure:pim/eligibleRoleAssignment:EligibleRoleAssignment example /subscriptions/00000000-0000-0000-0000-000000000000|/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/00000000-0000-0000-0000-000000000000|00000000-0000-0000-0000-000000000000\n```\n\n", "properties": { "justification": { "type": "string", @@ -234809,7 +234809,7 @@ ] }, "azure:postgresql/activeDirectoryAdministrator:ActiveDirectoryAdministrator": { - "description": "Allows you to set a user or group as the AD administrator for an PostgreSQL server in Azure\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServer = new azure.postgresql.Server(\"example\", {\n name: \"example-psqlserver\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"9.6\",\n administratorLogin: \"4dm1n157r470r\",\n administratorLoginPassword: \"4-v3ry-53cr37-p455w0rd\",\n skuName: \"GP_Gen5_2\",\n sslEnforcementEnabled: true,\n});\nconst exampleActiveDirectoryAdministrator = new azure.postgresql.ActiveDirectoryAdministrator(\"example\", {\n serverName: exampleServer.name,\n resourceGroupName: example.name,\n login: \"sqladmin\",\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_server = azure.postgresql.Server(\"example\",\n name=\"example-psqlserver\",\n resource_group_name=example.name,\n location=example.location,\n version=\"9.6\",\n administrator_login=\"4dm1n157r470r\",\n administrator_login_password=\"4-v3ry-53cr37-p455w0rd\",\n sku_name=\"GP_Gen5_2\",\n ssl_enforcement_enabled=True)\nexample_active_directory_administrator = azure.postgresql.ActiveDirectoryAdministrator(\"example\",\n server_name=example_server.name,\n resource_group_name=example.name,\n login=\"sqladmin\",\n tenant_id=current.tenant_id,\n object_id=current.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServer = new Azure.PostgreSql.Server(\"example\", new()\n {\n Name = \"example-psqlserver\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"9.6\",\n AdministratorLogin = \"4dm1n157r470r\",\n AdministratorLoginPassword = \"4-v3ry-53cr37-p455w0rd\",\n SkuName = \"GP_Gen5_2\",\n SslEnforcementEnabled = true,\n });\n\n var exampleActiveDirectoryAdministrator = new Azure.PostgreSql.ActiveDirectoryAdministrator(\"example\", new()\n {\n ServerName = exampleServer.Name,\n ResourceGroupName = example.Name,\n Login = \"sqladmin\",\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/postgresql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := postgresql.NewServer(ctx, \"example\", \u0026postgresql.ServerArgs{\n\t\t\tName: pulumi.String(\"example-psqlserver\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"9.6\"),\n\t\t\tAdministratorLogin: pulumi.String(\"4dm1n157r470r\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"4-v3ry-53cr37-p455w0rd\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5_2\"),\n\t\t\tSslEnforcementEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = postgresql.NewActiveDirectoryAdministrator(ctx, \"example\", \u0026postgresql.ActiveDirectoryAdministratorArgs{\n\t\t\tServerName: exampleServer.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLogin: pulumi.String(\"sqladmin\"),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.postgresql.Server;\nimport com.pulumi.azure.postgresql.ServerArgs;\nimport com.pulumi.azure.postgresql.ActiveDirectoryAdministrator;\nimport com.pulumi.azure.postgresql.ActiveDirectoryAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"example-psqlserver\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"9.6\")\n .administratorLogin(\"4dm1n157r470r\")\n .administratorLoginPassword(\"4-v3ry-53cr37-p455w0rd\")\n .skuName(\"GP_Gen5_2\")\n .sslEnforcementEnabled(true)\n .build());\n\n var exampleActiveDirectoryAdministrator = new ActiveDirectoryAdministrator(\"exampleActiveDirectoryAdministrator\", ActiveDirectoryAdministratorArgs.builder()\n .serverName(exampleServer.name())\n .resourceGroupName(example.name())\n .login(\"sqladmin\")\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServer:\n type: azure:postgresql:Server\n name: example\n properties:\n name: example-psqlserver\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '9.6'\n administratorLogin: 4dm1n157r470r\n administratorLoginPassword: 4-v3ry-53cr37-p455w0rd\n skuName: GP_Gen5_2\n sslEnforcementEnabled: true\n exampleActiveDirectoryAdministrator:\n type: azure:postgresql:ActiveDirectoryAdministrator\n name: example\n properties:\n serverName: ${exampleServer.name}\n resourceGroupName: ${example.name}\n login: sqladmin\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA PostgreSQL Active Directory Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:postgresql/activeDirectoryAdministrator:ActiveDirectoryAdministrator administrator /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.DBforPostgreSQL/servers/myserver\n```\n\n", + "description": "Allows you to set a user or group as the AD administrator for an PostgreSQL server in Azure\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServer = new azure.postgresql.Server(\"example\", {\n name: \"example-psqlserver\",\n resourceGroupName: example.name,\n location: example.location,\n version: \"9.6\",\n administratorLogin: \"4dm1n157r470r\",\n administratorLoginPassword: \"4-v3ry-53cr37-p455w0rd\",\n skuName: \"GP_Gen5_2\",\n sslEnforcementEnabled: true,\n});\nconst exampleActiveDirectoryAdministrator = new azure.postgresql.ActiveDirectoryAdministrator(\"example\", {\n serverName: exampleServer.name,\n resourceGroupName: example.name,\n login: \"sqladmin\",\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_server = azure.postgresql.Server(\"example\",\n name=\"example-psqlserver\",\n resource_group_name=example.name,\n location=example.location,\n version=\"9.6\",\n administrator_login=\"4dm1n157r470r\",\n administrator_login_password=\"4-v3ry-53cr37-p455w0rd\",\n sku_name=\"GP_Gen5_2\",\n ssl_enforcement_enabled=True)\nexample_active_directory_administrator = azure.postgresql.ActiveDirectoryAdministrator(\"example\",\n server_name=example_server.name,\n resource_group_name=example.name,\n login=\"sqladmin\",\n tenant_id=current.tenant_id,\n object_id=current.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServer = new Azure.PostgreSql.Server(\"example\", new()\n {\n Name = \"example-psqlserver\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n Version = \"9.6\",\n AdministratorLogin = \"4dm1n157r470r\",\n AdministratorLoginPassword = \"4-v3ry-53cr37-p455w0rd\",\n SkuName = \"GP_Gen5_2\",\n SslEnforcementEnabled = true,\n });\n\n var exampleActiveDirectoryAdministrator = new Azure.PostgreSql.ActiveDirectoryAdministrator(\"example\", new()\n {\n ServerName = exampleServer.Name,\n ResourceGroupName = example.Name,\n Login = \"sqladmin\",\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/postgresql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := postgresql.NewServer(ctx, \"example\", \u0026postgresql.ServerArgs{\n\t\t\tName: pulumi.String(\"example-psqlserver\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tVersion: pulumi.String(\"9.6\"),\n\t\t\tAdministratorLogin: pulumi.String(\"4dm1n157r470r\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"4-v3ry-53cr37-p455w0rd\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5_2\"),\n\t\t\tSslEnforcementEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = postgresql.NewActiveDirectoryAdministrator(ctx, \"example\", \u0026postgresql.ActiveDirectoryAdministratorArgs{\n\t\t\tServerName: exampleServer.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLogin: pulumi.String(\"sqladmin\"),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.postgresql.Server;\nimport com.pulumi.azure.postgresql.ServerArgs;\nimport com.pulumi.azure.postgresql.ActiveDirectoryAdministrator;\nimport com.pulumi.azure.postgresql.ActiveDirectoryAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"example-psqlserver\")\n .resourceGroupName(example.name())\n .location(example.location())\n .version(\"9.6\")\n .administratorLogin(\"4dm1n157r470r\")\n .administratorLoginPassword(\"4-v3ry-53cr37-p455w0rd\")\n .skuName(\"GP_Gen5_2\")\n .sslEnforcementEnabled(true)\n .build());\n\n var exampleActiveDirectoryAdministrator = new ActiveDirectoryAdministrator(\"exampleActiveDirectoryAdministrator\", ActiveDirectoryAdministratorArgs.builder()\n .serverName(exampleServer.name())\n .resourceGroupName(example.name())\n .login(\"sqladmin\")\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServer:\n type: azure:postgresql:Server\n name: example\n properties:\n name: example-psqlserver\n resourceGroupName: ${example.name}\n location: ${example.location}\n version: '9.6'\n administratorLogin: 4dm1n157r470r\n administratorLoginPassword: 4-v3ry-53cr37-p455w0rd\n skuName: GP_Gen5_2\n sslEnforcementEnabled: true\n exampleActiveDirectoryAdministrator:\n type: azure:postgresql:ActiveDirectoryAdministrator\n name: example\n properties:\n serverName: ${exampleServer.name}\n resourceGroupName: ${example.name}\n login: sqladmin\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA PostgreSQL Active Directory Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:postgresql/activeDirectoryAdministrator:ActiveDirectoryAdministrator administrator /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.DBforPostgreSQL/servers/myserver\n```\n\n", "properties": { "login": { "type": "string", @@ -235548,7 +235548,7 @@ } }, "azure:postgresql/flexibleServerActiveDirectoryAdministrator:FlexibleServerActiveDirectoryAdministrator": { - "description": "Allows you to set a user or group as the AD administrator for a PostgreSQL Flexible Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst current = azure.core.getClientConfig({});\nconst example = current.then(current =\u003e azuread.getServicePrincipal({\n objectId: current.objectId,\n}));\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFlexibleServer = new azure.postgresql.FlexibleServer(\"example\", {\n name: \"example-fs\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n administratorLogin: \"adminTerraform\",\n administratorPassword: \"QAZwsx123\",\n storageMb: 32768,\n version: \"12\",\n skuName: \"GP_Standard_D2s_v3\",\n zone: \"2\",\n authentication: {\n activeDirectoryAuthEnabled: true,\n tenantId: current.then(current =\u003e current.tenantId),\n },\n});\nconst exampleFlexibleServerActiveDirectoryAdministrator = new azure.postgresql.FlexibleServerActiveDirectoryAdministrator(\"example\", {\n serverName: exampleFlexibleServer.name,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: example.then(example =\u003e example.objectId),\n principalName: example.then(example =\u003e example.displayName),\n principalType: \"ServicePrincipal\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\ncurrent = azure.core.get_client_config()\nexample = azuread.get_service_principal(object_id=current.object_id)\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_flexible_server = azure.postgresql.FlexibleServer(\"example\",\n name=\"example-fs\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n administrator_login=\"adminTerraform\",\n administrator_password=\"QAZwsx123\",\n storage_mb=32768,\n version=\"12\",\n sku_name=\"GP_Standard_D2s_v3\",\n zone=\"2\",\n authentication={\n \"active_directory_auth_enabled\": True,\n \"tenant_id\": current.tenant_id,\n })\nexample_flexible_server_active_directory_administrator = azure.postgresql.FlexibleServerActiveDirectoryAdministrator(\"example\",\n server_name=example_flexible_server.name,\n resource_group_name=example_resource_group.name,\n tenant_id=current.tenant_id,\n object_id=example.object_id,\n principal_name=example.display_name,\n principal_type=\"ServicePrincipal\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = AzureAD.GetServicePrincipal.Invoke(new()\n {\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFlexibleServer = new Azure.PostgreSql.FlexibleServer(\"example\", new()\n {\n Name = \"example-fs\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n AdministratorLogin = \"adminTerraform\",\n AdministratorPassword = \"QAZwsx123\",\n StorageMb = 32768,\n Version = \"12\",\n SkuName = \"GP_Standard_D2s_v3\",\n Zone = \"2\",\n Authentication = new Azure.PostgreSql.Inputs.FlexibleServerAuthenticationArgs\n {\n ActiveDirectoryAuthEnabled = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n },\n });\n\n var exampleFlexibleServerActiveDirectoryAdministrator = new Azure.PostgreSql.FlexibleServerActiveDirectoryAdministrator(\"example\", new()\n {\n ServerName = exampleFlexibleServer.Name,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = example.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n PrincipalName = example.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.DisplayName),\n PrincipalType = \"ServicePrincipal\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/postgresql\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tObjectId: pulumi.StringRef(current.ObjectId),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFlexibleServer, err := postgresql.NewFlexibleServer(ctx, \"example\", \u0026postgresql.FlexibleServerArgs{\n\t\t\tName: pulumi.String(\"example-fs\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tAdministratorLogin: pulumi.String(\"adminTerraform\"),\n\t\t\tAdministratorPassword: pulumi.String(\"QAZwsx123\"),\n\t\t\tStorageMb: pulumi.Int(32768),\n\t\t\tVersion: pulumi.String(\"12\"),\n\t\t\tSkuName: pulumi.String(\"GP_Standard_D2s_v3\"),\n\t\t\tZone: pulumi.String(\"2\"),\n\t\t\tAuthentication: \u0026postgresql.FlexibleServerAuthenticationArgs{\n\t\t\t\tActiveDirectoryAuthEnabled: pulumi.Bool(true),\n\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = postgresql.NewFlexibleServerActiveDirectoryAdministrator(ctx, \"example\", \u0026postgresql.FlexibleServerActiveDirectoryAdministratorArgs{\n\t\t\tServerName: exampleFlexibleServer.Name,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(example.ObjectId),\n\t\t\tPrincipalName: pulumi.String(example.DisplayName),\n\t\t\tPrincipalType: pulumi.String(\"ServicePrincipal\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.postgresql.FlexibleServer;\nimport com.pulumi.azure.postgresql.FlexibleServerArgs;\nimport com.pulumi.azure.postgresql.inputs.FlexibleServerAuthenticationArgs;\nimport com.pulumi.azure.postgresql.FlexibleServerActiveDirectoryAdministrator;\nimport com.pulumi.azure.postgresql.FlexibleServerActiveDirectoryAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var example = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFlexibleServer = new FlexibleServer(\"exampleFlexibleServer\", FlexibleServerArgs.builder()\n .name(\"example-fs\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .administratorLogin(\"adminTerraform\")\n .administratorPassword(\"QAZwsx123\")\n .storageMb(32768)\n .version(\"12\")\n .skuName(\"GP_Standard_D2s_v3\")\n .zone(\"2\")\n .authentication(FlexibleServerAuthenticationArgs.builder()\n .activeDirectoryAuthEnabled(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build())\n .build());\n\n var exampleFlexibleServerActiveDirectoryAdministrator = new FlexibleServerActiveDirectoryAdministrator(\"exampleFlexibleServerActiveDirectoryAdministrator\", FlexibleServerActiveDirectoryAdministratorArgs.builder()\n .serverName(exampleFlexibleServer.name())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(example.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .principalName(example.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.displayName()))\n .principalType(\"ServicePrincipal\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleFlexibleServer:\n type: azure:postgresql:FlexibleServer\n name: example\n properties:\n name: example-fs\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n administratorLogin: adminTerraform\n administratorPassword: QAZwsx123\n storageMb: 32768\n version: '12'\n skuName: GP_Standard_D2s_v3\n zone: '2'\n authentication:\n activeDirectoryAuthEnabled: true\n tenantId: ${current.tenantId}\n exampleFlexibleServerActiveDirectoryAdministrator:\n type: azure:postgresql:FlexibleServerActiveDirectoryAdministrator\n name: example\n properties:\n serverName: ${exampleFlexibleServer.name}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${current.tenantId}\n objectId: ${example.objectId}\n principalName: ${example.displayName}\n principalType: ServicePrincipal\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n objectId: ${current.objectId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA PostgreSQL Flexible Server Active Directory Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:postgresql/flexibleServerActiveDirectoryAdministrator:FlexibleServerActiveDirectoryAdministrator example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.DBforPostgreSQL/flexibleServers/myserver/administrators/objectId\n```\n\n", + "description": "Allows you to set a user or group as the AD administrator for a PostgreSQL Flexible Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst current = azure.core.getClientConfig({});\nconst example = current.then(current =\u003e azuread.getServicePrincipal({\n objectId: current.objectId,\n}));\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleFlexibleServer = new azure.postgresql.FlexibleServer(\"example\", {\n name: \"example-fs\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n administratorLogin: \"adminTerraform\",\n administratorPassword: \"QAZwsx123\",\n storageMb: 32768,\n version: \"12\",\n skuName: \"GP_Standard_D2s_v3\",\n zone: \"2\",\n authentication: {\n activeDirectoryAuthEnabled: true,\n tenantId: current.then(current =\u003e current.tenantId),\n },\n});\nconst exampleFlexibleServerActiveDirectoryAdministrator = new azure.postgresql.FlexibleServerActiveDirectoryAdministrator(\"example\", {\n serverName: exampleFlexibleServer.name,\n resourceGroupName: exampleResourceGroup.name,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: example.then(example =\u003e example.objectId),\n principalName: example.then(example =\u003e example.displayName),\n principalType: \"ServicePrincipal\",\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\ncurrent = azure.core.get_client_config()\nexample = azuread.get_service_principal(object_id=current.object_id)\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_flexible_server = azure.postgresql.FlexibleServer(\"example\",\n name=\"example-fs\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n administrator_login=\"adminTerraform\",\n administrator_password=\"QAZwsx123\",\n storage_mb=32768,\n version=\"12\",\n sku_name=\"GP_Standard_D2s_v3\",\n zone=\"2\",\n authentication={\n \"active_directory_auth_enabled\": True,\n \"tenant_id\": current.tenant_id,\n })\nexample_flexible_server_active_directory_administrator = azure.postgresql.FlexibleServerActiveDirectoryAdministrator(\"example\",\n server_name=example_flexible_server.name,\n resource_group_name=example_resource_group.name,\n tenant_id=current.tenant_id,\n object_id=example.object_id,\n principal_name=example.display_name,\n principal_type=\"ServicePrincipal\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = AzureAD.GetServicePrincipal.Invoke(new()\n {\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleFlexibleServer = new Azure.PostgreSql.FlexibleServer(\"example\", new()\n {\n Name = \"example-fs\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n AdministratorLogin = \"adminTerraform\",\n AdministratorPassword = \"QAZwsx123\",\n StorageMb = 32768,\n Version = \"12\",\n SkuName = \"GP_Standard_D2s_v3\",\n Zone = \"2\",\n Authentication = new Azure.PostgreSql.Inputs.FlexibleServerAuthenticationArgs\n {\n ActiveDirectoryAuthEnabled = true,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n },\n });\n\n var exampleFlexibleServerActiveDirectoryAdministrator = new Azure.PostgreSql.FlexibleServerActiveDirectoryAdministrator(\"example\", new()\n {\n ServerName = exampleFlexibleServer.Name,\n ResourceGroupName = exampleResourceGroup.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = example.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n PrincipalName = example.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.DisplayName),\n PrincipalType = \"ServicePrincipal\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/postgresql\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tObjectId: pulumi.StringRef(current.ObjectId),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFlexibleServer, err := postgresql.NewFlexibleServer(ctx, \"example\", \u0026postgresql.FlexibleServerArgs{\n\t\t\tName: pulumi.String(\"example-fs\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tAdministratorLogin: pulumi.String(\"adminTerraform\"),\n\t\t\tAdministratorPassword: pulumi.String(\"QAZwsx123\"),\n\t\t\tStorageMb: pulumi.Int(32768),\n\t\t\tVersion: pulumi.String(\"12\"),\n\t\t\tSkuName: pulumi.String(\"GP_Standard_D2s_v3\"),\n\t\t\tZone: pulumi.String(\"2\"),\n\t\t\tAuthentication: \u0026postgresql.FlexibleServerAuthenticationArgs{\n\t\t\t\tActiveDirectoryAuthEnabled: pulumi.Bool(true),\n\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = postgresql.NewFlexibleServerActiveDirectoryAdministrator(ctx, \"example\", \u0026postgresql.FlexibleServerActiveDirectoryAdministratorArgs{\n\t\t\tServerName: exampleFlexibleServer.Name,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(example.ObjectId),\n\t\t\tPrincipalName: pulumi.String(example.DisplayName),\n\t\t\tPrincipalType: pulumi.String(\"ServicePrincipal\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.postgresql.FlexibleServer;\nimport com.pulumi.azure.postgresql.FlexibleServerArgs;\nimport com.pulumi.azure.postgresql.inputs.FlexibleServerAuthenticationArgs;\nimport com.pulumi.azure.postgresql.FlexibleServerActiveDirectoryAdministrator;\nimport com.pulumi.azure.postgresql.FlexibleServerActiveDirectoryAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var example = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleFlexibleServer = new FlexibleServer(\"exampleFlexibleServer\", FlexibleServerArgs.builder()\n .name(\"example-fs\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .administratorLogin(\"adminTerraform\")\n .administratorPassword(\"QAZwsx123\")\n .storageMb(32768)\n .version(\"12\")\n .skuName(\"GP_Standard_D2s_v3\")\n .zone(\"2\")\n .authentication(FlexibleServerAuthenticationArgs.builder()\n .activeDirectoryAuthEnabled(true)\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build())\n .build());\n\n var exampleFlexibleServerActiveDirectoryAdministrator = new FlexibleServerActiveDirectoryAdministrator(\"exampleFlexibleServerActiveDirectoryAdministrator\", FlexibleServerActiveDirectoryAdministratorArgs.builder()\n .serverName(exampleFlexibleServer.name())\n .resourceGroupName(exampleResourceGroup.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(example.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .principalName(example.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.displayName()))\n .principalType(\"ServicePrincipal\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleFlexibleServer:\n type: azure:postgresql:FlexibleServer\n name: example\n properties:\n name: example-fs\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n administratorLogin: adminTerraform\n administratorPassword: QAZwsx123\n storageMb: 32768\n version: '12'\n skuName: GP_Standard_D2s_v3\n zone: '2'\n authentication:\n activeDirectoryAuthEnabled: true\n tenantId: ${current.tenantId}\n exampleFlexibleServerActiveDirectoryAdministrator:\n type: azure:postgresql:FlexibleServerActiveDirectoryAdministrator\n name: example\n properties:\n serverName: ${exampleFlexibleServer.name}\n resourceGroupName: ${exampleResourceGroup.name}\n tenantId: ${current.tenantId}\n objectId: ${example.objectId}\n principalName: ${example.displayName}\n principalType: ServicePrincipal\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n example:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n objectId: ${current.objectId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA PostgreSQL Flexible Server Active Directory Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:postgresql/flexibleServerActiveDirectoryAdministrator:FlexibleServerActiveDirectoryAdministrator example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.DBforPostgreSQL/flexibleServers/myserver/administrators/objectId\n```\n\n", "properties": { "objectId": { "type": "string", @@ -236270,7 +236270,7 @@ } }, "azure:postgresql/serverKey:ServerKey": { - "description": "Manages a Customer Managed Key for a PostgreSQL Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n purgeProtectionEnabled: true,\n});\nconst exampleServer = new azure.postgresql.Server(\"example\", {\n name: \"example-postgre-server\",\n location: example.location,\n resourceGroupName: example.name,\n administratorLogin: \"psqladmin\",\n administratorLoginPassword: \"H@Sh1CoR3!\",\n skuName: \"GP_Gen5_2\",\n version: \"11\",\n storageMb: 51200,\n sslEnforcementEnabled: true,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst server = new azure.keyvault.AccessPolicy(\"server\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleServer.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"tfex-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n client,\n server,\n ],\n});\nconst exampleServerKey = new azure.postgresql.ServerKey(\"example\", {\n serverId: exampleServer.id,\n keyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n purge_protection_enabled=True)\nexample_server = azure.postgresql.Server(\"example\",\n name=\"example-postgre-server\",\n location=example.location,\n resource_group_name=example.name,\n administrator_login=\"psqladmin\",\n administrator_login_password=\"H@Sh1CoR3!\",\n sku_name=\"GP_Gen5_2\",\n version=\"11\",\n storage_mb=51200,\n ssl_enforcement_enabled=True,\n identity={\n \"type\": \"SystemAssigned\",\n })\nserver = azure.keyvault.AccessPolicy(\"server\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_server.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secret_permissions=[\"Get\"])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secret_permissions=[\"Get\"])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"tfex-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n server,\n ]))\nexample_server_key = azure.postgresql.ServerKey(\"example\",\n server_id=example_server.id,\n key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleServer = new Azure.PostgreSql.Server(\"example\", new()\n {\n Name = \"example-postgre-server\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AdministratorLogin = \"psqladmin\",\n AdministratorLoginPassword = \"H@Sh1CoR3!\",\n SkuName = \"GP_Gen5_2\",\n Version = \"11\",\n StorageMb = 51200,\n SslEnforcementEnabled = true,\n Identity = new Azure.PostgreSql.Inputs.ServerIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var server = new Azure.KeyVault.AccessPolicy(\"server\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleServer.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"tfex-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n server,\n },\n });\n\n var exampleServerKey = new Azure.PostgreSql.ServerKey(\"example\", new()\n {\n ServerId = exampleServer.Id,\n KeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/postgresql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := postgresql.NewServer(ctx, \"example\", \u0026postgresql.ServerArgs{\n\t\t\tName: pulumi.String(\"example-postgre-server\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAdministratorLogin: pulumi.String(\"psqladmin\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5_2\"),\n\t\t\tVersion: pulumi.String(\"11\"),\n\t\t\tStorageMb: pulumi.Int(51200),\n\t\t\tSslEnforcementEnabled: pulumi.Bool(true),\n\t\t\tIdentity: \u0026postgresql.ServerIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tserver, err := keyvault.NewAccessPolicy(ctx, \"server\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(exampleServer.Identity.ApplyT(func(identity postgresql.ServerIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"tfex-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tserver,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = postgresql.NewServerKey(ctx, \"example\", \u0026postgresql.ServerKeyArgs{\n\t\t\tServerId: exampleServer.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.postgresql.Server;\nimport com.pulumi.azure.postgresql.ServerArgs;\nimport com.pulumi.azure.postgresql.inputs.ServerIdentityArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.postgresql.ServerKey;\nimport com.pulumi.azure.postgresql.ServerKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"example-postgre-server\")\n .location(example.location())\n .resourceGroupName(example.name())\n .administratorLogin(\"psqladmin\")\n .administratorLoginPassword(\"H@Sh1CoR3!\")\n .skuName(\"GP_Gen5_2\")\n .version(\"11\")\n .storageMb(51200)\n .sslEnforcementEnabled(true)\n .identity(ServerIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var server = new AccessPolicy(\"server\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleServer.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .secretPermissions(\"Get\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Get\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"tfex-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n server)\n .build());\n\n var exampleServerKey = new ServerKey(\"exampleServerKey\", ServerKeyArgs.builder()\n .serverId(exampleServer.id())\n .keyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n purgeProtectionEnabled: true\n server:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleServer.identity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n secretPermissions:\n - Get\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n secretPermissions:\n - Get\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: tfex-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${client}\n - ${server}\n exampleServer:\n type: azure:postgresql:Server\n name: example\n properties:\n name: example-postgre-server\n location: ${example.location}\n resourceGroupName: ${example.name}\n administratorLogin: psqladmin\n administratorLoginPassword: H@Sh1CoR3!\n skuName: GP_Gen5_2\n version: '11'\n storageMb: 51200\n sslEnforcementEnabled: true\n identity:\n type: SystemAssigned\n exampleServerKey:\n type: azure:postgresql:ServerKey\n name: example\n properties:\n serverId: ${exampleServer.id}\n keyVaultKeyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA PostgreSQL Server Key can be imported using the `resource id` of the PostgreSQL Server Key, e.g.\n\n```sh\n$ pulumi import azure:postgresql/serverKey:ServerKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DBforPostgreSQL/servers/server1/keys/keyvaultname_key-name_keyversion\n```\n\n", + "description": "Manages a Customer Managed Key for a PostgreSQL Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n purgeProtectionEnabled: true,\n});\nconst exampleServer = new azure.postgresql.Server(\"example\", {\n name: \"example-postgre-server\",\n location: example.location,\n resourceGroupName: example.name,\n administratorLogin: \"psqladmin\",\n administratorLoginPassword: \"H@Sh1CoR3!\",\n skuName: \"GP_Gen5_2\",\n version: \"11\",\n storageMb: 51200,\n sslEnforcementEnabled: true,\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst server = new azure.keyvault.AccessPolicy(\"server\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleServer.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secretPermissions: [\"Get\"],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"tfex-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n client,\n server,\n ],\n});\nconst exampleServerKey = new azure.postgresql.ServerKey(\"example\", {\n serverId: exampleServer.id,\n keyVaultKeyId: exampleKey.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n purge_protection_enabled=True)\nexample_server = azure.postgresql.Server(\"example\",\n name=\"example-postgre-server\",\n location=example.location,\n resource_group_name=example.name,\n administrator_login=\"psqladmin\",\n administrator_login_password=\"H@Sh1CoR3!\",\n sku_name=\"GP_Gen5_2\",\n version=\"11\",\n storage_mb=51200,\n ssl_enforcement_enabled=True,\n identity={\n \"type\": \"SystemAssigned\",\n })\nserver = azure.keyvault.AccessPolicy(\"server\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_server.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n secret_permissions=[\"Get\"])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n ],\n secret_permissions=[\"Get\"])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"tfex-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n server,\n ]))\nexample_server_key = azure.postgresql.ServerKey(\"example\",\n server_id=example_server.id,\n key_vault_key_id=example_key.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleServer = new Azure.PostgreSql.Server(\"example\", new()\n {\n Name = \"example-postgre-server\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n AdministratorLogin = \"psqladmin\",\n AdministratorLoginPassword = \"H@Sh1CoR3!\",\n SkuName = \"GP_Gen5_2\",\n Version = \"11\",\n StorageMb = 51200,\n SslEnforcementEnabled = true,\n Identity = new Azure.PostgreSql.Inputs.ServerIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var server = new Azure.KeyVault.AccessPolicy(\"server\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleServer.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"tfex-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n server,\n },\n });\n\n var exampleServerKey = new Azure.PostgreSql.ServerKey(\"example\", new()\n {\n ServerId = exampleServer.Id,\n KeyVaultKeyId = exampleKey.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/postgresql\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServer, err := postgresql.NewServer(ctx, \"example\", \u0026postgresql.ServerArgs{\n\t\t\tName: pulumi.String(\"example-postgre-server\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tAdministratorLogin: pulumi.String(\"psqladmin\"),\n\t\t\tAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tSkuName: pulumi.String(\"GP_Gen5_2\"),\n\t\t\tVersion: pulumi.String(\"11\"),\n\t\t\tStorageMb: pulumi.Int(51200),\n\t\t\tSslEnforcementEnabled: pulumi.Bool(true),\n\t\t\tIdentity: \u0026postgresql.ServerIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tserver, err := keyvault.NewAccessPolicy(ctx, \"server\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(exampleServer.Identity.ApplyT(func(identity postgresql.ServerIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"tfex-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tserver,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = postgresql.NewServerKey(ctx, \"example\", \u0026postgresql.ServerKeyArgs{\n\t\t\tServerId: exampleServer.ID(),\n\t\t\tKeyVaultKeyId: exampleKey.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.postgresql.Server;\nimport com.pulumi.azure.postgresql.ServerArgs;\nimport com.pulumi.azure.postgresql.inputs.ServerIdentityArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.postgresql.ServerKey;\nimport com.pulumi.azure.postgresql.ServerKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleServer = new Server(\"exampleServer\", ServerArgs.builder()\n .name(\"example-postgre-server\")\n .location(example.location())\n .resourceGroupName(example.name())\n .administratorLogin(\"psqladmin\")\n .administratorLoginPassword(\"H@Sh1CoR3!\")\n .skuName(\"GP_Gen5_2\")\n .version(\"11\")\n .storageMb(51200)\n .sslEnforcementEnabled(true)\n .identity(ServerIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var server = new AccessPolicy(\"server\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleServer.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .secretPermissions(\"Get\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\")\n .secretPermissions(\"Get\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"tfex-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n server)\n .build());\n\n var exampleServerKey = new ServerKey(\"exampleServerKey\", ServerKeyArgs.builder()\n .serverId(exampleServer.id())\n .keyVaultKeyId(exampleKey.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n purgeProtectionEnabled: true\n server:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleServer.identity.principalId}\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n secretPermissions:\n - Get\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n secretPermissions:\n - Get\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: tfex-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${client}\n - ${server}\n exampleServer:\n type: azure:postgresql:Server\n name: example\n properties:\n name: example-postgre-server\n location: ${example.location}\n resourceGroupName: ${example.name}\n administratorLogin: psqladmin\n administratorLoginPassword: H@Sh1CoR3!\n skuName: GP_Gen5_2\n version: '11'\n storageMb: 51200\n sslEnforcementEnabled: true\n identity:\n type: SystemAssigned\n exampleServerKey:\n type: azure:postgresql:ServerKey\n name: example\n properties:\n serverId: ${exampleServer.id}\n keyVaultKeyId: ${exampleKey.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA PostgreSQL Server Key can be imported using the `resource id` of the PostgreSQL Server Key, e.g.\n\n```sh\n$ pulumi import azure:postgresql/serverKey:ServerKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.DBforPostgreSQL/servers/server1/keys/keyvaultname_key-name_keyversion\n```\n\n", "properties": { "keyVaultKeyId": { "type": "string", @@ -239332,7 +239332,7 @@ } }, "azure:redhatopenshift/cluster:Cluster": { - "description": "Manages a fully managed Azure Red Hat OpenShift Cluster (also known as ARO).\n\n\u003e **Note:** All arguments including the client secret will be stored in the raw state as plain-text. [Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleGetClientConfig = azuread.getClientConfig({});\nconst exampleApplication = new azuread.Application(\"example\", {displayName: \"example-aro\"});\nconst exampleServicePrincipal = new azuread.ServicePrincipal(\"example\", {clientId: exampleApplication.clientId});\nconst exampleServicePrincipalPassword = new azuread.ServicePrincipalPassword(\"example\", {servicePrincipalId: exampleServicePrincipal.objectId});\nconst redhatopenshift = azuread.getServicePrincipal({\n clientId: \"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\",\n});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West US\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.0.0.0/22\"],\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n});\nconst roleNetwork1 = new azure.authorization.Assignment(\"role_network1\", {\n scope: exampleVirtualNetwork.id,\n roleDefinitionName: \"Network Contributor\",\n principalId: exampleServicePrincipal.objectId,\n});\nconst roleNetwork2 = new azure.authorization.Assignment(\"role_network2\", {\n scope: exampleVirtualNetwork.id,\n roleDefinitionName: \"Network Contributor\",\n principalId: redhatopenshift.then(redhatopenshift =\u003e redhatopenshift.objectId),\n});\nconst mainSubnet = new azure.network.Subnet(\"main_subnet\", {\n name: \"main-subnet\",\n resourceGroupName: exampleResourceGroup.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.0.0/23\"],\n serviceEndpoints: [\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n ],\n});\nconst workerSubnet = new azure.network.Subnet(\"worker_subnet\", {\n name: \"worker-subnet\",\n resourceGroupName: exampleResourceGroup.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.2.0/23\"],\n serviceEndpoints: [\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n ],\n});\nconst exampleCluster = new azure.redhatopenshift.Cluster(\"example\", {\n name: \"examplearo\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n clusterProfile: {\n domain: \"aro-example.com\",\n version: \"4.13.23\",\n },\n networkProfile: {\n podCidr: \"10.128.0.0/14\",\n serviceCidr: \"172.30.0.0/16\",\n },\n mainProfile: {\n vmSize: \"Standard_D8s_v3\",\n subnetId: mainSubnet.id,\n },\n apiServerProfile: {\n visibility: \"Public\",\n },\n ingressProfile: {\n visibility: \"Public\",\n },\n workerProfile: {\n vmSize: \"Standard_D4s_v3\",\n diskSizeGb: 128,\n nodeCount: 3,\n subnetId: workerSubnet.id,\n },\n servicePrincipal: {\n clientId: exampleApplication.clientId,\n clientSecret: exampleServicePrincipalPassword.value,\n },\n}, {\n dependsOn: [\n roleNetwork1,\n roleNetwork2,\n ],\n});\nexport const consoleUrl = exampleCluster.consoleUrl;\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\nexample = azure.core.get_client_config()\nexample_get_client_config = azuread.get_client_config()\nexample_application = azuread.Application(\"example\", display_name=\"example-aro\")\nexample_service_principal = azuread.ServicePrincipal(\"example\", client_id=example_application.client_id)\nexample_service_principal_password = azuread.ServicePrincipalPassword(\"example\", service_principal_id=example_service_principal.object_id)\nredhatopenshift = azuread.get_service_principal(client_id=\"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\")\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West US\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.0.0.0/22\"],\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name)\nrole_network1 = azure.authorization.Assignment(\"role_network1\",\n scope=example_virtual_network.id,\n role_definition_name=\"Network Contributor\",\n principal_id=example_service_principal.object_id)\nrole_network2 = azure.authorization.Assignment(\"role_network2\",\n scope=example_virtual_network.id,\n role_definition_name=\"Network Contributor\",\n principal_id=redhatopenshift.object_id)\nmain_subnet = azure.network.Subnet(\"main_subnet\",\n name=\"main-subnet\",\n resource_group_name=example_resource_group.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.0.0/23\"],\n service_endpoints=[\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n ])\nworker_subnet = azure.network.Subnet(\"worker_subnet\",\n name=\"worker-subnet\",\n resource_group_name=example_resource_group.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.2.0/23\"],\n service_endpoints=[\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n ])\nexample_cluster = azure.redhatopenshift.Cluster(\"example\",\n name=\"examplearo\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n cluster_profile={\n \"domain\": \"aro-example.com\",\n \"version\": \"4.13.23\",\n },\n network_profile={\n \"pod_cidr\": \"10.128.0.0/14\",\n \"service_cidr\": \"172.30.0.0/16\",\n },\n main_profile={\n \"vm_size\": \"Standard_D8s_v3\",\n \"subnet_id\": main_subnet.id,\n },\n api_server_profile={\n \"visibility\": \"Public\",\n },\n ingress_profile={\n \"visibility\": \"Public\",\n },\n worker_profile={\n \"vm_size\": \"Standard_D4s_v3\",\n \"disk_size_gb\": 128,\n \"node_count\": 3,\n \"subnet_id\": worker_subnet.id,\n },\n service_principal={\n \"client_id\": example_application.client_id,\n \"client_secret\": example_service_principal_password.value,\n },\n opts = pulumi.ResourceOptions(depends_on=[\n role_network1,\n role_network2,\n ]))\npulumi.export(\"consoleUrl\", example_cluster.console_url)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetClientConfig = AzureAD.GetClientConfig.Invoke();\n\n var exampleApplication = new AzureAD.Application(\"example\", new()\n {\n DisplayName = \"example-aro\",\n });\n\n var exampleServicePrincipal = new AzureAD.ServicePrincipal(\"example\", new()\n {\n ClientId = exampleApplication.ClientId,\n });\n\n var exampleServicePrincipalPassword = new AzureAD.ServicePrincipalPassword(\"example\", new()\n {\n ServicePrincipalId = exampleServicePrincipal.ObjectId,\n });\n\n var redhatopenshift = AzureAD.GetServicePrincipal.Invoke(new()\n {\n ClientId = \"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\",\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West US\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.0.0.0/22\",\n },\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n });\n\n var roleNetwork1 = new Azure.Authorization.Assignment(\"role_network1\", new()\n {\n Scope = exampleVirtualNetwork.Id,\n RoleDefinitionName = \"Network Contributor\",\n PrincipalId = exampleServicePrincipal.ObjectId,\n });\n\n var roleNetwork2 = new Azure.Authorization.Assignment(\"role_network2\", new()\n {\n Scope = exampleVirtualNetwork.Id,\n RoleDefinitionName = \"Network Contributor\",\n PrincipalId = redhatopenshift.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n });\n\n var mainSubnet = new Azure.Network.Subnet(\"main_subnet\", new()\n {\n Name = \"main-subnet\",\n ResourceGroupName = exampleResourceGroup.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.0.0/23\",\n },\n ServiceEndpoints = new[]\n {\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n },\n });\n\n var workerSubnet = new Azure.Network.Subnet(\"worker_subnet\", new()\n {\n Name = \"worker-subnet\",\n ResourceGroupName = exampleResourceGroup.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.2.0/23\",\n },\n ServiceEndpoints = new[]\n {\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n },\n });\n\n var exampleCluster = new Azure.RedHatOpenShift.Cluster(\"example\", new()\n {\n Name = \"examplearo\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n ClusterProfile = new Azure.RedHatOpenShift.Inputs.ClusterClusterProfileArgs\n {\n Domain = \"aro-example.com\",\n Version = \"4.13.23\",\n },\n NetworkProfile = new Azure.RedHatOpenShift.Inputs.ClusterNetworkProfileArgs\n {\n PodCidr = \"10.128.0.0/14\",\n ServiceCidr = \"172.30.0.0/16\",\n },\n MainProfile = new Azure.RedHatOpenShift.Inputs.ClusterMainProfileArgs\n {\n VmSize = \"Standard_D8s_v3\",\n SubnetId = mainSubnet.Id,\n },\n ApiServerProfile = new Azure.RedHatOpenShift.Inputs.ClusterApiServerProfileArgs\n {\n Visibility = \"Public\",\n },\n IngressProfile = new Azure.RedHatOpenShift.Inputs.ClusterIngressProfileArgs\n {\n Visibility = \"Public\",\n },\n WorkerProfile = new Azure.RedHatOpenShift.Inputs.ClusterWorkerProfileArgs\n {\n VmSize = \"Standard_D4s_v3\",\n DiskSizeGb = 128,\n NodeCount = 3,\n SubnetId = workerSubnet.Id,\n },\n ServicePrincipal = new Azure.RedHatOpenShift.Inputs.ClusterServicePrincipalArgs\n {\n ClientId = exampleApplication.ClientId,\n ClientSecret = exampleServicePrincipalPassword.Value,\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n roleNetwork1,\n roleNetwork2,\n },\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"consoleUrl\"] = exampleCluster.ConsoleUrl,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/redhatopenshift\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = azuread.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleApplication, err := azuread.NewApplication(ctx, \"example\", \u0026azuread.ApplicationArgs{\n\t\t\tDisplayName: pulumi.String(\"example-aro\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePrincipal, err := azuread.NewServicePrincipal(ctx, \"example\", \u0026azuread.ServicePrincipalArgs{\n\t\t\tClientId: exampleApplication.ClientId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePrincipalPassword, err := azuread.NewServicePrincipalPassword(ctx, \"example\", \u0026azuread.ServicePrincipalPasswordArgs{\n\t\t\tServicePrincipalId: exampleServicePrincipal.ObjectId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tredhatopenshift, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tClientId: pulumi.StringRef(\"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/22\"),\n\t\t\t},\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troleNetwork1, err := authorization.NewAssignment(ctx, \"role_network1\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleVirtualNetwork.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Network Contributor\"),\n\t\t\tPrincipalId: exampleServicePrincipal.ObjectId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troleNetwork2, err := authorization.NewAssignment(ctx, \"role_network2\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleVirtualNetwork.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Network Contributor\"),\n\t\t\tPrincipalId: pulumi.String(redhatopenshift.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmainSubnet, err := network.NewSubnet(ctx, \"main_subnet\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"main-subnet\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/23\"),\n\t\t\t},\n\t\t\tServiceEndpoints: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Microsoft.Storage\"),\n\t\t\t\tpulumi.String(\"Microsoft.ContainerRegistry\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tworkerSubnet, err := network.NewSubnet(ctx, \"worker_subnet\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"worker-subnet\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.2.0/23\"),\n\t\t\t},\n\t\t\tServiceEndpoints: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Microsoft.Storage\"),\n\t\t\t\tpulumi.String(\"Microsoft.ContainerRegistry\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := redhatopenshift.NewCluster(ctx, \"example\", \u0026redhatopenshift.ClusterArgs{\n\t\t\tName: pulumi.String(\"examplearo\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tClusterProfile: \u0026redhatopenshift.ClusterClusterProfileArgs{\n\t\t\t\tDomain: pulumi.String(\"aro-example.com\"),\n\t\t\t\tVersion: pulumi.String(\"4.13.23\"),\n\t\t\t},\n\t\t\tNetworkProfile: \u0026redhatopenshift.ClusterNetworkProfileArgs{\n\t\t\t\tPodCidr: pulumi.String(\"10.128.0.0/14\"),\n\t\t\t\tServiceCidr: pulumi.String(\"172.30.0.0/16\"),\n\t\t\t},\n\t\t\tMainProfile: \u0026redhatopenshift.ClusterMainProfileArgs{\n\t\t\t\tVmSize: pulumi.String(\"Standard_D8s_v3\"),\n\t\t\t\tSubnetId: mainSubnet.ID(),\n\t\t\t},\n\t\t\tApiServerProfile: \u0026redhatopenshift.ClusterApiServerProfileArgs{\n\t\t\t\tVisibility: pulumi.String(\"Public\"),\n\t\t\t},\n\t\t\tIngressProfile: \u0026redhatopenshift.ClusterIngressProfileArgs{\n\t\t\t\tVisibility: pulumi.String(\"Public\"),\n\t\t\t},\n\t\t\tWorkerProfile: \u0026redhatopenshift.ClusterWorkerProfileArgs{\n\t\t\t\tVmSize: pulumi.String(\"Standard_D4s_v3\"),\n\t\t\t\tDiskSizeGb: pulumi.Int(128),\n\t\t\t\tNodeCount: pulumi.Int(3),\n\t\t\t\tSubnetId: workerSubnet.ID(),\n\t\t\t},\n\t\t\tServicePrincipal: \u0026redhatopenshift.ClusterServicePrincipalArgs{\n\t\t\t\tClientId: exampleApplication.ClientId,\n\t\t\t\tClientSecret: exampleServicePrincipalPassword.Value,\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\troleNetwork1,\n\t\t\troleNetwork2,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"consoleUrl\", exampleCluster.ConsoleUrl)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.Application;\nimport com.pulumi.azuread.ApplicationArgs;\nimport com.pulumi.azuread.ServicePrincipal;\nimport com.pulumi.azuread.ServicePrincipalArgs;\nimport com.pulumi.azuread.ServicePrincipalPassword;\nimport com.pulumi.azuread.ServicePrincipalPasswordArgs;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.redhatopenshift.Cluster;\nimport com.pulumi.azure.redhatopenshift.ClusterArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterClusterProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterNetworkProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterMainProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterApiServerProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterIngressProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterWorkerProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterServicePrincipalArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetClientConfig = AzureadFunctions.getClientConfig();\n\n var exampleApplication = new Application(\"exampleApplication\", ApplicationArgs.builder()\n .displayName(\"example-aro\")\n .build());\n\n var exampleServicePrincipal = new ServicePrincipal(\"exampleServicePrincipal\", ServicePrincipalArgs.builder()\n .clientId(exampleApplication.clientId())\n .build());\n\n var exampleServicePrincipalPassword = new ServicePrincipalPassword(\"exampleServicePrincipalPassword\", ServicePrincipalPasswordArgs.builder()\n .servicePrincipalId(exampleServicePrincipal.objectId())\n .build());\n\n final var redhatopenshift = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .clientId(\"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\")\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West US\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.0.0.0/22\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .build());\n\n var roleNetwork1 = new Assignment(\"roleNetwork1\", AssignmentArgs.builder()\n .scope(exampleVirtualNetwork.id())\n .roleDefinitionName(\"Network Contributor\")\n .principalId(exampleServicePrincipal.objectId())\n .build());\n\n var roleNetwork2 = new Assignment(\"roleNetwork2\", AssignmentArgs.builder()\n .scope(exampleVirtualNetwork.id())\n .roleDefinitionName(\"Network Contributor\")\n .principalId(redhatopenshift.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .build());\n\n var mainSubnet = new Subnet(\"mainSubnet\", SubnetArgs.builder()\n .name(\"main-subnet\")\n .resourceGroupName(exampleResourceGroup.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.0.0/23\")\n .serviceEndpoints( \n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\")\n .build());\n\n var workerSubnet = new Subnet(\"workerSubnet\", SubnetArgs.builder()\n .name(\"worker-subnet\")\n .resourceGroupName(exampleResourceGroup.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.2.0/23\")\n .serviceEndpoints( \n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"examplearo\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .clusterProfile(ClusterClusterProfileArgs.builder()\n .domain(\"aro-example.com\")\n .version(\"4.13.23\")\n .build())\n .networkProfile(ClusterNetworkProfileArgs.builder()\n .podCidr(\"10.128.0.0/14\")\n .serviceCidr(\"172.30.0.0/16\")\n .build())\n .mainProfile(ClusterMainProfileArgs.builder()\n .vmSize(\"Standard_D8s_v3\")\n .subnetId(mainSubnet.id())\n .build())\n .apiServerProfile(ClusterApiServerProfileArgs.builder()\n .visibility(\"Public\")\n .build())\n .ingressProfile(ClusterIngressProfileArgs.builder()\n .visibility(\"Public\")\n .build())\n .workerProfile(ClusterWorkerProfileArgs.builder()\n .vmSize(\"Standard_D4s_v3\")\n .diskSizeGb(128)\n .nodeCount(3)\n .subnetId(workerSubnet.id())\n .build())\n .servicePrincipal(ClusterServicePrincipalArgs.builder()\n .clientId(exampleApplication.clientId())\n .clientSecret(exampleServicePrincipalPassword.value())\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n roleNetwork1,\n roleNetwork2)\n .build());\n\n ctx.export(\"consoleUrl\", exampleCluster.consoleUrl());\n }\n}\n```\n```yaml\nresources:\n exampleApplication:\n type: azuread:Application\n name: example\n properties:\n displayName: example-aro\n exampleServicePrincipal:\n type: azuread:ServicePrincipal\n name: example\n properties:\n clientId: ${exampleApplication.clientId}\n exampleServicePrincipalPassword:\n type: azuread:ServicePrincipalPassword\n name: example\n properties:\n servicePrincipalId: ${exampleServicePrincipal.objectId}\n roleNetwork1:\n type: azure:authorization:Assignment\n name: role_network1\n properties:\n scope: ${exampleVirtualNetwork.id}\n roleDefinitionName: Network Contributor\n principalId: ${exampleServicePrincipal.objectId}\n roleNetwork2:\n type: azure:authorization:Assignment\n name: role_network2\n properties:\n scope: ${exampleVirtualNetwork.id}\n roleDefinitionName: Network Contributor\n principalId: ${redhatopenshift.objectId}\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West US\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.0.0.0/22\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n mainSubnet:\n type: azure:network:Subnet\n name: main_subnet\n properties:\n name: main-subnet\n resourceGroupName: ${exampleResourceGroup.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.0.0/23\n serviceEndpoints:\n - Microsoft.Storage\n - Microsoft.ContainerRegistry\n workerSubnet:\n type: azure:network:Subnet\n name: worker_subnet\n properties:\n name: worker-subnet\n resourceGroupName: ${exampleResourceGroup.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.2.0/23\n serviceEndpoints:\n - Microsoft.Storage\n - Microsoft.ContainerRegistry\n exampleCluster:\n type: azure:redhatopenshift:Cluster\n name: example\n properties:\n name: examplearo\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n clusterProfile:\n domain: aro-example.com\n version: 4.13.23\n networkProfile:\n podCidr: 10.128.0.0/14\n serviceCidr: 172.30.0.0/16\n mainProfile:\n vmSize: Standard_D8s_v3\n subnetId: ${mainSubnet.id}\n apiServerProfile:\n visibility: Public\n ingressProfile:\n visibility: Public\n workerProfile:\n vmSize: Standard_D4s_v3\n diskSizeGb: 128\n nodeCount: 3\n subnetId: ${workerSubnet.id}\n servicePrincipal:\n clientId: ${exampleApplication.clientId}\n clientSecret: ${exampleServicePrincipalPassword.value}\n options:\n dependson:\n - ${roleNetwork1}\n - ${roleNetwork2}\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetClientConfig:\n fn::invoke:\n Function: azuread:getClientConfig\n Arguments: {}\n redhatopenshift:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n clientId: f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\noutputs:\n consoleUrl: ${exampleCluster.consoleUrl}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRed Hat OpenShift Clusters can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:redhatopenshift/cluster:Cluster cluster1 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/group1/providers/Microsoft.RedHatOpenShift/openShiftClusters/cluster1\n```\n\n", + "description": "Manages a fully managed Azure Red Hat OpenShift Cluster (also known as ARO).\n\n\u003e **Note:** All arguments including the client secret will be stored in the raw state as plain-text. [Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst example = azure.core.getClientConfig({});\nconst exampleGetClientConfig = azuread.getClientConfig({});\nconst exampleApplication = new azuread.Application(\"example\", {displayName: \"example-aro\"});\nconst exampleServicePrincipal = new azuread.ServicePrincipal(\"example\", {clientId: exampleApplication.clientId});\nconst exampleServicePrincipalPassword = new azuread.ServicePrincipalPassword(\"example\", {servicePrincipalId: exampleServicePrincipal.objectId});\nconst redhatopenshift = azuread.getServicePrincipal({\n clientId: \"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\",\n});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West US\",\n});\nconst exampleVirtualNetwork = new azure.network.VirtualNetwork(\"example\", {\n name: \"example-vnet\",\n addressSpaces: [\"10.0.0.0/22\"],\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n});\nconst roleNetwork1 = new azure.authorization.Assignment(\"role_network1\", {\n scope: exampleVirtualNetwork.id,\n roleDefinitionName: \"Network Contributor\",\n principalId: exampleServicePrincipal.objectId,\n});\nconst roleNetwork2 = new azure.authorization.Assignment(\"role_network2\", {\n scope: exampleVirtualNetwork.id,\n roleDefinitionName: \"Network Contributor\",\n principalId: redhatopenshift.then(redhatopenshift =\u003e redhatopenshift.objectId),\n});\nconst mainSubnet = new azure.network.Subnet(\"main_subnet\", {\n name: \"main-subnet\",\n resourceGroupName: exampleResourceGroup.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.0.0/23\"],\n serviceEndpoints: [\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n ],\n});\nconst workerSubnet = new azure.network.Subnet(\"worker_subnet\", {\n name: \"worker-subnet\",\n resourceGroupName: exampleResourceGroup.name,\n virtualNetworkName: exampleVirtualNetwork.name,\n addressPrefixes: [\"10.0.2.0/23\"],\n serviceEndpoints: [\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n ],\n});\nconst exampleCluster = new azure.redhatopenshift.Cluster(\"example\", {\n name: \"examplearo\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n clusterProfile: {\n domain: \"aro-example.com\",\n version: \"4.13.23\",\n },\n networkProfile: {\n podCidr: \"10.128.0.0/14\",\n serviceCidr: \"172.30.0.0/16\",\n },\n mainProfile: {\n vmSize: \"Standard_D8s_v3\",\n subnetId: mainSubnet.id,\n },\n apiServerProfile: {\n visibility: \"Public\",\n },\n ingressProfile: {\n visibility: \"Public\",\n },\n workerProfile: {\n vmSize: \"Standard_D4s_v3\",\n diskSizeGb: 128,\n nodeCount: 3,\n subnetId: workerSubnet.id,\n },\n servicePrincipal: {\n clientId: exampleApplication.clientId,\n clientSecret: exampleServicePrincipalPassword.value,\n },\n}, {\n dependsOn: [\n roleNetwork1,\n roleNetwork2,\n ],\n});\nexport const consoleUrl = exampleCluster.consoleUrl;\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\nexample = azure.core.get_client_config()\nexample_get_client_config = azuread.get_client_config()\nexample_application = azuread.Application(\"example\", display_name=\"example-aro\")\nexample_service_principal = azuread.ServicePrincipal(\"example\", client_id=example_application.client_id)\nexample_service_principal_password = azuread.ServicePrincipalPassword(\"example\", service_principal_id=example_service_principal.object_id)\nredhatopenshift = azuread.get_service_principal(client_id=\"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\")\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West US\")\nexample_virtual_network = azure.network.VirtualNetwork(\"example\",\n name=\"example-vnet\",\n address_spaces=[\"10.0.0.0/22\"],\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name)\nrole_network1 = azure.authorization.Assignment(\"role_network1\",\n scope=example_virtual_network.id,\n role_definition_name=\"Network Contributor\",\n principal_id=example_service_principal.object_id)\nrole_network2 = azure.authorization.Assignment(\"role_network2\",\n scope=example_virtual_network.id,\n role_definition_name=\"Network Contributor\",\n principal_id=redhatopenshift.object_id)\nmain_subnet = azure.network.Subnet(\"main_subnet\",\n name=\"main-subnet\",\n resource_group_name=example_resource_group.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.0.0/23\"],\n service_endpoints=[\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n ])\nworker_subnet = azure.network.Subnet(\"worker_subnet\",\n name=\"worker-subnet\",\n resource_group_name=example_resource_group.name,\n virtual_network_name=example_virtual_network.name,\n address_prefixes=[\"10.0.2.0/23\"],\n service_endpoints=[\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n ])\nexample_cluster = azure.redhatopenshift.Cluster(\"example\",\n name=\"examplearo\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n cluster_profile={\n \"domain\": \"aro-example.com\",\n \"version\": \"4.13.23\",\n },\n network_profile={\n \"pod_cidr\": \"10.128.0.0/14\",\n \"service_cidr\": \"172.30.0.0/16\",\n },\n main_profile={\n \"vm_size\": \"Standard_D8s_v3\",\n \"subnet_id\": main_subnet.id,\n },\n api_server_profile={\n \"visibility\": \"Public\",\n },\n ingress_profile={\n \"visibility\": \"Public\",\n },\n worker_profile={\n \"vm_size\": \"Standard_D4s_v3\",\n \"disk_size_gb\": 128,\n \"node_count\": 3,\n \"subnet_id\": worker_subnet.id,\n },\n service_principal={\n \"client_id\": example_application.client_id,\n \"client_secret\": example_service_principal_password.value,\n },\n opts = pulumi.ResourceOptions(depends_on=[\n role_network1,\n role_network2,\n ]))\npulumi.export(\"consoleUrl\", example_cluster.console_url)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetClientConfig = AzureAD.GetClientConfig.Invoke();\n\n var exampleApplication = new AzureAD.Application(\"example\", new()\n {\n DisplayName = \"example-aro\",\n });\n\n var exampleServicePrincipal = new AzureAD.ServicePrincipal(\"example\", new()\n {\n ClientId = exampleApplication.ClientId,\n });\n\n var exampleServicePrincipalPassword = new AzureAD.ServicePrincipalPassword(\"example\", new()\n {\n ServicePrincipalId = exampleServicePrincipal.ObjectId,\n });\n\n var redhatopenshift = AzureAD.GetServicePrincipal.Invoke(new()\n {\n ClientId = \"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\",\n });\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West US\",\n });\n\n var exampleVirtualNetwork = new Azure.Network.VirtualNetwork(\"example\", new()\n {\n Name = \"example-vnet\",\n AddressSpaces = new[]\n {\n \"10.0.0.0/22\",\n },\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n });\n\n var roleNetwork1 = new Azure.Authorization.Assignment(\"role_network1\", new()\n {\n Scope = exampleVirtualNetwork.Id,\n RoleDefinitionName = \"Network Contributor\",\n PrincipalId = exampleServicePrincipal.ObjectId,\n });\n\n var roleNetwork2 = new Azure.Authorization.Assignment(\"role_network2\", new()\n {\n Scope = exampleVirtualNetwork.Id,\n RoleDefinitionName = \"Network Contributor\",\n PrincipalId = redhatopenshift.Apply(getServicePrincipalResult =\u003e getServicePrincipalResult.ObjectId),\n });\n\n var mainSubnet = new Azure.Network.Subnet(\"main_subnet\", new()\n {\n Name = \"main-subnet\",\n ResourceGroupName = exampleResourceGroup.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.0.0/23\",\n },\n ServiceEndpoints = new[]\n {\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n },\n });\n\n var workerSubnet = new Azure.Network.Subnet(\"worker_subnet\", new()\n {\n Name = \"worker-subnet\",\n ResourceGroupName = exampleResourceGroup.Name,\n VirtualNetworkName = exampleVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"10.0.2.0/23\",\n },\n ServiceEndpoints = new[]\n {\n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\",\n },\n });\n\n var exampleCluster = new Azure.RedHatOpenShift.Cluster(\"example\", new()\n {\n Name = \"examplearo\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n ClusterProfile = new Azure.RedHatOpenShift.Inputs.ClusterClusterProfileArgs\n {\n Domain = \"aro-example.com\",\n Version = \"4.13.23\",\n },\n NetworkProfile = new Azure.RedHatOpenShift.Inputs.ClusterNetworkProfileArgs\n {\n PodCidr = \"10.128.0.0/14\",\n ServiceCidr = \"172.30.0.0/16\",\n },\n MainProfile = new Azure.RedHatOpenShift.Inputs.ClusterMainProfileArgs\n {\n VmSize = \"Standard_D8s_v3\",\n SubnetId = mainSubnet.Id,\n },\n ApiServerProfile = new Azure.RedHatOpenShift.Inputs.ClusterApiServerProfileArgs\n {\n Visibility = \"Public\",\n },\n IngressProfile = new Azure.RedHatOpenShift.Inputs.ClusterIngressProfileArgs\n {\n Visibility = \"Public\",\n },\n WorkerProfile = new Azure.RedHatOpenShift.Inputs.ClusterWorkerProfileArgs\n {\n VmSize = \"Standard_D4s_v3\",\n DiskSizeGb = 128,\n NodeCount = 3,\n SubnetId = workerSubnet.Id,\n },\n ServicePrincipal = new Azure.RedHatOpenShift.Inputs.ClusterServicePrincipalArgs\n {\n ClientId = exampleApplication.ClientId,\n ClientSecret = exampleServicePrincipalPassword.Value,\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n roleNetwork1,\n roleNetwork2,\n },\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"consoleUrl\"] = exampleCluster.ConsoleUrl,\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/redhatopenshift\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = azuread.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleApplication, err := azuread.NewApplication(ctx, \"example\", \u0026azuread.ApplicationArgs{\n\t\t\tDisplayName: pulumi.String(\"example-aro\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePrincipal, err := azuread.NewServicePrincipal(ctx, \"example\", \u0026azuread.ServicePrincipalArgs{\n\t\t\tClientId: exampleApplication.ClientId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleServicePrincipalPassword, err := azuread.NewServicePrincipalPassword(ctx, \"example\", \u0026azuread.ServicePrincipalPasswordArgs{\n\t\t\tServicePrincipalId: exampleServicePrincipal.ObjectId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tredhatopenshift, err := azuread.LookupServicePrincipal(ctx, \u0026azuread.LookupServicePrincipalArgs{\n\t\t\tClientId: pulumi.StringRef(\"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"example\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"example-vnet\"),\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/22\"),\n\t\t\t},\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troleNetwork1, err := authorization.NewAssignment(ctx, \"role_network1\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleVirtualNetwork.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Network Contributor\"),\n\t\t\tPrincipalId: exampleServicePrincipal.ObjectId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troleNetwork2, err := authorization.NewAssignment(ctx, \"role_network2\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: exampleVirtualNetwork.ID(),\n\t\t\tRoleDefinitionName: pulumi.String(\"Network Contributor\"),\n\t\t\tPrincipalId: pulumi.String(redhatopenshift.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmainSubnet, err := network.NewSubnet(ctx, \"main_subnet\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"main-subnet\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/23\"),\n\t\t\t},\n\t\t\tServiceEndpoints: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Microsoft.Storage\"),\n\t\t\t\tpulumi.String(\"Microsoft.ContainerRegistry\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tworkerSubnet, err := network.NewSubnet(ctx, \"worker_subnet\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"worker-subnet\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tVirtualNetworkName: exampleVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.2.0/23\"),\n\t\t\t},\n\t\t\tServiceEndpoints: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Microsoft.Storage\"),\n\t\t\t\tpulumi.String(\"Microsoft.ContainerRegistry\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCluster, err := redhatopenshift.NewCluster(ctx, \"example\", \u0026redhatopenshift.ClusterArgs{\n\t\t\tName: pulumi.String(\"examplearo\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tClusterProfile: \u0026redhatopenshift.ClusterClusterProfileArgs{\n\t\t\t\tDomain: pulumi.String(\"aro-example.com\"),\n\t\t\t\tVersion: pulumi.String(\"4.13.23\"),\n\t\t\t},\n\t\t\tNetworkProfile: \u0026redhatopenshift.ClusterNetworkProfileArgs{\n\t\t\t\tPodCidr: pulumi.String(\"10.128.0.0/14\"),\n\t\t\t\tServiceCidr: pulumi.String(\"172.30.0.0/16\"),\n\t\t\t},\n\t\t\tMainProfile: \u0026redhatopenshift.ClusterMainProfileArgs{\n\t\t\t\tVmSize: pulumi.String(\"Standard_D8s_v3\"),\n\t\t\t\tSubnetId: mainSubnet.ID(),\n\t\t\t},\n\t\t\tApiServerProfile: \u0026redhatopenshift.ClusterApiServerProfileArgs{\n\t\t\t\tVisibility: pulumi.String(\"Public\"),\n\t\t\t},\n\t\t\tIngressProfile: \u0026redhatopenshift.ClusterIngressProfileArgs{\n\t\t\t\tVisibility: pulumi.String(\"Public\"),\n\t\t\t},\n\t\t\tWorkerProfile: \u0026redhatopenshift.ClusterWorkerProfileArgs{\n\t\t\t\tVmSize: pulumi.String(\"Standard_D4s_v3\"),\n\t\t\t\tDiskSizeGb: pulumi.Int(128),\n\t\t\t\tNodeCount: pulumi.Int(3),\n\t\t\t\tSubnetId: workerSubnet.ID(),\n\t\t\t},\n\t\t\tServicePrincipal: \u0026redhatopenshift.ClusterServicePrincipalArgs{\n\t\t\t\tClientId: exampleApplication.ClientId,\n\t\t\t\tClientSecret: exampleServicePrincipalPassword.Value,\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\troleNetwork1,\n\t\t\troleNetwork2,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"consoleUrl\", exampleCluster.ConsoleUrl)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.Application;\nimport com.pulumi.azuread.ApplicationArgs;\nimport com.pulumi.azuread.ServicePrincipal;\nimport com.pulumi.azuread.ServicePrincipalArgs;\nimport com.pulumi.azuread.ServicePrincipalPassword;\nimport com.pulumi.azuread.ServicePrincipalPasswordArgs;\nimport com.pulumi.azuread.inputs.GetServicePrincipalArgs;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.redhatopenshift.Cluster;\nimport com.pulumi.azure.redhatopenshift.ClusterArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterClusterProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterNetworkProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterMainProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterApiServerProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterIngressProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterWorkerProfileArgs;\nimport com.pulumi.azure.redhatopenshift.inputs.ClusterServicePrincipalArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetClientConfig = AzureadFunctions.getClientConfig();\n\n var exampleApplication = new Application(\"exampleApplication\", ApplicationArgs.builder()\n .displayName(\"example-aro\")\n .build());\n\n var exampleServicePrincipal = new ServicePrincipal(\"exampleServicePrincipal\", ServicePrincipalArgs.builder()\n .clientId(exampleApplication.clientId())\n .build());\n\n var exampleServicePrincipalPassword = new ServicePrincipalPassword(\"exampleServicePrincipalPassword\", ServicePrincipalPasswordArgs.builder()\n .servicePrincipalId(exampleServicePrincipal.objectId())\n .build());\n\n final var redhatopenshift = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()\n .clientId(\"f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\")\n .build());\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West US\")\n .build());\n\n var exampleVirtualNetwork = new VirtualNetwork(\"exampleVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"example-vnet\")\n .addressSpaces(\"10.0.0.0/22\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .build());\n\n var roleNetwork1 = new Assignment(\"roleNetwork1\", AssignmentArgs.builder()\n .scope(exampleVirtualNetwork.id())\n .roleDefinitionName(\"Network Contributor\")\n .principalId(exampleServicePrincipal.objectId())\n .build());\n\n var roleNetwork2 = new Assignment(\"roleNetwork2\", AssignmentArgs.builder()\n .scope(exampleVirtualNetwork.id())\n .roleDefinitionName(\"Network Contributor\")\n .principalId(redhatopenshift.applyValue(getServicePrincipalResult -\u003e getServicePrincipalResult.objectId()))\n .build());\n\n var mainSubnet = new Subnet(\"mainSubnet\", SubnetArgs.builder()\n .name(\"main-subnet\")\n .resourceGroupName(exampleResourceGroup.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.0.0/23\")\n .serviceEndpoints( \n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\")\n .build());\n\n var workerSubnet = new Subnet(\"workerSubnet\", SubnetArgs.builder()\n .name(\"worker-subnet\")\n .resourceGroupName(exampleResourceGroup.name())\n .virtualNetworkName(exampleVirtualNetwork.name())\n .addressPrefixes(\"10.0.2.0/23\")\n .serviceEndpoints( \n \"Microsoft.Storage\",\n \"Microsoft.ContainerRegistry\")\n .build());\n\n var exampleCluster = new Cluster(\"exampleCluster\", ClusterArgs.builder()\n .name(\"examplearo\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .clusterProfile(ClusterClusterProfileArgs.builder()\n .domain(\"aro-example.com\")\n .version(\"4.13.23\")\n .build())\n .networkProfile(ClusterNetworkProfileArgs.builder()\n .podCidr(\"10.128.0.0/14\")\n .serviceCidr(\"172.30.0.0/16\")\n .build())\n .mainProfile(ClusterMainProfileArgs.builder()\n .vmSize(\"Standard_D8s_v3\")\n .subnetId(mainSubnet.id())\n .build())\n .apiServerProfile(ClusterApiServerProfileArgs.builder()\n .visibility(\"Public\")\n .build())\n .ingressProfile(ClusterIngressProfileArgs.builder()\n .visibility(\"Public\")\n .build())\n .workerProfile(ClusterWorkerProfileArgs.builder()\n .vmSize(\"Standard_D4s_v3\")\n .diskSizeGb(128)\n .nodeCount(3)\n .subnetId(workerSubnet.id())\n .build())\n .servicePrincipal(ClusterServicePrincipalArgs.builder()\n .clientId(exampleApplication.clientId())\n .clientSecret(exampleServicePrincipalPassword.value())\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n roleNetwork1,\n roleNetwork2)\n .build());\n\n ctx.export(\"consoleUrl\", exampleCluster.consoleUrl());\n }\n}\n```\n```yaml\nresources:\n exampleApplication:\n type: azuread:Application\n name: example\n properties:\n displayName: example-aro\n exampleServicePrincipal:\n type: azuread:ServicePrincipal\n name: example\n properties:\n clientId: ${exampleApplication.clientId}\n exampleServicePrincipalPassword:\n type: azuread:ServicePrincipalPassword\n name: example\n properties:\n servicePrincipalId: ${exampleServicePrincipal.objectId}\n roleNetwork1:\n type: azure:authorization:Assignment\n name: role_network1\n properties:\n scope: ${exampleVirtualNetwork.id}\n roleDefinitionName: Network Contributor\n principalId: ${exampleServicePrincipal.objectId}\n roleNetwork2:\n type: azure:authorization:Assignment\n name: role_network2\n properties:\n scope: ${exampleVirtualNetwork.id}\n roleDefinitionName: Network Contributor\n principalId: ${redhatopenshift.objectId}\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West US\n exampleVirtualNetwork:\n type: azure:network:VirtualNetwork\n name: example\n properties:\n name: example-vnet\n addressSpaces:\n - 10.0.0.0/22\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n mainSubnet:\n type: azure:network:Subnet\n name: main_subnet\n properties:\n name: main-subnet\n resourceGroupName: ${exampleResourceGroup.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.0.0/23\n serviceEndpoints:\n - Microsoft.Storage\n - Microsoft.ContainerRegistry\n workerSubnet:\n type: azure:network:Subnet\n name: worker_subnet\n properties:\n name: worker-subnet\n resourceGroupName: ${exampleResourceGroup.name}\n virtualNetworkName: ${exampleVirtualNetwork.name}\n addressPrefixes:\n - 10.0.2.0/23\n serviceEndpoints:\n - Microsoft.Storage\n - Microsoft.ContainerRegistry\n exampleCluster:\n type: azure:redhatopenshift:Cluster\n name: example\n properties:\n name: examplearo\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n clusterProfile:\n domain: aro-example.com\n version: 4.13.23\n networkProfile:\n podCidr: 10.128.0.0/14\n serviceCidr: 172.30.0.0/16\n mainProfile:\n vmSize: Standard_D8s_v3\n subnetId: ${mainSubnet.id}\n apiServerProfile:\n visibility: Public\n ingressProfile:\n visibility: Public\n workerProfile:\n vmSize: Standard_D4s_v3\n diskSizeGb: 128\n nodeCount: 3\n subnetId: ${workerSubnet.id}\n servicePrincipal:\n clientId: ${exampleApplication.clientId}\n clientSecret: ${exampleServicePrincipalPassword.value}\n options:\n dependson:\n - ${roleNetwork1}\n - ${roleNetwork2}\nvariables:\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetClientConfig:\n fn::invoke:\n Function: azuread:getClientConfig\n Arguments: {}\n redhatopenshift:\n fn::invoke:\n Function: azuread:getServicePrincipal\n Arguments:\n clientId: f1dd0a37-89c6-4e07-bcd1-ffd3d43d8875\noutputs:\n consoleUrl: ${exampleCluster.consoleUrl}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRed Hat OpenShift Clusters can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:redhatopenshift/cluster:Cluster cluster1 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/group1/providers/Microsoft.RedHatOpenShift/openShiftClusters/cluster1\n```\n\n", "properties": { "apiServerProfile": { "$ref": "#/types/azure:redhatopenshift/ClusterApiServerProfile:ClusterApiServerProfile", @@ -239535,7 +239535,7 @@ } }, "azure:redis/cache:Cache": { - "description": "Manages a Redis Cache.\n\n\u003e **Note:** Redis version 4 is being retired and no longer supports creating new instances. Version 4 will be removed in a future release. [Redis Version 4 Retirement](https://learn.microsoft.com/azure/azure-cache-for-redis/cache-retired-features#important-upgrade-timelines)\n\n## Example Usage\n\nThis example provisions a Standard Redis Cache.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\n// NOTE: the Name used for Redis needs to be globally unique\nconst exampleCache = new azure.redis.Cache(\"example\", {\n name: \"example-cache\",\n location: example.location,\n resourceGroupName: example.name,\n capacity: 2,\n family: \"C\",\n skuName: \"Standard\",\n nonSslPortEnabled: false,\n minimumTlsVersion: \"1.2\",\n redisConfiguration: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\n# NOTE: the Name used for Redis needs to be globally unique\nexample_cache = azure.redis.Cache(\"example\",\n name=\"example-cache\",\n location=example.location,\n resource_group_name=example.name,\n capacity=2,\n family=\"C\",\n sku_name=\"Standard\",\n non_ssl_port_enabled=False,\n minimum_tls_version=\"1.2\",\n redis_configuration={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n // NOTE: the Name used for Redis needs to be globally unique\n var exampleCache = new Azure.Redis.Cache(\"example\", new()\n {\n Name = \"example-cache\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Capacity = 2,\n Family = \"C\",\n SkuName = \"Standard\",\n NonSslPortEnabled = false,\n MinimumTlsVersion = \"1.2\",\n RedisConfiguration = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/redis\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// NOTE: the Name used for Redis needs to be globally unique\n\t\t_, err = redis.NewCache(ctx, \"example\", \u0026redis.CacheArgs{\n\t\t\tName: pulumi.String(\"example-cache\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tCapacity: pulumi.Int(2),\n\t\t\tFamily: pulumi.String(\"C\"),\n\t\t\tSkuName: pulumi.String(\"Standard\"),\n\t\t\tNonSslPortEnabled: pulumi.Bool(false),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tRedisConfiguration: nil,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.redis.Cache;\nimport com.pulumi.azure.redis.CacheArgs;\nimport com.pulumi.azure.redis.inputs.CacheRedisConfigurationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n // NOTE: the Name used for Redis needs to be globally unique\n var exampleCache = new Cache(\"exampleCache\", CacheArgs.builder()\n .name(\"example-cache\")\n .location(example.location())\n .resourceGroupName(example.name())\n .capacity(2)\n .family(\"C\")\n .skuName(\"Standard\")\n .nonSslPortEnabled(false)\n .minimumTlsVersion(\"1.2\")\n .redisConfiguration()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n # NOTE: the Name used for Redis needs to be globally unique\n exampleCache:\n type: azure:redis:Cache\n name: example\n properties:\n name: example-cache\n location: ${example.location}\n resourceGroupName: ${example.name}\n capacity: 2\n family: C\n skuName: Standard\n nonSslPortEnabled: false\n minimumTlsVersion: '1.2'\n redisConfiguration: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Relevant Links\n\n* [Azure Cache for Redis planning](https://docs.microsoft.com/azure/azure-cache-for-redis/cache-planning-faq)\n* [Redis: Available Configuration Settings](https://redis.io/topics/config)\n\n## Import\n\nRedis Cache's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:redis/cache:Cache cache1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Cache/redis/cache1\n```\n\n", + "description": "Manages a Redis Cache.\n\n\u003e **Note:** Redis version 4 is being retired and no longer supports creating new instances. Version 4 will be removed in a future release. [Redis Version 4 Retirement](https://learn.microsoft.com/azure/azure-cache-for-redis/cache-retired-features#important-upgrade-timelines)\n\n## Example Usage\n\nThis example provisions a Standard Redis Cache.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\n// NOTE: the Name used for Redis needs to be globally unique\nconst exampleCache = new azure.redis.Cache(\"example\", {\n name: \"example-cache\",\n location: example.location,\n resourceGroupName: example.name,\n capacity: 2,\n family: \"C\",\n skuName: \"Standard\",\n nonSslPortEnabled: false,\n minimumTlsVersion: \"1.2\",\n redisConfiguration: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\n# NOTE: the Name used for Redis needs to be globally unique\nexample_cache = azure.redis.Cache(\"example\",\n name=\"example-cache\",\n location=example.location,\n resource_group_name=example.name,\n capacity=2,\n family=\"C\",\n sku_name=\"Standard\",\n non_ssl_port_enabled=False,\n minimum_tls_version=\"1.2\",\n redis_configuration={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n // NOTE: the Name used for Redis needs to be globally unique\n var exampleCache = new Azure.Redis.Cache(\"example\", new()\n {\n Name = \"example-cache\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Capacity = 2,\n Family = \"C\",\n SkuName = \"Standard\",\n NonSslPortEnabled = false,\n MinimumTlsVersion = \"1.2\",\n RedisConfiguration = null,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/redis\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// NOTE: the Name used for Redis needs to be globally unique\n\t\t_, err = redis.NewCache(ctx, \"example\", \u0026redis.CacheArgs{\n\t\t\tName: pulumi.String(\"example-cache\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tCapacity: pulumi.Int(2),\n\t\t\tFamily: pulumi.String(\"C\"),\n\t\t\tSkuName: pulumi.String(\"Standard\"),\n\t\t\tNonSslPortEnabled: pulumi.Bool(false),\n\t\t\tMinimumTlsVersion: pulumi.String(\"1.2\"),\n\t\t\tRedisConfiguration: \u0026redis.CacheRedisConfigurationArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.redis.Cache;\nimport com.pulumi.azure.redis.CacheArgs;\nimport com.pulumi.azure.redis.inputs.CacheRedisConfigurationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n // NOTE: the Name used for Redis needs to be globally unique\n var exampleCache = new Cache(\"exampleCache\", CacheArgs.builder()\n .name(\"example-cache\")\n .location(example.location())\n .resourceGroupName(example.name())\n .capacity(2)\n .family(\"C\")\n .skuName(\"Standard\")\n .nonSslPortEnabled(false)\n .minimumTlsVersion(\"1.2\")\n .redisConfiguration()\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n # NOTE: the Name used for Redis needs to be globally unique\n exampleCache:\n type: azure:redis:Cache\n name: example\n properties:\n name: example-cache\n location: ${example.location}\n resourceGroupName: ${example.name}\n capacity: 2\n family: C\n skuName: Standard\n nonSslPortEnabled: false\n minimumTlsVersion: '1.2'\n redisConfiguration: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Relevant Links\n\n* [Azure Cache for Redis planning](https://docs.microsoft.com/azure/azure-cache-for-redis/cache-planning-faq)\n* [Redis: Available Configuration Settings](https://redis.io/topics/config)\n\n## Import\n\nRedis Cache's can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:redis/cache:Cache cache1 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Cache/redis/cache1\n```\n\n", "properties": { "accessKeysAuthenticationEnabled": { "type": "boolean", @@ -241189,7 +241189,7 @@ } }, "azure:role/assignment:Assignment": { - "description": "Assigns a given Principal (User or Group) to a given Role.\n\n## Example Usage\n\n### Using A Built-In Role)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionName: \"Reader\",\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_assignment = azure.authorization.Assignment(\"example\",\n scope=primary.id,\n role_definition_name=\"Reader\",\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionName = \"Reader\",\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionName(\"Reader\")\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n scope: ${primary.id}\n roleDefinitionName: Reader\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 Service Principal)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary.id,\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primary.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 User)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary.id,\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primary.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 Management Group)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleGetGroup = azure.management.getGroup({\n name: \"00000000-0000-0000-0000-000000000000\",\n});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primaryAzurermManagementGroup.id,\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_get_group = azure.management.get_group(name=\"00000000-0000-0000-0000-000000000000\")\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary_azurerm_management_group[\"id\"],\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetGroup = Azure.Management.GetGroup.Invoke(new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n });\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primaryAzurermManagementGroup.Id,\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.LookupGroup(ctx, \u0026management.LookupGroupArgs{\n\t\t\tName: pulumi.StringRef(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.Any(primaryAzurermManagementGroup.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.ManagementFunctions;\nimport com.pulumi.azure.management.inputs.GetGroupArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetGroup = ManagementFunctions.getGroup(GetGroupArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .build());\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primaryAzurermManagementGroup.id())\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primaryAzurermManagementGroup.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetGroup:\n fn::invoke:\n Function: azure:management:getGroup\n Arguments:\n name: 00000000-0000-0000-0000-000000000000\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### ABAC Condition)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n roleDefinitionName: \"Role Based Access Control Administrator\",\n scope: primary.then(primary =\u003e primary.id),\n principalId: example.then(example =\u003e example.objectId),\n principalType: \"ServicePrincipal\",\n description: \"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n conditionVersion: \"2.0\",\n condition: Promise.all([builtin.then(builtin =\u003e std.basename({\n input: builtin.roleDefinitionId,\n })), builtin.then(builtin =\u003e std.basename({\n input: builtin.roleDefinitionId,\n }))]).then(([invoke, invoke1]) =\u003e `(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${invoke.result}}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${invoke1.result}}\n )\n)\n`),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nbuiltin = azure.authorization.get_role_definition(name=\"Reader\")\nexample_assignment = azure.authorization.Assignment(\"example\",\n role_definition_name=\"Role Based Access Control Administrator\",\n scope=primary.id,\n principal_id=example.object_id,\n principal_type=\"ServicePrincipal\",\n description=\"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n condition_version=\"2.0\",\n condition=f\"\"\"(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/write'}})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{std.basename(input=builtin.role_definition_id).result}}}\n )\n)\nAND\n(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/delete'}})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{std.basename(input=builtin.role_definition_id).result}}}\n )\n)\n\"\"\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n RoleDefinitionName = \"Role Based Access Control Administrator\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n PrincipalType = \"ServicePrincipal\",\n Description = \"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n ConditionVersion = \"2.0\",\n Condition = Output.Tuple(Std.Basename.Invoke(new()\n {\n Input = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n }), Std.Basename.Invoke(new()\n {\n Input = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n })).Apply(values =\u003e\n {\n var invoke = values.Item1;\n var invoke1 = values.Item2;\n return @$\"(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/write'}})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{invoke.Result}}}\n )\n)\nAND\n(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/delete'}})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{invoke1.Result}}}\n )\n)\n\";\n }),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeBasename, err := std.Basename(ctx, \u0026std.BasenameArgs{\n\t\t\tInput: builtin.RoleDefinitionId,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeBasename1, err := std.Basename(ctx, \u0026std.BasenameArgs{\n\t\t\tInput: builtin.RoleDefinitionId,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tRoleDefinitionName: pulumi.String(\"Role Based Access Control Administrator\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tPrincipalType: pulumi.String(\"ServicePrincipal\"),\n\t\t\tDescription: pulumi.String(\"Role Based Access Control Administrator role assignment with ABAC Condition.\"),\n\t\t\tConditionVersion: pulumi.String(\"2.0\"),\n\t\t\tCondition: pulumi.Sprintf(`(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%v}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%v}\n )\n)\n`, invokeBasename.Result, invokeBasename1.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .roleDefinitionName(\"Role Based Access Control Administrator\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .principalType(\"ServicePrincipal\")\n .description(\"Role Based Access Control Administrator role assignment with ABAC Condition.\")\n .conditionVersion(\"2.0\")\n .condition(\"\"\"\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%s}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%s}\n )\n)\n\", StdFunctions.basename(BasenameArgs.builder()\n .input(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .build()).result(),StdFunctions.basename(BasenameArgs.builder()\n .input(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .build()).result()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n roleDefinitionName: Role Based Access Control Administrator\n scope: ${primary.id}\n principalId: ${example.objectId}\n principalType: ServicePrincipal\n description: Role Based Access Control Administrator role assignment with ABAC Condition.\n conditionVersion: '2.0'\n condition:\n fn::join:\n -\n - - |-\n (\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {\n - fn::invoke:\n Function: std:basename\n Arguments:\n input: ${builtin.roleDefinitionId}\n Return: result\n - |-\n }\n )\n )\n AND\n (\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {\n - fn::invoke:\n Function: std:basename\n Arguments:\n input: ${builtin.roleDefinitionId}\n Return: result\n - |\n }\n )\n )\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n builtin:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRole Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:role/assignment:Assignment example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000\n```\n\n* for scope `Subscription`, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\n* for scope `Resource Group`, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\n* for scope referencing a Key Vault, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.KeyVault/vaults/vaultname/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\ntext\n\n/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000|00000000-0000-0000-0000-000000000000\n\n", + "description": "Assigns a given Principal (User or Group) to a given Role.\n\n## Example Usage\n\n### Using A Built-In Role)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionName: \"Reader\",\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_assignment = azure.authorization.Assignment(\"example\",\n scope=primary.id,\n role_definition_name=\"Reader\",\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionName = \"Reader\",\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionName: pulumi.String(\"Reader\"),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionName(\"Reader\")\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n scope: ${primary.id}\n roleDefinitionName: Reader\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 Service Principal)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary.id,\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primary.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 User)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primary.then(primary =\u003e primary.id),\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary.id,\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primary.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Custom Role \u0026 Management Group)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst exampleGetGroup = azure.management.getGroup({\n name: \"00000000-0000-0000-0000-000000000000\",\n});\nconst exampleRoleDefinition = new azure.authorization.RoleDefinition(\"example\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"my-custom-role-definition\",\n scope: primary.then(primary =\u003e primary.id),\n permissions: [{\n actions: [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n name: \"00000000-0000-0000-0000-000000000000\",\n scope: primaryAzurermManagementGroup.id,\n roleDefinitionId: exampleRoleDefinition.roleDefinitionResourceId,\n principalId: example.then(example =\u003e example.objectId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nexample_get_group = azure.management.get_group(name=\"00000000-0000-0000-0000-000000000000\")\nexample_role_definition = azure.authorization.RoleDefinition(\"example\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"my-custom-role-definition\",\n scope=primary.id,\n permissions=[{\n \"actions\": [\"Microsoft.Resources/subscriptions/resourceGroups/read\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\nexample_assignment = azure.authorization.Assignment(\"example\",\n name=\"00000000-0000-0000-0000-000000000000\",\n scope=primary_azurerm_management_group[\"id\"],\n role_definition_id=example_role_definition.role_definition_resource_id,\n principal_id=example.object_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var exampleGetGroup = Azure.Management.GetGroup.Invoke(new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n });\n\n var exampleRoleDefinition = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"my-custom-role-definition\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"Microsoft.Resources/subscriptions/resourceGroups/read\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n Name = \"00000000-0000-0000-0000-000000000000\",\n Scope = primaryAzurermManagementGroup.Id,\n RoleDefinitionId = exampleRoleDefinition.RoleDefinitionResourceId,\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = management.LookupGroup(ctx, \u0026management.LookupGroupArgs{\n\t\t\tName: pulumi.StringRef(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"my-custom-role-definition\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Microsoft.Resources/subscriptions/resourceGroups/read\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tName: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tScope: pulumi.Any(primaryAzurermManagementGroup.Id),\n\t\t\tRoleDefinitionId: exampleRoleDefinition.RoleDefinitionResourceId,\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.management.ManagementFunctions;\nimport com.pulumi.azure.management.inputs.GetGroupArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var exampleGetGroup = ManagementFunctions.getGroup(GetGroupArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .build());\n\n var exampleRoleDefinition = new RoleDefinition(\"exampleRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"my-custom-role-definition\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"Microsoft.Resources/subscriptions/resourceGroups/read\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .name(\"00000000-0000-0000-0000-000000000000\")\n .scope(primaryAzurermManagementGroup.id())\n .roleDefinitionId(exampleRoleDefinition.roleDefinitionResourceId())\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: example\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: my-custom-role-definition\n scope: ${primary.id}\n permissions:\n - actions:\n - Microsoft.Resources/subscriptions/resourceGroups/read\n notActions: []\n assignableScopes:\n - ${primary.id}\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n name: 00000000-0000-0000-0000-000000000000\n scope: ${primaryAzurermManagementGroup.id}\n roleDefinitionId: ${exampleRoleDefinition.roleDefinitionResourceId}\n principalId: ${example.objectId}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n exampleGetGroup:\n fn::invoke:\n Function: azure:management:getGroup\n Arguments:\n name: 00000000-0000-0000-0000-000000000000\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### ABAC Condition)\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst primary = azure.core.getSubscription({});\nconst example = azure.core.getClientConfig({});\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Reader\",\n});\nconst exampleAssignment = new azure.authorization.Assignment(\"example\", {\n roleDefinitionName: \"Role Based Access Control Administrator\",\n scope: primary.then(primary =\u003e primary.id),\n principalId: example.then(example =\u003e example.objectId),\n principalType: \"ServicePrincipal\",\n description: \"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n conditionVersion: \"2.0\",\n condition: Promise.all([builtin.then(builtin =\u003e std.basename({\n input: builtin.roleDefinitionId,\n })), builtin.then(builtin =\u003e std.basename({\n input: builtin.roleDefinitionId,\n }))]).then(([invoke, invoke1]) =\u003e `(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${invoke.result}}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${invoke1.result}}\n )\n)\n`),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\nprimary = azure.core.get_subscription()\nexample = azure.core.get_client_config()\nbuiltin = azure.authorization.get_role_definition(name=\"Reader\")\nexample_assignment = azure.authorization.Assignment(\"example\",\n role_definition_name=\"Role Based Access Control Administrator\",\n scope=primary.id,\n principal_id=example.object_id,\n principal_type=\"ServicePrincipal\",\n description=\"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n condition_version=\"2.0\",\n condition=f\"\"\"(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/write'}})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{std.basename(input=builtin.role_definition_id).result}}}\n )\n)\nAND\n(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/delete'}})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{std.basename(input=builtin.role_definition_id).result}}}\n )\n)\n\"\"\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = Azure.Core.GetClientConfig.Invoke();\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Reader\",\n });\n\n var exampleAssignment = new Azure.Authorization.Assignment(\"example\", new()\n {\n RoleDefinitionName = \"Role Based Access Control Administrator\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n PrincipalId = example.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n PrincipalType = \"ServicePrincipal\",\n Description = \"Role Based Access Control Administrator role assignment with ABAC Condition.\",\n ConditionVersion = \"2.0\",\n Condition = Output.Tuple(Std.Basename.Invoke(new()\n {\n Input = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n }), Std.Basename.Invoke(new()\n {\n Input = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.RoleDefinitionId),\n })).Apply(values =\u003e\n {\n var invoke = values.Item1;\n var invoke1 = values.Item2;\n return @$\"(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/write'}})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{invoke.Result}}}\n )\n)\nAND\n(\n (\n !(ActionMatches{{'Microsoft.Authorization/roleAssignments/delete'}})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {{{invoke1.Result}}}\n )\n)\n\";\n }),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Reader\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeBasename, err := std.Basename(ctx, \u0026std.BasenameArgs{\n\t\t\tInput: builtin.RoleDefinitionId,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeBasename1, err := std.Basename(ctx, \u0026std.BasenameArgs{\n\t\t\tInput: builtin.RoleDefinitionId,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewAssignment(ctx, \"example\", \u0026authorization.AssignmentArgs{\n\t\t\tRoleDefinitionName: pulumi.String(\"Role Based Access Control Administrator\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tPrincipalId: pulumi.String(example.ObjectId),\n\t\t\tPrincipalType: pulumi.String(\"ServicePrincipal\"),\n\t\t\tDescription: pulumi.String(\"Role Based Access Control Administrator role assignment with ABAC Condition.\"),\n\t\t\tConditionVersion: pulumi.String(\"2.0\"),\n\t\t\tCondition: pulumi.Sprintf(`(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%v}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%v}\n )\n)\n`, invokeBasename.Result, invokeBasename1.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport com.pulumi.azure.authorization.Assignment;\nimport com.pulumi.azure.authorization.AssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n final var example = CoreFunctions.getClientConfig();\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Reader\")\n .build());\n\n var exampleAssignment = new Assignment(\"exampleAssignment\", AssignmentArgs.builder()\n .roleDefinitionName(\"Role Based Access Control Administrator\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .principalId(example.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .principalType(\"ServicePrincipal\")\n .description(\"Role Based Access Control Administrator role assignment with ABAC Condition.\")\n .conditionVersion(\"2.0\")\n .condition(\"\"\"\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%s}\n )\n)\nAND\n(\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {%s}\n )\n)\n\", StdFunctions.basename(BasenameArgs.builder()\n .input(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .build()).result(),StdFunctions.basename(BasenameArgs.builder()\n .input(builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.roleDefinitionId()))\n .build()).result()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleAssignment:\n type: azure:authorization:Assignment\n name: example\n properties:\n roleDefinitionName: Role Based Access Control Administrator\n scope: ${primary.id}\n principalId: ${example.objectId}\n principalType: ServicePrincipal\n description: Role Based Access Control Administrator role assignment with ABAC Condition.\n conditionVersion: '2.0'\n condition:\n fn::join:\n -\n - - |-\n (\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})\n )\n OR\n (\n @Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {\n - fn::invoke:\n Function: std:basename\n Arguments:\n input: ${builtin.roleDefinitionId}\n Return: result\n - |-\n }\n )\n )\n AND\n (\n (\n !(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})\n )\n OR\n (\n @Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {\n - fn::invoke:\n Function: std:basename\n Arguments:\n input: ${builtin.roleDefinitionId}\n Return: result\n - |\n }\n )\n )\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n builtin:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Reader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRole Assignments can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:role/assignment:Assignment example /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000\n```\n\n* for scope `Subscription`, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\n* for scope `Resource Group`, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\n* for scope referencing a Key Vault, the id format is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.KeyVault/vaults/vaultname/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000`\n\ntext\n\n/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000|00000000-0000-0000-0000-000000000000\n\n", "properties": { "condition": { "type": "string", @@ -241368,7 +241368,7 @@ "deprecationMessage": "azure.role.Assignment has been deprecated in favor of azure.authorization.Assignment" }, "azure:role/definition:Definition": { - "description": "Manages a custom Role Definition, used to assign Roles to Users/Principals. See ['Understand role definitions'](https://docs.microsoft.com/azure/role-based-access-control/role-definitions) in the Azure documentation for more details.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = new azure.authorization.RoleDefinition(\"example\", {\n name: \"my-custom-role\",\n scope: primary.then(primary =\u003e primary.id),\n description: \"This is a custom role created\",\n permissions: [{\n actions: [\"*\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.authorization.RoleDefinition(\"example\",\n name=\"my-custom-role\",\n scope=primary.id,\n description=\"This is a custom role created\",\n permissions=[{\n \"actions\": [\"*\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n Name = \"my-custom-role\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Description = \"This is a custom role created\",\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"*\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tName: pulumi.String(\"my-custom-role\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tDescription: pulumi.String(\"This is a custom role created\"),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"*\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var example = new RoleDefinition(\"example\", RoleDefinitionArgs.builder()\n .name(\"my-custom-role\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .description(\"This is a custom role created\")\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"*\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:authorization:RoleDefinition\n properties:\n name: my-custom-role\n scope: ${primary.id}\n description: This is a custom role created\n permissions:\n - actions:\n - '*'\n notActions: []\n assignableScopes:\n - ${primary.id}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRole Definitions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:role/definition:Definition example \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/00000000-0000-0000-0000-000000000000|/subscriptions/00000000-0000-0000-0000-000000000000\"\n```\n\n", + "description": "Manages a custom Role Definition, used to assign Roles to Users/Principals. See ['Understand role definitions'](https://docs.microsoft.com/azure/role-based-access-control/role-definitions) in the Azure documentation for more details.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst example = new azure.authorization.RoleDefinition(\"example\", {\n name: \"my-custom-role\",\n scope: primary.then(primary =\u003e primary.id),\n description: \"This is a custom role created\",\n permissions: [{\n actions: [\"*\"],\n notActions: [],\n }],\n assignableScopes: [primary.then(primary =\u003e primary.id)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\nexample = azure.authorization.RoleDefinition(\"example\",\n name=\"my-custom-role\",\n scope=primary.id,\n description=\"This is a custom role created\",\n permissions=[{\n \"actions\": [\"*\"],\n \"not_actions\": [],\n }],\n assignable_scopes=[primary.id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var example = new Azure.Authorization.RoleDefinition(\"example\", new()\n {\n Name = \"my-custom-role\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n Description = \"This is a custom role created\",\n Permissions = new[]\n {\n new Azure.Authorization.Inputs.RoleDefinitionPermissionArgs\n {\n Actions = new[]\n {\n \"*\",\n },\n NotActions = new() { },\n },\n },\n AssignableScopes = new[]\n {\n primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = authorization.NewRoleDefinition(ctx, \"example\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tName: pulumi.String(\"my-custom-role\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t\tDescription: pulumi.String(\"This is a custom role created\"),\n\t\t\tPermissions: authorization.RoleDefinitionPermissionArray{\n\t\t\t\t\u0026authorization.RoleDefinitionPermissionArgs{\n\t\t\t\t\tActions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"*\"),\n\t\t\t\t\t},\n\t\t\t\t\tNotActions: pulumi.StringArray{},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAssignableScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(primary.Id),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.inputs.RoleDefinitionPermissionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var example = new RoleDefinition(\"example\", RoleDefinitionArgs.builder()\n .name(\"my-custom-role\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .description(\"This is a custom role created\")\n .permissions(RoleDefinitionPermissionArgs.builder()\n .actions(\"*\")\n .notActions()\n .build())\n .assignableScopes(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:authorization:RoleDefinition\n properties:\n name: my-custom-role\n scope: ${primary.id}\n description: This is a custom role created\n permissions:\n - actions:\n - '*'\n notActions: []\n assignableScopes:\n - ${primary.id}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRole Definitions can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:role/definition:Definition example \"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/00000000-0000-0000-0000-000000000000|/subscriptions/00000000-0000-0000-0000-000000000000\"\n```\n\n", "properties": { "assignableScopes": { "type": "array", @@ -242170,7 +242170,7 @@ } }, "azure:securitycenter/automation:Automation": { - "description": "Manages Security Center Automation and Continuous Export. This resource supports three types of destination in the `action`, Logic Apps, Log Analytics and Event Hubs\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleEventHubNamespace = new azure.eventhub.EventHubNamespace(\"example\", {\n name: \"example-namespace\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard\",\n capacity: 2,\n});\nconst exampleEventHub = new azure.eventhub.EventHub(\"example\", {\n name: \"acceptanceTestEventHub\",\n namespaceName: exampleEventHubNamespace.name,\n resourceGroupName: example.name,\n partitionCount: 2,\n messageRetention: 2,\n});\nconst exampleAuthorizationRule = new azure.eventhub.AuthorizationRule(\"example\", {\n name: \"example-rule\",\n namespaceName: exampleEventHubNamespace.name,\n eventhubName: exampleEventHub.name,\n resourceGroupName: example.name,\n listen: true,\n send: false,\n manage: false,\n});\nconst exampleAutomation = new azure.securitycenter.Automation(\"example\", {\n name: \"example-automation\",\n location: example.location,\n resourceGroupName: example.name,\n actions: [{\n type: \"eventhub\",\n resourceId: exampleEventHub.id,\n connectionString: exampleAuthorizationRule.primaryConnectionString,\n }],\n sources: [{\n eventSource: \"Alerts\",\n ruleSets: [{\n rules: [{\n propertyPath: \"properties.metadata.severity\",\n operator: \"Equals\",\n expectedValue: \"High\",\n propertyType: \"String\",\n }],\n }],\n }],\n scopes: [current.then(current =\u003e `/subscriptions/${current.subscriptionId}`)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_event_hub_namespace = azure.eventhub.EventHubNamespace(\"example\",\n name=\"example-namespace\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard\",\n capacity=2)\nexample_event_hub = azure.eventhub.EventHub(\"example\",\n name=\"acceptanceTestEventHub\",\n namespace_name=example_event_hub_namespace.name,\n resource_group_name=example.name,\n partition_count=2,\n message_retention=2)\nexample_authorization_rule = azure.eventhub.AuthorizationRule(\"example\",\n name=\"example-rule\",\n namespace_name=example_event_hub_namespace.name,\n eventhub_name=example_event_hub.name,\n resource_group_name=example.name,\n listen=True,\n send=False,\n manage=False)\nexample_automation = azure.securitycenter.Automation(\"example\",\n name=\"example-automation\",\n location=example.location,\n resource_group_name=example.name,\n actions=[{\n \"type\": \"eventhub\",\n \"resource_id\": example_event_hub.id,\n \"connection_string\": example_authorization_rule.primary_connection_string,\n }],\n sources=[{\n \"event_source\": \"Alerts\",\n \"rule_sets\": [{\n \"rules\": [{\n \"property_path\": \"properties.metadata.severity\",\n \"operator\": \"Equals\",\n \"expected_value\": \"High\",\n \"property_type\": \"String\",\n }],\n }],\n }],\n scopes=[f\"/subscriptions/{current.subscription_id}\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleEventHubNamespace = new Azure.EventHub.EventHubNamespace(\"example\", new()\n {\n Name = \"example-namespace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard\",\n Capacity = 2,\n });\n\n var exampleEventHub = new Azure.EventHub.EventHub(\"example\", new()\n {\n Name = \"acceptanceTestEventHub\",\n NamespaceName = exampleEventHubNamespace.Name,\n ResourceGroupName = example.Name,\n PartitionCount = 2,\n MessageRetention = 2,\n });\n\n var exampleAuthorizationRule = new Azure.EventHub.AuthorizationRule(\"example\", new()\n {\n Name = \"example-rule\",\n NamespaceName = exampleEventHubNamespace.Name,\n EventhubName = exampleEventHub.Name,\n ResourceGroupName = example.Name,\n Listen = true,\n Send = false,\n Manage = false,\n });\n\n var exampleAutomation = new Azure.SecurityCenter.Automation(\"example\", new()\n {\n Name = \"example-automation\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Actions = new[]\n {\n new Azure.SecurityCenter.Inputs.AutomationActionArgs\n {\n Type = \"eventhub\",\n ResourceId = exampleEventHub.Id,\n ConnectionString = exampleAuthorizationRule.PrimaryConnectionString,\n },\n },\n Sources = new[]\n {\n new Azure.SecurityCenter.Inputs.AutomationSourceArgs\n {\n EventSource = \"Alerts\",\n RuleSets = new[]\n {\n new Azure.SecurityCenter.Inputs.AutomationSourceRuleSetArgs\n {\n Rules = new[]\n {\n new Azure.SecurityCenter.Inputs.AutomationSourceRuleSetRuleArgs\n {\n PropertyPath = \"properties.metadata.severity\",\n Operator = \"Equals\",\n ExpectedValue = \"High\",\n PropertyType = \"String\",\n },\n },\n },\n },\n },\n },\n Scopes = new[]\n {\n $\"/subscriptions/{current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId)}\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/eventhub\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/securitycenter\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHubNamespace, err := eventhub.NewEventHubNamespace(ctx, \"example\", \u0026eventhub.EventHubNamespaceArgs{\n\t\t\tName: pulumi.String(\"example-namespace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tCapacity: pulumi.Int(2),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHub, err := eventhub.NewEventHub(ctx, \"example\", \u0026eventhub.EventHubArgs{\n\t\t\tName: pulumi.String(\"acceptanceTestEventHub\"),\n\t\t\tNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tPartitionCount: pulumi.Int(2),\n\t\t\tMessageRetention: pulumi.Int(2),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAuthorizationRule, err := eventhub.NewAuthorizationRule(ctx, \"example\", \u0026eventhub.AuthorizationRuleArgs{\n\t\t\tName: pulumi.String(\"example-rule\"),\n\t\t\tNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tEventhubName: exampleEventHub.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tListen: pulumi.Bool(true),\n\t\t\tSend: pulumi.Bool(false),\n\t\t\tManage: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = securitycenter.NewAutomation(ctx, \"example\", \u0026securitycenter.AutomationArgs{\n\t\t\tName: pulumi.String(\"example-automation\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tActions: securitycenter.AutomationActionArray{\n\t\t\t\t\u0026securitycenter.AutomationActionArgs{\n\t\t\t\t\tType: pulumi.String(\"eventhub\"),\n\t\t\t\t\tResourceId: exampleEventHub.ID(),\n\t\t\t\t\tConnectionString: exampleAuthorizationRule.PrimaryConnectionString,\n\t\t\t\t},\n\t\t\t},\n\t\t\tSources: securitycenter.AutomationSourceArray{\n\t\t\t\t\u0026securitycenter.AutomationSourceArgs{\n\t\t\t\t\tEventSource: pulumi.String(\"Alerts\"),\n\t\t\t\t\tRuleSets: securitycenter.AutomationSourceRuleSetArray{\n\t\t\t\t\t\t\u0026securitycenter.AutomationSourceRuleSetArgs{\n\t\t\t\t\t\t\tRules: securitycenter.AutomationSourceRuleSetRuleArray{\n\t\t\t\t\t\t\t\t\u0026securitycenter.AutomationSourceRuleSetRuleArgs{\n\t\t\t\t\t\t\t\t\tPropertyPath: pulumi.String(\"properties.metadata.severity\"),\n\t\t\t\t\t\t\t\t\tOperator: pulumi.String(\"Equals\"),\n\t\t\t\t\t\t\t\t\tExpectedValue: pulumi.String(\"High\"),\n\t\t\t\t\t\t\t\t\tPropertyType: pulumi.String(\"String\"),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopes: pulumi.StringArray{\n\t\t\t\tpulumi.Sprintf(\"/subscriptions/%v\", current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.eventhub.EventHubNamespace;\nimport com.pulumi.azure.eventhub.EventHubNamespaceArgs;\nimport com.pulumi.azure.eventhub.EventHub;\nimport com.pulumi.azure.eventhub.EventHubArgs;\nimport com.pulumi.azure.eventhub.AuthorizationRule;\nimport com.pulumi.azure.eventhub.AuthorizationRuleArgs;\nimport com.pulumi.azure.securitycenter.Automation;\nimport com.pulumi.azure.securitycenter.AutomationArgs;\nimport com.pulumi.azure.securitycenter.inputs.AutomationActionArgs;\nimport com.pulumi.azure.securitycenter.inputs.AutomationSourceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleEventHubNamespace = new EventHubNamespace(\"exampleEventHubNamespace\", EventHubNamespaceArgs.builder()\n .name(\"example-namespace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard\")\n .capacity(2)\n .build());\n\n var exampleEventHub = new EventHub(\"exampleEventHub\", EventHubArgs.builder()\n .name(\"acceptanceTestEventHub\")\n .namespaceName(exampleEventHubNamespace.name())\n .resourceGroupName(example.name())\n .partitionCount(2)\n .messageRetention(2)\n .build());\n\n var exampleAuthorizationRule = new AuthorizationRule(\"exampleAuthorizationRule\", AuthorizationRuleArgs.builder()\n .name(\"example-rule\")\n .namespaceName(exampleEventHubNamespace.name())\n .eventhubName(exampleEventHub.name())\n .resourceGroupName(example.name())\n .listen(true)\n .send(false)\n .manage(false)\n .build());\n\n var exampleAutomation = new Automation(\"exampleAutomation\", AutomationArgs.builder()\n .name(\"example-automation\")\n .location(example.location())\n .resourceGroupName(example.name())\n .actions(AutomationActionArgs.builder()\n .type(\"eventhub\")\n .resourceId(exampleEventHub.id())\n .connectionString(exampleAuthorizationRule.primaryConnectionString())\n .build())\n .sources(AutomationSourceArgs.builder()\n .eventSource(\"Alerts\")\n .ruleSets(AutomationSourceRuleSetArgs.builder()\n .rules(AutomationSourceRuleSetRuleArgs.builder()\n .propertyPath(\"properties.metadata.severity\")\n .operator(\"Equals\")\n .expectedValue(\"High\")\n .propertyType(\"String\")\n .build())\n .build())\n .build())\n .scopes(String.format(\"/subscriptions/%s\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleEventHubNamespace:\n type: azure:eventhub:EventHubNamespace\n name: example\n properties:\n name: example-namespace\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard\n capacity: 2\n exampleEventHub:\n type: azure:eventhub:EventHub\n name: example\n properties:\n name: acceptanceTestEventHub\n namespaceName: ${exampleEventHubNamespace.name}\n resourceGroupName: ${example.name}\n partitionCount: 2\n messageRetention: 2\n exampleAuthorizationRule:\n type: azure:eventhub:AuthorizationRule\n name: example\n properties:\n name: example-rule\n namespaceName: ${exampleEventHubNamespace.name}\n eventhubName: ${exampleEventHub.name}\n resourceGroupName: ${example.name}\n listen: true\n send: false\n manage: false\n exampleAutomation:\n type: azure:securitycenter:Automation\n name: example\n properties:\n name: example-automation\n location: ${example.location}\n resourceGroupName: ${example.name}\n actions:\n - type: eventhub\n resourceId: ${exampleEventHub.id}\n connectionString: ${exampleAuthorizationRule.primaryConnectionString}\n sources:\n - eventSource: Alerts\n ruleSets:\n - rules:\n - propertyPath: properties.metadata.severity\n operator: Equals\n expectedValue: High\n propertyType: String\n scopes:\n - /subscriptions/${current.subscriptionId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecurity Center Automations can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:securitycenter/automation:Automation example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Security/automations/automation1\n```\n\n", + "description": "Manages Security Center Automation and Continuous Export. This resource supports three types of destination in the `action`, Logic Apps, Log Analytics and Event Hubs\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleEventHubNamespace = new azure.eventhub.EventHubNamespace(\"example\", {\n name: \"example-namespace\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard\",\n capacity: 2,\n});\nconst exampleEventHub = new azure.eventhub.EventHub(\"example\", {\n name: \"acceptanceTestEventHub\",\n namespaceName: exampleEventHubNamespace.name,\n resourceGroupName: example.name,\n partitionCount: 2,\n messageRetention: 2,\n});\nconst exampleAuthorizationRule = new azure.eventhub.AuthorizationRule(\"example\", {\n name: \"example-rule\",\n namespaceName: exampleEventHubNamespace.name,\n eventhubName: exampleEventHub.name,\n resourceGroupName: example.name,\n listen: true,\n send: false,\n manage: false,\n});\nconst exampleAutomation = new azure.securitycenter.Automation(\"example\", {\n name: \"example-automation\",\n location: example.location,\n resourceGroupName: example.name,\n actions: [{\n type: \"eventhub\",\n resourceId: exampleEventHub.id,\n connectionString: exampleAuthorizationRule.primaryConnectionString,\n }],\n sources: [{\n eventSource: \"Alerts\",\n ruleSets: [{\n rules: [{\n propertyPath: \"properties.metadata.severity\",\n operator: \"Equals\",\n expectedValue: \"High\",\n propertyType: \"String\",\n }],\n }],\n }],\n scopes: [current.then(current =\u003e `/subscriptions/${current.subscriptionId}`)],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_event_hub_namespace = azure.eventhub.EventHubNamespace(\"example\",\n name=\"example-namespace\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard\",\n capacity=2)\nexample_event_hub = azure.eventhub.EventHub(\"example\",\n name=\"acceptanceTestEventHub\",\n namespace_name=example_event_hub_namespace.name,\n resource_group_name=example.name,\n partition_count=2,\n message_retention=2)\nexample_authorization_rule = azure.eventhub.AuthorizationRule(\"example\",\n name=\"example-rule\",\n namespace_name=example_event_hub_namespace.name,\n eventhub_name=example_event_hub.name,\n resource_group_name=example.name,\n listen=True,\n send=False,\n manage=False)\nexample_automation = azure.securitycenter.Automation(\"example\",\n name=\"example-automation\",\n location=example.location,\n resource_group_name=example.name,\n actions=[{\n \"type\": \"eventhub\",\n \"resource_id\": example_event_hub.id,\n \"connection_string\": example_authorization_rule.primary_connection_string,\n }],\n sources=[{\n \"event_source\": \"Alerts\",\n \"rule_sets\": [{\n \"rules\": [{\n \"property_path\": \"properties.metadata.severity\",\n \"operator\": \"Equals\",\n \"expected_value\": \"High\",\n \"property_type\": \"String\",\n }],\n }],\n }],\n scopes=[f\"/subscriptions/{current.subscription_id}\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleEventHubNamespace = new Azure.EventHub.EventHubNamespace(\"example\", new()\n {\n Name = \"example-namespace\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard\",\n Capacity = 2,\n });\n\n var exampleEventHub = new Azure.EventHub.EventHub(\"example\", new()\n {\n Name = \"acceptanceTestEventHub\",\n NamespaceName = exampleEventHubNamespace.Name,\n ResourceGroupName = example.Name,\n PartitionCount = 2,\n MessageRetention = 2,\n });\n\n var exampleAuthorizationRule = new Azure.EventHub.AuthorizationRule(\"example\", new()\n {\n Name = \"example-rule\",\n NamespaceName = exampleEventHubNamespace.Name,\n EventhubName = exampleEventHub.Name,\n ResourceGroupName = example.Name,\n Listen = true,\n Send = false,\n Manage = false,\n });\n\n var exampleAutomation = new Azure.SecurityCenter.Automation(\"example\", new()\n {\n Name = \"example-automation\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Actions = new[]\n {\n new Azure.SecurityCenter.Inputs.AutomationActionArgs\n {\n Type = \"eventhub\",\n ResourceId = exampleEventHub.Id,\n ConnectionString = exampleAuthorizationRule.PrimaryConnectionString,\n },\n },\n Sources = new[]\n {\n new Azure.SecurityCenter.Inputs.AutomationSourceArgs\n {\n EventSource = \"Alerts\",\n RuleSets = new[]\n {\n new Azure.SecurityCenter.Inputs.AutomationSourceRuleSetArgs\n {\n Rules = new[]\n {\n new Azure.SecurityCenter.Inputs.AutomationSourceRuleSetRuleArgs\n {\n PropertyPath = \"properties.metadata.severity\",\n Operator = \"Equals\",\n ExpectedValue = \"High\",\n PropertyType = \"String\",\n },\n },\n },\n },\n },\n },\n Scopes = new[]\n {\n $\"/subscriptions/{current.Apply(getClientConfigResult =\u003e getClientConfigResult.SubscriptionId)}\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/eventhub\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/securitycenter\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHubNamespace, err := eventhub.NewEventHubNamespace(ctx, \"example\", \u0026eventhub.EventHubNamespaceArgs{\n\t\t\tName: pulumi.String(\"example-namespace\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t\tCapacity: pulumi.Int(2),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleEventHub, err := eventhub.NewEventHub(ctx, \"example\", \u0026eventhub.EventHubArgs{\n\t\t\tName: pulumi.String(\"acceptanceTestEventHub\"),\n\t\t\tNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tPartitionCount: pulumi.Int(2),\n\t\t\tMessageRetention: pulumi.Int(2),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAuthorizationRule, err := eventhub.NewAuthorizationRule(ctx, \"example\", \u0026eventhub.AuthorizationRuleArgs{\n\t\t\tName: pulumi.String(\"example-rule\"),\n\t\t\tNamespaceName: exampleEventHubNamespace.Name,\n\t\t\tEventhubName: exampleEventHub.Name,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tListen: pulumi.Bool(true),\n\t\t\tSend: pulumi.Bool(false),\n\t\t\tManage: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = securitycenter.NewAutomation(ctx, \"example\", \u0026securitycenter.AutomationArgs{\n\t\t\tName: pulumi.String(\"example-automation\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tActions: securitycenter.AutomationActionArray{\n\t\t\t\t\u0026securitycenter.AutomationActionArgs{\n\t\t\t\t\tType: pulumi.String(\"eventhub\"),\n\t\t\t\t\tResourceId: exampleEventHub.ID(),\n\t\t\t\t\tConnectionString: exampleAuthorizationRule.PrimaryConnectionString,\n\t\t\t\t},\n\t\t\t},\n\t\t\tSources: securitycenter.AutomationSourceArray{\n\t\t\t\t\u0026securitycenter.AutomationSourceArgs{\n\t\t\t\t\tEventSource: pulumi.String(\"Alerts\"),\n\t\t\t\t\tRuleSets: securitycenter.AutomationSourceRuleSetArray{\n\t\t\t\t\t\t\u0026securitycenter.AutomationSourceRuleSetArgs{\n\t\t\t\t\t\t\tRules: securitycenter.AutomationSourceRuleSetRuleArray{\n\t\t\t\t\t\t\t\t\u0026securitycenter.AutomationSourceRuleSetRuleArgs{\n\t\t\t\t\t\t\t\t\tPropertyPath: pulumi.String(\"properties.metadata.severity\"),\n\t\t\t\t\t\t\t\t\tOperator: pulumi.String(\"Equals\"),\n\t\t\t\t\t\t\t\t\tExpectedValue: pulumi.String(\"High\"),\n\t\t\t\t\t\t\t\t\tPropertyType: pulumi.String(\"String\"),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopes: pulumi.StringArray{\n\t\t\t\tpulumi.Sprintf(\"/subscriptions/%v\", current.SubscriptionId),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.eventhub.EventHubNamespace;\nimport com.pulumi.azure.eventhub.EventHubNamespaceArgs;\nimport com.pulumi.azure.eventhub.EventHub;\nimport com.pulumi.azure.eventhub.EventHubArgs;\nimport com.pulumi.azure.eventhub.AuthorizationRule;\nimport com.pulumi.azure.eventhub.AuthorizationRuleArgs;\nimport com.pulumi.azure.securitycenter.Automation;\nimport com.pulumi.azure.securitycenter.AutomationArgs;\nimport com.pulumi.azure.securitycenter.inputs.AutomationActionArgs;\nimport com.pulumi.azure.securitycenter.inputs.AutomationSourceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleEventHubNamespace = new EventHubNamespace(\"exampleEventHubNamespace\", EventHubNamespaceArgs.builder()\n .name(\"example-namespace\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard\")\n .capacity(2)\n .build());\n\n var exampleEventHub = new EventHub(\"exampleEventHub\", EventHubArgs.builder()\n .name(\"acceptanceTestEventHub\")\n .namespaceName(exampleEventHubNamespace.name())\n .resourceGroupName(example.name())\n .partitionCount(2)\n .messageRetention(2)\n .build());\n\n var exampleAuthorizationRule = new AuthorizationRule(\"exampleAuthorizationRule\", AuthorizationRuleArgs.builder()\n .name(\"example-rule\")\n .namespaceName(exampleEventHubNamespace.name())\n .eventhubName(exampleEventHub.name())\n .resourceGroupName(example.name())\n .listen(true)\n .send(false)\n .manage(false)\n .build());\n\n var exampleAutomation = new Automation(\"exampleAutomation\", AutomationArgs.builder()\n .name(\"example-automation\")\n .location(example.location())\n .resourceGroupName(example.name())\n .actions(AutomationActionArgs.builder()\n .type(\"eventhub\")\n .resourceId(exampleEventHub.id())\n .connectionString(exampleAuthorizationRule.primaryConnectionString())\n .build())\n .sources(AutomationSourceArgs.builder()\n .eventSource(\"Alerts\")\n .ruleSets(AutomationSourceRuleSetArgs.builder()\n .rules(AutomationSourceRuleSetRuleArgs.builder()\n .propertyPath(\"properties.metadata.severity\")\n .operator(\"Equals\")\n .expectedValue(\"High\")\n .propertyType(\"String\")\n .build())\n .build())\n .build())\n .scopes(String.format(\"/subscriptions/%s\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.subscriptionId())))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleEventHubNamespace:\n type: azure:eventhub:EventHubNamespace\n name: example\n properties:\n name: example-namespace\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard\n capacity: 2\n exampleEventHub:\n type: azure:eventhub:EventHub\n name: example\n properties:\n name: acceptanceTestEventHub\n namespaceName: ${exampleEventHubNamespace.name}\n resourceGroupName: ${example.name}\n partitionCount: 2\n messageRetention: 2\n exampleAuthorizationRule:\n type: azure:eventhub:AuthorizationRule\n name: example\n properties:\n name: example-rule\n namespaceName: ${exampleEventHubNamespace.name}\n eventhubName: ${exampleEventHub.name}\n resourceGroupName: ${example.name}\n listen: true\n send: false\n manage: false\n exampleAutomation:\n type: azure:securitycenter:Automation\n name: example\n properties:\n name: example-automation\n location: ${example.location}\n resourceGroupName: ${example.name}\n actions:\n - type: eventhub\n resourceId: ${exampleEventHub.id}\n connectionString: ${exampleAuthorizationRule.primaryConnectionString}\n sources:\n - eventSource: Alerts\n ruleSets:\n - rules:\n - propertyPath: properties.metadata.severity\n operator: Equals\n expectedValue: High\n propertyType: String\n scopes:\n - /subscriptions/${current.subscriptionId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecurity Center Automations can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:securitycenter/automation:Automation example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup1/providers/Microsoft.Security/automations/automation1\n```\n\n", "properties": { "actions": { "type": "array", @@ -249760,7 +249760,7 @@ } }, "azure:signalr/serviceCustomCertificate:ServiceCustomCertificate": { - "description": "Manages an Azure SignalR Custom Certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleService = new azure.signalr.Service(\"example\", {\n name: \"example-signalr\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n sku: {\n name: \"Premium_P1\",\n capacity: 1,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: testAzurermSignalrService.identity[0].principalId,\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\nconst test = new azure.signalr.ServiceCustomCertificate(\"test\", {\n name: \"example-cert\",\n signalrServiceId: exampleService.id,\n customCertificateId: exampleCertificate.id,\n}, {\n dependsOn: [exampleAzurermKeyVaultAccessPolicy],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service = azure.signalr.Service(\"example\",\n name=\"example-signalr\",\n location=test_azurerm_resource_group[\"location\"],\n resource_group_name=test_azurerm_resource_group[\"name\"],\n sku={\n \"name\": \"Premium_P1\",\n \"capacity\": 1,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": test_azurerm_signalr_service[\"identity\"][0][\"principalId\"],\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\ntest = azure.signalr.ServiceCustomCertificate(\"test\",\n name=\"example-cert\",\n signalr_service_id=example_service.id,\n custom_certificate_id=example_certificate.id,\n opts = pulumi.ResourceOptions(depends_on=[example_azurerm_key_vault_access_policy]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleService = new Azure.SignalR.Service(\"example\", new()\n {\n Name = \"example-signalr\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n Sku = new Azure.SignalR.Inputs.ServiceSkuArgs\n {\n Name = \"Premium_P1\",\n Capacity = 1,\n },\n Identity = new Azure.SignalR.Inputs.ServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = testAzurermSignalrService.Identity[0].PrincipalId,\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n var test = new Azure.SignalR.ServiceCustomCertificate(\"test\", new()\n {\n Name = \"example-cert\",\n SignalrServiceId = exampleService.Id,\n CustomCertificateId = exampleCertificate.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAzurermKeyVaultAccessPolicy,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/signalr\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := signalr.NewService(ctx, \"example\", \u0026signalr.ServiceArgs{\n\t\t\tName: pulumi.String(\"example-signalr\"),\n\t\t\tLocation: pulumi.Any(testAzurermResourceGroup.Location),\n\t\t\tResourceGroupName: pulumi.Any(testAzurermResourceGroup.Name),\n\t\t\tSku: \u0026signalr.ServiceSkuArgs{\n\t\t\t\tName: pulumi.String(\"Premium_P1\"),\n\t\t\t\tCapacity: pulumi.Int(1),\n\t\t\t},\n\t\t\tIdentity: \u0026signalr.ServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.Any(testAzurermSignalrService.Identity[0].PrincipalId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = signalr.NewServiceCustomCertificate(ctx, \"test\", \u0026signalr.ServiceCustomCertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tSignalrServiceId: exampleService.ID(),\n\t\t\tCustomCertificateId: exampleCertificate.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAzurermKeyVaultAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.signalr.Service;\nimport com.pulumi.azure.signalr.ServiceArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceSkuArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.signalr.ServiceCustomCertificate;\nimport com.pulumi.azure.signalr.ServiceCustomCertificateArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"example-signalr\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .sku(ServiceSkuArgs.builder()\n .name(\"Premium_P1\")\n .capacity(1)\n .build())\n .identity(ServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(testAzurermSignalrService.identity()[0].principalId())\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n var test = new ServiceCustomCertificate(\"test\", ServiceCustomCertificateArgs.builder()\n .name(\"example-cert\")\n .signalrServiceId(exampleService.id())\n .customCertificateId(exampleCertificate.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAzurermKeyVaultAccessPolicy)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleService:\n type: azure:signalr:Service\n name: example\n properties:\n name: example-signalr\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n sku:\n name: Premium_P1\n capacity: 1\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n - tenantId: ${current.tenantId}\n objectId: ${testAzurermSignalrService.identity[0].principalId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\n test:\n type: azure:signalr:ServiceCustomCertificate\n properties:\n name: example-cert\n signalrServiceId: ${exampleService.id}\n customCertificateId: ${exampleCertificate.id}\n options:\n dependson:\n - ${exampleAzurermKeyVaultAccessPolicy}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustom Certificate for a SignalR service can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:signalr/serviceCustomCertificate:ServiceCustomCertificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/signalR/signalr1/customCertificates/cert1\n```\n\n", + "description": "Manages an Azure SignalR Custom Certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleService = new azure.signalr.Service(\"example\", {\n name: \"example-signalr\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n sku: {\n name: \"Premium_P1\",\n capacity: 1,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: testAzurermSignalrService.identity[0].principalId,\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\nconst test = new azure.signalr.ServiceCustomCertificate(\"test\", {\n name: \"example-cert\",\n signalrServiceId: exampleService.id,\n customCertificateId: exampleCertificate.id,\n}, {\n dependsOn: [exampleAzurermKeyVaultAccessPolicy],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service = azure.signalr.Service(\"example\",\n name=\"example-signalr\",\n location=test_azurerm_resource_group[\"location\"],\n resource_group_name=test_azurerm_resource_group[\"name\"],\n sku={\n \"name\": \"Premium_P1\",\n \"capacity\": 1,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": test_azurerm_signalr_service[\"identity\"][0][\"principalId\"],\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\ntest = azure.signalr.ServiceCustomCertificate(\"test\",\n name=\"example-cert\",\n signalr_service_id=example_service.id,\n custom_certificate_id=example_certificate.id,\n opts = pulumi.ResourceOptions(depends_on=[example_azurerm_key_vault_access_policy]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleService = new Azure.SignalR.Service(\"example\", new()\n {\n Name = \"example-signalr\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n Sku = new Azure.SignalR.Inputs.ServiceSkuArgs\n {\n Name = \"Premium_P1\",\n Capacity = 1,\n },\n Identity = new Azure.SignalR.Inputs.ServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = testAzurermSignalrService.Identity[0].PrincipalId,\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n var test = new Azure.SignalR.ServiceCustomCertificate(\"test\", new()\n {\n Name = \"example-cert\",\n SignalrServiceId = exampleService.Id,\n CustomCertificateId = exampleCertificate.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAzurermKeyVaultAccessPolicy,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/signalr\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := signalr.NewService(ctx, \"example\", \u0026signalr.ServiceArgs{\n\t\t\tName: pulumi.String(\"example-signalr\"),\n\t\t\tLocation: pulumi.Any(testAzurermResourceGroup.Location),\n\t\t\tResourceGroupName: pulumi.Any(testAzurermResourceGroup.Name),\n\t\t\tSku: \u0026signalr.ServiceSkuArgs{\n\t\t\t\tName: pulumi.String(\"Premium_P1\"),\n\t\t\t\tCapacity: pulumi.Int(1),\n\t\t\t},\n\t\t\tIdentity: \u0026signalr.ServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.Any(testAzurermSignalrService.Identity[0].PrincipalId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = signalr.NewServiceCustomCertificate(ctx, \"test\", \u0026signalr.ServiceCustomCertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tSignalrServiceId: exampleService.ID(),\n\t\t\tCustomCertificateId: exampleCertificate.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAzurermKeyVaultAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.signalr.Service;\nimport com.pulumi.azure.signalr.ServiceArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceSkuArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.signalr.ServiceCustomCertificate;\nimport com.pulumi.azure.signalr.ServiceCustomCertificateArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"example-signalr\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .sku(ServiceSkuArgs.builder()\n .name(\"Premium_P1\")\n .capacity(1)\n .build())\n .identity(ServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(testAzurermSignalrService.identity()[0].principalId())\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n var test = new ServiceCustomCertificate(\"test\", ServiceCustomCertificateArgs.builder()\n .name(\"example-cert\")\n .signalrServiceId(exampleService.id())\n .customCertificateId(exampleCertificate.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAzurermKeyVaultAccessPolicy)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleService:\n type: azure:signalr:Service\n name: example\n properties:\n name: example-signalr\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n sku:\n name: Premium_P1\n capacity: 1\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n - tenantId: ${current.tenantId}\n objectId: ${testAzurermSignalrService.identity[0].principalId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\n test:\n type: azure:signalr:ServiceCustomCertificate\n properties:\n name: example-cert\n signalrServiceId: ${exampleService.id}\n customCertificateId: ${exampleCertificate.id}\n options:\n dependson:\n - ${exampleAzurermKeyVaultAccessPolicy}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustom Certificate for a SignalR service can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:signalr/serviceCustomCertificate:ServiceCustomCertificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/signalR/signalr1/customCertificates/cert1\n```\n\n", "properties": { "certificateVersion": { "type": "string", @@ -249833,7 +249833,7 @@ } }, "azure:signalr/serviceCustomDomain:ServiceCustomDomain": { - "description": "Manages an Azure SignalR Custom Domain.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleService = new azure.signalr.Service(\"example\", {\n name: \"example-signalr\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n sku: {\n name: \"Premium_P1\",\n capacity: 1,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: testAzurermSignalrService.identity[0].principalId,\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\nconst test = new azure.signalr.ServiceCustomCertificate(\"test\", {\n name: \"example-cert\",\n signalrServiceId: exampleService.id,\n customCertificateId: exampleCertificate.id,\n}, {\n dependsOn: [exampleAzurermKeyVaultAccessPolicy],\n});\nconst testServiceCustomDomain = new azure.signalr.ServiceCustomDomain(\"test\", {\n name: \"example-domain\",\n signalrServiceId: testAzurermSignalrService.id,\n domainName: \"tftest.com\",\n signalrCustomCertificateId: test.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service = azure.signalr.Service(\"example\",\n name=\"example-signalr\",\n location=test_azurerm_resource_group[\"location\"],\n resource_group_name=test_azurerm_resource_group[\"name\"],\n sku={\n \"name\": \"Premium_P1\",\n \"capacity\": 1,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": test_azurerm_signalr_service[\"identity\"][0][\"principalId\"],\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\ntest = azure.signalr.ServiceCustomCertificate(\"test\",\n name=\"example-cert\",\n signalr_service_id=example_service.id,\n custom_certificate_id=example_certificate.id,\n opts = pulumi.ResourceOptions(depends_on=[example_azurerm_key_vault_access_policy]))\ntest_service_custom_domain = azure.signalr.ServiceCustomDomain(\"test\",\n name=\"example-domain\",\n signalr_service_id=test_azurerm_signalr_service[\"id\"],\n domain_name=\"tftest.com\",\n signalr_custom_certificate_id=test.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleService = new Azure.SignalR.Service(\"example\", new()\n {\n Name = \"example-signalr\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n Sku = new Azure.SignalR.Inputs.ServiceSkuArgs\n {\n Name = \"Premium_P1\",\n Capacity = 1,\n },\n Identity = new Azure.SignalR.Inputs.ServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = testAzurermSignalrService.Identity[0].PrincipalId,\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n var test = new Azure.SignalR.ServiceCustomCertificate(\"test\", new()\n {\n Name = \"example-cert\",\n SignalrServiceId = exampleService.Id,\n CustomCertificateId = exampleCertificate.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAzurermKeyVaultAccessPolicy,\n },\n });\n\n var testServiceCustomDomain = new Azure.SignalR.ServiceCustomDomain(\"test\", new()\n {\n Name = \"example-domain\",\n SignalrServiceId = testAzurermSignalrService.Id,\n DomainName = \"tftest.com\",\n SignalrCustomCertificateId = test.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/signalr\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := signalr.NewService(ctx, \"example\", \u0026signalr.ServiceArgs{\n\t\t\tName: pulumi.String(\"example-signalr\"),\n\t\t\tLocation: pulumi.Any(testAzurermResourceGroup.Location),\n\t\t\tResourceGroupName: pulumi.Any(testAzurermResourceGroup.Name),\n\t\t\tSku: \u0026signalr.ServiceSkuArgs{\n\t\t\t\tName: pulumi.String(\"Premium_P1\"),\n\t\t\t\tCapacity: pulumi.Int(1),\n\t\t\t},\n\t\t\tIdentity: \u0026signalr.ServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.Any(testAzurermSignalrService.Identity[0].PrincipalId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttest, err := signalr.NewServiceCustomCertificate(ctx, \"test\", \u0026signalr.ServiceCustomCertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tSignalrServiceId: exampleService.ID(),\n\t\t\tCustomCertificateId: exampleCertificate.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAzurermKeyVaultAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = signalr.NewServiceCustomDomain(ctx, \"test\", \u0026signalr.ServiceCustomDomainArgs{\n\t\t\tName: pulumi.String(\"example-domain\"),\n\t\t\tSignalrServiceId: pulumi.Any(testAzurermSignalrService.Id),\n\t\t\tDomainName: pulumi.String(\"tftest.com\"),\n\t\t\tSignalrCustomCertificateId: test.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.signalr.Service;\nimport com.pulumi.azure.signalr.ServiceArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceSkuArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.signalr.ServiceCustomCertificate;\nimport com.pulumi.azure.signalr.ServiceCustomCertificateArgs;\nimport com.pulumi.azure.signalr.ServiceCustomDomain;\nimport com.pulumi.azure.signalr.ServiceCustomDomainArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"example-signalr\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .sku(ServiceSkuArgs.builder()\n .name(\"Premium_P1\")\n .capacity(1)\n .build())\n .identity(ServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(testAzurermSignalrService.identity()[0].principalId())\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n var test = new ServiceCustomCertificate(\"test\", ServiceCustomCertificateArgs.builder()\n .name(\"example-cert\")\n .signalrServiceId(exampleService.id())\n .customCertificateId(exampleCertificate.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAzurermKeyVaultAccessPolicy)\n .build());\n\n var testServiceCustomDomain = new ServiceCustomDomain(\"testServiceCustomDomain\", ServiceCustomDomainArgs.builder()\n .name(\"example-domain\")\n .signalrServiceId(testAzurermSignalrService.id())\n .domainName(\"tftest.com\")\n .signalrCustomCertificateId(test.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleService:\n type: azure:signalr:Service\n name: example\n properties:\n name: example-signalr\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n sku:\n name: Premium_P1\n capacity: 1\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n - tenantId: ${current.tenantId}\n objectId: ${testAzurermSignalrService.identity[0].principalId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\n test:\n type: azure:signalr:ServiceCustomCertificate\n properties:\n name: example-cert\n signalrServiceId: ${exampleService.id}\n customCertificateId: ${exampleCertificate.id}\n options:\n dependson:\n - ${exampleAzurermKeyVaultAccessPolicy}\n testServiceCustomDomain:\n type: azure:signalr:ServiceCustomDomain\n name: test\n properties:\n name: example-domain\n signalrServiceId: ${testAzurermSignalrService.id}\n domainName: tftest.com\n signalrCustomCertificateId: ${test.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustom Domain for a SignalR service can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:signalr/serviceCustomDomain:ServiceCustomDomain example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/signalR/signalr1/customDomains/customDomain1\n```\n\n", + "description": "Manages an Azure SignalR Custom Domain.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleService = new azure.signalr.Service(\"example\", {\n name: \"example-signalr\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n sku: {\n name: \"Premium_P1\",\n capacity: 1,\n },\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example-keyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: testAzurermSignalrService.identity[0].principalId,\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\nconst test = new azure.signalr.ServiceCustomCertificate(\"test\", {\n name: \"example-cert\",\n signalrServiceId: exampleService.id,\n customCertificateId: exampleCertificate.id,\n}, {\n dependsOn: [exampleAzurermKeyVaultAccessPolicy],\n});\nconst testServiceCustomDomain = new azure.signalr.ServiceCustomDomain(\"test\", {\n name: \"example-domain\",\n signalrServiceId: testAzurermSignalrService.id,\n domainName: \"tftest.com\",\n signalrCustomCertificateId: test.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_service = azure.signalr.Service(\"example\",\n name=\"example-signalr\",\n location=test_azurerm_resource_group[\"location\"],\n resource_group_name=test_azurerm_resource_group[\"name\"],\n sku={\n \"name\": \"Premium_P1\",\n \"capacity\": 1,\n },\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example-keyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": test_azurerm_signalr_service[\"identity\"][0][\"principalId\"],\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\ntest = azure.signalr.ServiceCustomCertificate(\"test\",\n name=\"example-cert\",\n signalr_service_id=example_service.id,\n custom_certificate_id=example_certificate.id,\n opts = pulumi.ResourceOptions(depends_on=[example_azurerm_key_vault_access_policy]))\ntest_service_custom_domain = azure.signalr.ServiceCustomDomain(\"test\",\n name=\"example-domain\",\n signalr_service_id=test_azurerm_signalr_service[\"id\"],\n domain_name=\"tftest.com\",\n signalr_custom_certificate_id=test.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleService = new Azure.SignalR.Service(\"example\", new()\n {\n Name = \"example-signalr\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n Sku = new Azure.SignalR.Inputs.ServiceSkuArgs\n {\n Name = \"Premium_P1\",\n Capacity = 1,\n },\n Identity = new Azure.SignalR.Inputs.ServiceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example-keyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = testAzurermSignalrService.Identity[0].PrincipalId,\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n var test = new Azure.SignalR.ServiceCustomCertificate(\"test\", new()\n {\n Name = \"example-cert\",\n SignalrServiceId = exampleService.Id,\n CustomCertificateId = exampleCertificate.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAzurermKeyVaultAccessPolicy,\n },\n });\n\n var testServiceCustomDomain = new Azure.SignalR.ServiceCustomDomain(\"test\", new()\n {\n Name = \"example-domain\",\n SignalrServiceId = testAzurermSignalrService.Id,\n DomainName = \"tftest.com\",\n SignalrCustomCertificateId = test.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/signalr\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := signalr.NewService(ctx, \"example\", \u0026signalr.ServiceArgs{\n\t\t\tName: pulumi.String(\"example-signalr\"),\n\t\t\tLocation: pulumi.Any(testAzurermResourceGroup.Location),\n\t\t\tResourceGroupName: pulumi.Any(testAzurermResourceGroup.Name),\n\t\t\tSku: \u0026signalr.ServiceSkuArgs{\n\t\t\t\tName: pulumi.String(\"Premium_P1\"),\n\t\t\t\tCapacity: pulumi.Int(1),\n\t\t\t},\n\t\t\tIdentity: \u0026signalr.ServiceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example-keyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.Any(testAzurermSignalrService.Identity[0].PrincipalId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttest, err := signalr.NewServiceCustomCertificate(ctx, \"test\", \u0026signalr.ServiceCustomCertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tSignalrServiceId: exampleService.ID(),\n\t\t\tCustomCertificateId: exampleCertificate.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAzurermKeyVaultAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = signalr.NewServiceCustomDomain(ctx, \"test\", \u0026signalr.ServiceCustomDomainArgs{\n\t\t\tName: pulumi.String(\"example-domain\"),\n\t\t\tSignalrServiceId: pulumi.Any(testAzurermSignalrService.Id),\n\t\t\tDomainName: pulumi.String(\"tftest.com\"),\n\t\t\tSignalrCustomCertificateId: test.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.signalr.Service;\nimport com.pulumi.azure.signalr.ServiceArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceSkuArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceIdentityArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.signalr.ServiceCustomCertificate;\nimport com.pulumi.azure.signalr.ServiceCustomCertificateArgs;\nimport com.pulumi.azure.signalr.ServiceCustomDomain;\nimport com.pulumi.azure.signalr.ServiceCustomDomainArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"example-signalr\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .sku(ServiceSkuArgs.builder()\n .name(\"Premium_P1\")\n .capacity(1)\n .build())\n .identity(ServiceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example-keyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(testAzurermSignalrService.identity()[0].principalId())\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n var test = new ServiceCustomCertificate(\"test\", ServiceCustomCertificateArgs.builder()\n .name(\"example-cert\")\n .signalrServiceId(exampleService.id())\n .customCertificateId(exampleCertificate.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAzurermKeyVaultAccessPolicy)\n .build());\n\n var testServiceCustomDomain = new ServiceCustomDomain(\"testServiceCustomDomain\", ServiceCustomDomainArgs.builder()\n .name(\"example-domain\")\n .signalrServiceId(testAzurermSignalrService.id())\n .domainName(\"tftest.com\")\n .signalrCustomCertificateId(test.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleService:\n type: azure:signalr:Service\n name: example\n properties:\n name: example-signalr\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n sku:\n name: Premium_P1\n capacity: 1\n identity:\n type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example-keyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n - tenantId: ${current.tenantId}\n objectId: ${testAzurermSignalrService.identity[0].principalId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\n test:\n type: azure:signalr:ServiceCustomCertificate\n properties:\n name: example-cert\n signalrServiceId: ${exampleService.id}\n customCertificateId: ${exampleCertificate.id}\n options:\n dependson:\n - ${exampleAzurermKeyVaultAccessPolicy}\n testServiceCustomDomain:\n type: azure:signalr:ServiceCustomDomain\n name: test\n properties:\n name: example-domain\n signalrServiceId: ${testAzurermSignalrService.id}\n domainName: tftest.com\n signalrCustomCertificateId: ${test.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustom Domain for a SignalR service can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:signalr/serviceCustomDomain:ServiceCustomDomain example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/signalR/signalr1/customDomains/customDomain1\n```\n\n", "properties": { "domainName": { "type": "string", @@ -249995,7 +249995,7 @@ } }, "azure:signalr/sharedPrivateLinkResource:SharedPrivateLinkResource": { - "description": "Manages the Shared Private Link Resource for a Signalr service.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"terraform-signalr\",\n location: \"east us\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\"ManageContacts\"],\n keyPermissions: [\"Create\"],\n secretPermissions: [\"Set\"],\n }],\n});\nconst test = new azure.signalr.Service(\"test\", {\n name: \"tfex-signalr\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n sku: {\n name: \"Standard_S1\",\n capacity: 1,\n },\n});\nconst exampleSharedPrivateLinkResource = new azure.signalr.SharedPrivateLinkResource(\"example\", {\n name: \"tfex-signalr-splr\",\n signalrServiceId: exampleAzurermSignalrService.id,\n subResourceName: \"vault\",\n targetResourceId: exampleKeyVault.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"terraform-signalr\",\n location=\"east us\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\"ManageContacts\"],\n \"key_permissions\": [\"Create\"],\n \"secret_permissions\": [\"Set\"],\n }])\ntest = azure.signalr.Service(\"test\",\n name=\"tfex-signalr\",\n location=test_azurerm_resource_group[\"location\"],\n resource_group_name=test_azurerm_resource_group[\"name\"],\n sku={\n \"name\": \"Standard_S1\",\n \"capacity\": 1,\n })\nexample_shared_private_link_resource = azure.signalr.SharedPrivateLinkResource(\"example\",\n name=\"tfex-signalr-splr\",\n signalr_service_id=example_azurerm_signalr_service[\"id\"],\n sub_resource_name=\"vault\",\n target_resource_id=example_key_vault.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"terraform-signalr\",\n Location = \"east us\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"ManageContacts\",\n },\n KeyPermissions = new[]\n {\n \"Create\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n },\n },\n },\n });\n\n var test = new Azure.SignalR.Service(\"test\", new()\n {\n Name = \"tfex-signalr\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n Sku = new Azure.SignalR.Inputs.ServiceSkuArgs\n {\n Name = \"Standard_S1\",\n Capacity = 1,\n },\n });\n\n var exampleSharedPrivateLinkResource = new Azure.SignalR.SharedPrivateLinkResource(\"example\", new()\n {\n Name = \"tfex-signalr-splr\",\n SignalrServiceId = exampleAzurermSignalrService.Id,\n SubResourceName = \"vault\",\n TargetResourceId = exampleKeyVault.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/signalr\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"terraform-signalr\"),\n\t\t\tLocation: pulumi.String(\"east us\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = signalr.NewService(ctx, \"test\", \u0026signalr.ServiceArgs{\n\t\t\tName: pulumi.String(\"tfex-signalr\"),\n\t\t\tLocation: pulumi.Any(testAzurermResourceGroup.Location),\n\t\t\tResourceGroupName: pulumi.Any(testAzurermResourceGroup.Name),\n\t\t\tSku: \u0026signalr.ServiceSkuArgs{\n\t\t\t\tName: pulumi.String(\"Standard_S1\"),\n\t\t\t\tCapacity: pulumi.Int(1),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = signalr.NewSharedPrivateLinkResource(ctx, \"example\", \u0026signalr.SharedPrivateLinkResourceArgs{\n\t\t\tName: pulumi.String(\"tfex-signalr-splr\"),\n\t\t\tSignalrServiceId: pulumi.Any(exampleAzurermSignalrService.Id),\n\t\t\tSubResourceName: pulumi.String(\"vault\"),\n\t\t\tTargetResourceId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.signalr.Service;\nimport com.pulumi.azure.signalr.ServiceArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceSkuArgs;\nimport com.pulumi.azure.signalr.SharedPrivateLinkResource;\nimport com.pulumi.azure.signalr.SharedPrivateLinkResourceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"terraform-signalr\")\n .location(\"east us\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions(\"ManageContacts\")\n .keyPermissions(\"Create\")\n .secretPermissions(\"Set\")\n .build())\n .build());\n\n var test = new Service(\"test\", ServiceArgs.builder()\n .name(\"tfex-signalr\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .sku(ServiceSkuArgs.builder()\n .name(\"Standard_S1\")\n .capacity(1)\n .build())\n .build());\n\n var exampleSharedPrivateLinkResource = new SharedPrivateLinkResource(\"exampleSharedPrivateLinkResource\", SharedPrivateLinkResourceArgs.builder()\n .name(\"tfex-signalr-splr\")\n .signalrServiceId(exampleAzurermSignalrService.id())\n .subResourceName(\"vault\")\n .targetResourceId(exampleKeyVault.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: terraform-signalr\n location: east us\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - ManageContacts\n keyPermissions:\n - Create\n secretPermissions:\n - Set\n test:\n type: azure:signalr:Service\n properties:\n name: tfex-signalr\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n sku:\n name: Standard_S1\n capacity: 1\n exampleSharedPrivateLinkResource:\n type: azure:signalr:SharedPrivateLinkResource\n name: example\n properties:\n name: tfex-signalr-splr\n signalrServiceId: ${exampleAzurermSignalrService.id}\n subResourceName: vault\n targetResourceId: ${exampleKeyVault.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSignalr Shared Private Link Resource can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:signalr/sharedPrivateLinkResource:SharedPrivateLinkResource example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/signalR/signalr1/sharedPrivateLinkResources/resource1\n```\n\n", + "description": "Manages the Shared Private Link Resource for a Signalr service.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"terraform-signalr\",\n location: \"east us\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\"ManageContacts\"],\n keyPermissions: [\"Create\"],\n secretPermissions: [\"Set\"],\n }],\n});\nconst test = new azure.signalr.Service(\"test\", {\n name: \"tfex-signalr\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n sku: {\n name: \"Standard_S1\",\n capacity: 1,\n },\n});\nconst exampleSharedPrivateLinkResource = new azure.signalr.SharedPrivateLinkResource(\"example\", {\n name: \"tfex-signalr-splr\",\n signalrServiceId: exampleAzurermSignalrService.id,\n subResourceName: \"vault\",\n targetResourceId: exampleKeyVault.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"terraform-signalr\",\n location=\"east us\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\"ManageContacts\"],\n \"key_permissions\": [\"Create\"],\n \"secret_permissions\": [\"Set\"],\n }])\ntest = azure.signalr.Service(\"test\",\n name=\"tfex-signalr\",\n location=test_azurerm_resource_group[\"location\"],\n resource_group_name=test_azurerm_resource_group[\"name\"],\n sku={\n \"name\": \"Standard_S1\",\n \"capacity\": 1,\n })\nexample_shared_private_link_resource = azure.signalr.SharedPrivateLinkResource(\"example\",\n name=\"tfex-signalr-splr\",\n signalr_service_id=example_azurerm_signalr_service[\"id\"],\n sub_resource_name=\"vault\",\n target_resource_id=example_key_vault.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"terraform-signalr\",\n Location = \"east us\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"ManageContacts\",\n },\n KeyPermissions = new[]\n {\n \"Create\",\n },\n SecretPermissions = new[]\n {\n \"Set\",\n },\n },\n },\n });\n\n var test = new Azure.SignalR.Service(\"test\", new()\n {\n Name = \"tfex-signalr\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n Sku = new Azure.SignalR.Inputs.ServiceSkuArgs\n {\n Name = \"Standard_S1\",\n Capacity = 1,\n },\n });\n\n var exampleSharedPrivateLinkResource = new Azure.SignalR.SharedPrivateLinkResource(\"example\", new()\n {\n Name = \"tfex-signalr-splr\",\n SignalrServiceId = exampleAzurermSignalrService.Id,\n SubResourceName = \"vault\",\n TargetResourceId = exampleKeyVault.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/signalr\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"terraform-signalr\"),\n\t\t\tLocation: pulumi.String(\"east us\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"ManageContacts\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = signalr.NewService(ctx, \"test\", \u0026signalr.ServiceArgs{\n\t\t\tName: pulumi.String(\"tfex-signalr\"),\n\t\t\tLocation: pulumi.Any(testAzurermResourceGroup.Location),\n\t\t\tResourceGroupName: pulumi.Any(testAzurermResourceGroup.Name),\n\t\t\tSku: \u0026signalr.ServiceSkuArgs{\n\t\t\t\tName: pulumi.String(\"Standard_S1\"),\n\t\t\t\tCapacity: pulumi.Int(1),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = signalr.NewSharedPrivateLinkResource(ctx, \"example\", \u0026signalr.SharedPrivateLinkResourceArgs{\n\t\t\tName: pulumi.String(\"tfex-signalr-splr\"),\n\t\t\tSignalrServiceId: pulumi.Any(exampleAzurermSignalrService.Id),\n\t\t\tSubResourceName: pulumi.String(\"vault\"),\n\t\t\tTargetResourceId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.signalr.Service;\nimport com.pulumi.azure.signalr.ServiceArgs;\nimport com.pulumi.azure.signalr.inputs.ServiceSkuArgs;\nimport com.pulumi.azure.signalr.SharedPrivateLinkResource;\nimport com.pulumi.azure.signalr.SharedPrivateLinkResourceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"terraform-signalr\")\n .location(\"east us\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions(\"ManageContacts\")\n .keyPermissions(\"Create\")\n .secretPermissions(\"Set\")\n .build())\n .build());\n\n var test = new Service(\"test\", ServiceArgs.builder()\n .name(\"tfex-signalr\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .sku(ServiceSkuArgs.builder()\n .name(\"Standard_S1\")\n .capacity(1)\n .build())\n .build());\n\n var exampleSharedPrivateLinkResource = new SharedPrivateLinkResource(\"exampleSharedPrivateLinkResource\", SharedPrivateLinkResourceArgs.builder()\n .name(\"tfex-signalr-splr\")\n .signalrServiceId(exampleAzurermSignalrService.id())\n .subResourceName(\"vault\")\n .targetResourceId(exampleKeyVault.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: terraform-signalr\n location: east us\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - ManageContacts\n keyPermissions:\n - Create\n secretPermissions:\n - Set\n test:\n type: azure:signalr:Service\n properties:\n name: tfex-signalr\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n sku:\n name: Standard_S1\n capacity: 1\n exampleSharedPrivateLinkResource:\n type: azure:signalr:SharedPrivateLinkResource\n name: example\n properties:\n name: tfex-signalr-splr\n signalrServiceId: ${exampleAzurermSignalrService.id}\n subResourceName: vault\n targetResourceId: ${exampleKeyVault.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSignalr Shared Private Link Resource can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:signalr/sharedPrivateLinkResource:SharedPrivateLinkResource example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/signalR/signalr1/sharedPrivateLinkResources/resource1\n```\n\n", "properties": { "name": { "type": "string", @@ -251286,7 +251286,7 @@ } }, "azure:siterecovery/replicationRecoveryPlan:ReplicationRecoveryPlan": { - "description": "Manages a Site Recovery Replication Recovery Plan within a Recovery Services vault. A recovery plan gathers machines into recovery groups for the purpose of failover.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = new azure.core.ResourceGroup(\"primary\", {\n name: \"tfex-replicated-vm-primary\",\n location: \"West US\",\n});\nconst secondary = new azure.core.ResourceGroup(\"secondary\", {\n name: \"tfex-replicated-vm-secondary\",\n location: \"East US\",\n});\nconst primaryVirtualNetwork = new azure.network.VirtualNetwork(\"primary\", {\n name: \"network1\",\n resourceGroupName: primary.name,\n addressSpaces: [\"192.168.1.0/24\"],\n location: primary.location,\n});\nconst primarySubnet = new azure.network.Subnet(\"primary\", {\n name: \"network1-subnet\",\n resourceGroupName: primary.name,\n virtualNetworkName: primaryVirtualNetwork.name,\n addressPrefixes: [\"192.168.1.0/24\"],\n});\nconst primaryPublicIp = new azure.network.PublicIp(\"primary\", {\n name: \"vm-public-ip-primary\",\n allocationMethod: \"Static\",\n location: primary.location,\n resourceGroupName: primary.name,\n sku: \"Basic\",\n});\nconst vmNetworkInterface = new azure.network.NetworkInterface(\"vm\", {\n name: \"vm-nic\",\n location: primary.location,\n resourceGroupName: primary.name,\n ipConfigurations: [{\n name: \"vm\",\n subnetId: primarySubnet.id,\n privateIpAddressAllocation: \"Dynamic\",\n publicIpAddressId: primaryPublicIp.id,\n }],\n});\nconst vm = new azure.compute.VirtualMachine(\"vm\", {\n name: \"vm\",\n location: primary.location,\n resourceGroupName: primary.name,\n vmSize: \"Standard_B1s\",\n networkInterfaceIds: [vmNetworkInterface.id],\n storageImageReference: {\n publisher: \"Canonical\",\n offer: \"0001-com-ubuntu-server-jammy\",\n sku: \"22_04-lts\",\n version: \"latest\",\n },\n storageOsDisk: {\n name: \"vm-os-disk\",\n osType: \"Linux\",\n caching: \"ReadWrite\",\n createOption: \"FromImage\",\n managedDiskType: \"Premium_LRS\",\n },\n osProfile: {\n adminUsername: \"test-admin-123\",\n adminPassword: \"test-pwd-123\",\n computerName: \"vm\",\n },\n osProfileLinuxConfig: {\n disablePasswordAuthentication: false,\n },\n});\nconst vault = new azure.recoveryservices.Vault(\"vault\", {\n name: \"example-recovery-vault\",\n location: secondary.location,\n resourceGroupName: secondary.name,\n sku: \"Standard\",\n});\nconst primaryFabric = new azure.siterecovery.Fabric(\"primary\", {\n name: \"primary-fabric\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n location: primary.location,\n});\nconst secondaryFabric = new azure.siterecovery.Fabric(\"secondary\", {\n name: \"secondary-fabric\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n location: secondary.location,\n});\nconst primaryProtectionContainer = new azure.siterecovery.ProtectionContainer(\"primary\", {\n name: \"primary-protection-container\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n recoveryFabricName: primaryFabric.name,\n});\nconst secondaryProtectionContainer = new azure.siterecovery.ProtectionContainer(\"secondary\", {\n name: \"secondary-protection-container\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n recoveryFabricName: secondaryFabric.name,\n});\nconst policy = new azure.siterecovery.ReplicationPolicy(\"policy\", {\n name: \"policy\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n recoveryPointRetentionInMinutes: 24 * 60,\n applicationConsistentSnapshotFrequencyInMinutes: 4 * 60,\n});\nconst container_mapping = new azure.siterecovery.ProtectionContainerMapping(\"container-mapping\", {\n name: \"container-mapping\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n recoveryFabricName: primaryFabric.name,\n recoverySourceProtectionContainerName: primaryProtectionContainer.name,\n recoveryTargetProtectionContainerId: secondaryProtectionContainer.id,\n recoveryReplicationPolicyId: policy.id,\n});\nconst secondaryVirtualNetwork = new azure.network.VirtualNetwork(\"secondary\", {\n name: \"network2\",\n resourceGroupName: secondary.name,\n addressSpaces: [\"192.168.2.0/24\"],\n location: secondary.location,\n});\nconst network_mapping = new azure.siterecovery.NetworkMapping(\"network-mapping\", {\n name: \"network-mapping\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n sourceRecoveryFabricName: primaryFabric.name,\n targetRecoveryFabricName: secondaryFabric.name,\n sourceNetworkId: primaryVirtualNetwork.id,\n targetNetworkId: secondaryVirtualNetwork.id,\n});\nconst primaryAccount = new azure.storage.Account(\"primary\", {\n name: \"primaryrecoverycache\",\n location: primary.location,\n resourceGroupName: primary.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst secondarySubnet = new azure.network.Subnet(\"secondary\", {\n name: \"network2-subnet\",\n resourceGroupName: secondary.name,\n virtualNetworkName: secondaryVirtualNetwork.name,\n addressPrefixes: [\"192.168.2.0/24\"],\n});\nconst secondaryPublicIp = new azure.network.PublicIp(\"secondary\", {\n name: \"vm-public-ip-secondary\",\n allocationMethod: \"Static\",\n location: secondary.location,\n resourceGroupName: secondary.name,\n sku: \"Basic\",\n});\nconst vm_replication = new azure.siterecovery.ReplicatedVM(\"vm-replication\", {\n name: \"vm-replication\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n sourceRecoveryFabricName: primaryFabric.name,\n sourceVmId: vm.id,\n recoveryReplicationPolicyId: policy.id,\n sourceRecoveryProtectionContainerName: primaryProtectionContainer.name,\n targetResourceGroupId: secondary.id,\n targetRecoveryFabricId: secondaryFabric.id,\n targetRecoveryProtectionContainerId: secondaryProtectionContainer.id,\n managedDisks: [{\n diskId: vm.storageOsDisk.apply(storageOsDisk =\u003e storageOsDisk.managedDiskId),\n stagingStorageAccountId: primaryAccount.id,\n targetResourceGroupId: secondary.id,\n targetDiskType: \"Premium_LRS\",\n targetReplicaDiskType: \"Premium_LRS\",\n }],\n networkInterfaces: [{\n sourceNetworkInterfaceId: vmNetworkInterface.id,\n targetSubnetName: secondarySubnet.name,\n recoveryPublicIpAddressId: secondaryPublicIp.id,\n }],\n}, {\n dependsOn: [\n container_mapping,\n network_mapping,\n ],\n});\nconst example = new azure.siterecovery.ReplicationRecoveryPlan(\"example\", {\n name: \"example-recover-plan\",\n recoveryVaultId: vault.id,\n sourceRecoveryFabricId: primaryFabric.id,\n targetRecoveryFabricId: secondaryFabric.id,\n shutdownRecoveryGroup: {},\n failoverRecoveryGroup: {},\n bootRecoveryGroups: [{\n replicatedProtectedItems: [vm_replication.id],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.ResourceGroup(\"primary\",\n name=\"tfex-replicated-vm-primary\",\n location=\"West US\")\nsecondary = azure.core.ResourceGroup(\"secondary\",\n name=\"tfex-replicated-vm-secondary\",\n location=\"East US\")\nprimary_virtual_network = azure.network.VirtualNetwork(\"primary\",\n name=\"network1\",\n resource_group_name=primary.name,\n address_spaces=[\"192.168.1.0/24\"],\n location=primary.location)\nprimary_subnet = azure.network.Subnet(\"primary\",\n name=\"network1-subnet\",\n resource_group_name=primary.name,\n virtual_network_name=primary_virtual_network.name,\n address_prefixes=[\"192.168.1.0/24\"])\nprimary_public_ip = azure.network.PublicIp(\"primary\",\n name=\"vm-public-ip-primary\",\n allocation_method=\"Static\",\n location=primary.location,\n resource_group_name=primary.name,\n sku=\"Basic\")\nvm_network_interface = azure.network.NetworkInterface(\"vm\",\n name=\"vm-nic\",\n location=primary.location,\n resource_group_name=primary.name,\n ip_configurations=[{\n \"name\": \"vm\",\n \"subnet_id\": primary_subnet.id,\n \"private_ip_address_allocation\": \"Dynamic\",\n \"public_ip_address_id\": primary_public_ip.id,\n }])\nvm = azure.compute.VirtualMachine(\"vm\",\n name=\"vm\",\n location=primary.location,\n resource_group_name=primary.name,\n vm_size=\"Standard_B1s\",\n network_interface_ids=[vm_network_interface.id],\n storage_image_reference={\n \"publisher\": \"Canonical\",\n \"offer\": \"0001-com-ubuntu-server-jammy\",\n \"sku\": \"22_04-lts\",\n \"version\": \"latest\",\n },\n storage_os_disk={\n \"name\": \"vm-os-disk\",\n \"os_type\": \"Linux\",\n \"caching\": \"ReadWrite\",\n \"create_option\": \"FromImage\",\n \"managed_disk_type\": \"Premium_LRS\",\n },\n os_profile={\n \"admin_username\": \"test-admin-123\",\n \"admin_password\": \"test-pwd-123\",\n \"computer_name\": \"vm\",\n },\n os_profile_linux_config={\n \"disable_password_authentication\": False,\n })\nvault = azure.recoveryservices.Vault(\"vault\",\n name=\"example-recovery-vault\",\n location=secondary.location,\n resource_group_name=secondary.name,\n sku=\"Standard\")\nprimary_fabric = azure.siterecovery.Fabric(\"primary\",\n name=\"primary-fabric\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n location=primary.location)\nsecondary_fabric = azure.siterecovery.Fabric(\"secondary\",\n name=\"secondary-fabric\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n location=secondary.location)\nprimary_protection_container = azure.siterecovery.ProtectionContainer(\"primary\",\n name=\"primary-protection-container\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n recovery_fabric_name=primary_fabric.name)\nsecondary_protection_container = azure.siterecovery.ProtectionContainer(\"secondary\",\n name=\"secondary-protection-container\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n recovery_fabric_name=secondary_fabric.name)\npolicy = azure.siterecovery.ReplicationPolicy(\"policy\",\n name=\"policy\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n recovery_point_retention_in_minutes=24 * 60,\n application_consistent_snapshot_frequency_in_minutes=4 * 60)\ncontainer_mapping = azure.siterecovery.ProtectionContainerMapping(\"container-mapping\",\n name=\"container-mapping\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n recovery_fabric_name=primary_fabric.name,\n recovery_source_protection_container_name=primary_protection_container.name,\n recovery_target_protection_container_id=secondary_protection_container.id,\n recovery_replication_policy_id=policy.id)\nsecondary_virtual_network = azure.network.VirtualNetwork(\"secondary\",\n name=\"network2\",\n resource_group_name=secondary.name,\n address_spaces=[\"192.168.2.0/24\"],\n location=secondary.location)\nnetwork_mapping = azure.siterecovery.NetworkMapping(\"network-mapping\",\n name=\"network-mapping\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n source_recovery_fabric_name=primary_fabric.name,\n target_recovery_fabric_name=secondary_fabric.name,\n source_network_id=primary_virtual_network.id,\n target_network_id=secondary_virtual_network.id)\nprimary_account = azure.storage.Account(\"primary\",\n name=\"primaryrecoverycache\",\n location=primary.location,\n resource_group_name=primary.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nsecondary_subnet = azure.network.Subnet(\"secondary\",\n name=\"network2-subnet\",\n resource_group_name=secondary.name,\n virtual_network_name=secondary_virtual_network.name,\n address_prefixes=[\"192.168.2.0/24\"])\nsecondary_public_ip = azure.network.PublicIp(\"secondary\",\n name=\"vm-public-ip-secondary\",\n allocation_method=\"Static\",\n location=secondary.location,\n resource_group_name=secondary.name,\n sku=\"Basic\")\nvm_replication = azure.siterecovery.ReplicatedVM(\"vm-replication\",\n name=\"vm-replication\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n source_recovery_fabric_name=primary_fabric.name,\n source_vm_id=vm.id,\n recovery_replication_policy_id=policy.id,\n source_recovery_protection_container_name=primary_protection_container.name,\n target_resource_group_id=secondary.id,\n target_recovery_fabric_id=secondary_fabric.id,\n target_recovery_protection_container_id=secondary_protection_container.id,\n managed_disks=[{\n \"disk_id\": vm.storage_os_disk.managed_disk_id,\n \"staging_storage_account_id\": primary_account.id,\n \"target_resource_group_id\": secondary.id,\n \"target_disk_type\": \"Premium_LRS\",\n \"target_replica_disk_type\": \"Premium_LRS\",\n }],\n network_interfaces=[{\n \"source_network_interface_id\": vm_network_interface.id,\n \"target_subnet_name\": secondary_subnet.name,\n \"recovery_public_ip_address_id\": secondary_public_ip.id,\n }],\n opts = pulumi.ResourceOptions(depends_on=[\n container_mapping,\n network_mapping,\n ]))\nexample = azure.siterecovery.ReplicationRecoveryPlan(\"example\",\n name=\"example-recover-plan\",\n recovery_vault_id=vault.id,\n source_recovery_fabric_id=primary_fabric.id,\n target_recovery_fabric_id=secondary_fabric.id,\n shutdown_recovery_group={},\n failover_recovery_group={},\n boot_recovery_groups=[{\n \"replicated_protected_items\": [vm_replication.id],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = new Azure.Core.ResourceGroup(\"primary\", new()\n {\n Name = \"tfex-replicated-vm-primary\",\n Location = \"West US\",\n });\n\n var secondary = new Azure.Core.ResourceGroup(\"secondary\", new()\n {\n Name = \"tfex-replicated-vm-secondary\",\n Location = \"East US\",\n });\n\n var primaryVirtualNetwork = new Azure.Network.VirtualNetwork(\"primary\", new()\n {\n Name = \"network1\",\n ResourceGroupName = primary.Name,\n AddressSpaces = new[]\n {\n \"192.168.1.0/24\",\n },\n Location = primary.Location,\n });\n\n var primarySubnet = new Azure.Network.Subnet(\"primary\", new()\n {\n Name = \"network1-subnet\",\n ResourceGroupName = primary.Name,\n VirtualNetworkName = primaryVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"192.168.1.0/24\",\n },\n });\n\n var primaryPublicIp = new Azure.Network.PublicIp(\"primary\", new()\n {\n Name = \"vm-public-ip-primary\",\n AllocationMethod = \"Static\",\n Location = primary.Location,\n ResourceGroupName = primary.Name,\n Sku = \"Basic\",\n });\n\n var vmNetworkInterface = new Azure.Network.NetworkInterface(\"vm\", new()\n {\n Name = \"vm-nic\",\n Location = primary.Location,\n ResourceGroupName = primary.Name,\n IpConfigurations = new[]\n {\n new Azure.Network.Inputs.NetworkInterfaceIpConfigurationArgs\n {\n Name = \"vm\",\n SubnetId = primarySubnet.Id,\n PrivateIpAddressAllocation = \"Dynamic\",\n PublicIpAddressId = primaryPublicIp.Id,\n },\n },\n });\n\n var vm = new Azure.Compute.VirtualMachine(\"vm\", new()\n {\n Name = \"vm\",\n Location = primary.Location,\n ResourceGroupName = primary.Name,\n VmSize = \"Standard_B1s\",\n NetworkInterfaceIds = new[]\n {\n vmNetworkInterface.Id,\n },\n StorageImageReference = new Azure.Compute.Inputs.VirtualMachineStorageImageReferenceArgs\n {\n Publisher = \"Canonical\",\n Offer = \"0001-com-ubuntu-server-jammy\",\n Sku = \"22_04-lts\",\n Version = \"latest\",\n },\n StorageOsDisk = new Azure.Compute.Inputs.VirtualMachineStorageOsDiskArgs\n {\n Name = \"vm-os-disk\",\n OsType = \"Linux\",\n Caching = \"ReadWrite\",\n CreateOption = \"FromImage\",\n ManagedDiskType = \"Premium_LRS\",\n },\n OsProfile = new Azure.Compute.Inputs.VirtualMachineOsProfileArgs\n {\n AdminUsername = \"test-admin-123\",\n AdminPassword = \"test-pwd-123\",\n ComputerName = \"vm\",\n },\n OsProfileLinuxConfig = new Azure.Compute.Inputs.VirtualMachineOsProfileLinuxConfigArgs\n {\n DisablePasswordAuthentication = false,\n },\n });\n\n var vault = new Azure.RecoveryServices.Vault(\"vault\", new()\n {\n Name = \"example-recovery-vault\",\n Location = secondary.Location,\n ResourceGroupName = secondary.Name,\n Sku = \"Standard\",\n });\n\n var primaryFabric = new Azure.SiteRecovery.Fabric(\"primary\", new()\n {\n Name = \"primary-fabric\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n Location = primary.Location,\n });\n\n var secondaryFabric = new Azure.SiteRecovery.Fabric(\"secondary\", new()\n {\n Name = \"secondary-fabric\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n Location = secondary.Location,\n });\n\n var primaryProtectionContainer = new Azure.SiteRecovery.ProtectionContainer(\"primary\", new()\n {\n Name = \"primary-protection-container\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n RecoveryFabricName = primaryFabric.Name,\n });\n\n var secondaryProtectionContainer = new Azure.SiteRecovery.ProtectionContainer(\"secondary\", new()\n {\n Name = \"secondary-protection-container\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n RecoveryFabricName = secondaryFabric.Name,\n });\n\n var policy = new Azure.SiteRecovery.ReplicationPolicy(\"policy\", new()\n {\n Name = \"policy\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n RecoveryPointRetentionInMinutes = 24 * 60,\n ApplicationConsistentSnapshotFrequencyInMinutes = 4 * 60,\n });\n\n var container_mapping = new Azure.SiteRecovery.ProtectionContainerMapping(\"container-mapping\", new()\n {\n Name = \"container-mapping\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n RecoveryFabricName = primaryFabric.Name,\n RecoverySourceProtectionContainerName = primaryProtectionContainer.Name,\n RecoveryTargetProtectionContainerId = secondaryProtectionContainer.Id,\n RecoveryReplicationPolicyId = policy.Id,\n });\n\n var secondaryVirtualNetwork = new Azure.Network.VirtualNetwork(\"secondary\", new()\n {\n Name = \"network2\",\n ResourceGroupName = secondary.Name,\n AddressSpaces = new[]\n {\n \"192.168.2.0/24\",\n },\n Location = secondary.Location,\n });\n\n var network_mapping = new Azure.SiteRecovery.NetworkMapping(\"network-mapping\", new()\n {\n Name = \"network-mapping\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n SourceRecoveryFabricName = primaryFabric.Name,\n TargetRecoveryFabricName = secondaryFabric.Name,\n SourceNetworkId = primaryVirtualNetwork.Id,\n TargetNetworkId = secondaryVirtualNetwork.Id,\n });\n\n var primaryAccount = new Azure.Storage.Account(\"primary\", new()\n {\n Name = \"primaryrecoverycache\",\n Location = primary.Location,\n ResourceGroupName = primary.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var secondarySubnet = new Azure.Network.Subnet(\"secondary\", new()\n {\n Name = \"network2-subnet\",\n ResourceGroupName = secondary.Name,\n VirtualNetworkName = secondaryVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"192.168.2.0/24\",\n },\n });\n\n var secondaryPublicIp = new Azure.Network.PublicIp(\"secondary\", new()\n {\n Name = \"vm-public-ip-secondary\",\n AllocationMethod = \"Static\",\n Location = secondary.Location,\n ResourceGroupName = secondary.Name,\n Sku = \"Basic\",\n });\n\n var vm_replication = new Azure.SiteRecovery.ReplicatedVM(\"vm-replication\", new()\n {\n Name = \"vm-replication\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n SourceRecoveryFabricName = primaryFabric.Name,\n SourceVmId = vm.Id,\n RecoveryReplicationPolicyId = policy.Id,\n SourceRecoveryProtectionContainerName = primaryProtectionContainer.Name,\n TargetResourceGroupId = secondary.Id,\n TargetRecoveryFabricId = secondaryFabric.Id,\n TargetRecoveryProtectionContainerId = secondaryProtectionContainer.Id,\n ManagedDisks = new[]\n {\n new Azure.SiteRecovery.Inputs.ReplicatedVMManagedDiskArgs\n {\n DiskId = vm.StorageOsDisk.Apply(storageOsDisk =\u003e storageOsDisk.ManagedDiskId),\n StagingStorageAccountId = primaryAccount.Id,\n TargetResourceGroupId = secondary.Id,\n TargetDiskType = \"Premium_LRS\",\n TargetReplicaDiskType = \"Premium_LRS\",\n },\n },\n NetworkInterfaces = new[]\n {\n new Azure.SiteRecovery.Inputs.ReplicatedVMNetworkInterfaceArgs\n {\n SourceNetworkInterfaceId = vmNetworkInterface.Id,\n TargetSubnetName = secondarySubnet.Name,\n RecoveryPublicIpAddressId = secondaryPublicIp.Id,\n },\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n container_mapping,\n network_mapping,\n },\n });\n\n var example = new Azure.SiteRecovery.ReplicationRecoveryPlan(\"example\", new()\n {\n Name = \"example-recover-plan\",\n RecoveryVaultId = vault.Id,\n SourceRecoveryFabricId = primaryFabric.Id,\n TargetRecoveryFabricId = secondaryFabric.Id,\n ShutdownRecoveryGroup = null,\n FailoverRecoveryGroup = null,\n BootRecoveryGroups = new[]\n {\n new Azure.SiteRecovery.Inputs.ReplicationRecoveryPlanBootRecoveryGroupArgs\n {\n ReplicatedProtectedItems = new[]\n {\n vm_replication.Id,\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/compute\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/recoveryservices\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/siterecovery\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.NewResourceGroup(ctx, \"primary\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"tfex-replicated-vm-primary\"),\n\t\t\tLocation: pulumi.String(\"West US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondary, err := core.NewResourceGroup(ctx, \"secondary\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"tfex-replicated-vm-secondary\"),\n\t\t\tLocation: pulumi.String(\"East US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"primary\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"network1\"),\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.1.0/24\"),\n\t\t\t},\n\t\t\tLocation: primary.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimarySubnet, err := network.NewSubnet(ctx, \"primary\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"network1-subnet\"),\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tVirtualNetworkName: primaryVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.1.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryPublicIp, err := network.NewPublicIp(ctx, \"primary\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"vm-public-ip-primary\"),\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tLocation: primary.Location,\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tSku: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tvmNetworkInterface, err := network.NewNetworkInterface(ctx, \"vm\", \u0026network.NetworkInterfaceArgs{\n\t\t\tName: pulumi.String(\"vm-nic\"),\n\t\t\tLocation: primary.Location,\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tIpConfigurations: network.NetworkInterfaceIpConfigurationArray{\n\t\t\t\t\u0026network.NetworkInterfaceIpConfigurationArgs{\n\t\t\t\t\tName: pulumi.String(\"vm\"),\n\t\t\t\t\tSubnetId: primarySubnet.ID(),\n\t\t\t\t\tPrivateIpAddressAllocation: pulumi.String(\"Dynamic\"),\n\t\t\t\t\tPublicIpAddressId: primaryPublicIp.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tvm, err := compute.NewVirtualMachine(ctx, \"vm\", \u0026compute.VirtualMachineArgs{\n\t\t\tName: pulumi.String(\"vm\"),\n\t\t\tLocation: primary.Location,\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tVmSize: pulumi.String(\"Standard_B1s\"),\n\t\t\tNetworkInterfaceIds: pulumi.StringArray{\n\t\t\t\tvmNetworkInterface.ID(),\n\t\t\t},\n\t\t\tStorageImageReference: \u0026compute.VirtualMachineStorageImageReferenceArgs{\n\t\t\t\tPublisher: pulumi.String(\"Canonical\"),\n\t\t\t\tOffer: pulumi.String(\"0001-com-ubuntu-server-jammy\"),\n\t\t\t\tSku: pulumi.String(\"22_04-lts\"),\n\t\t\t\tVersion: pulumi.String(\"latest\"),\n\t\t\t},\n\t\t\tStorageOsDisk: \u0026compute.VirtualMachineStorageOsDiskArgs{\n\t\t\t\tName: pulumi.String(\"vm-os-disk\"),\n\t\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\t\tCaching: pulumi.String(\"ReadWrite\"),\n\t\t\t\tCreateOption: pulumi.String(\"FromImage\"),\n\t\t\t\tManagedDiskType: pulumi.String(\"Premium_LRS\"),\n\t\t\t},\n\t\t\tOsProfile: \u0026compute.VirtualMachineOsProfileArgs{\n\t\t\t\tAdminUsername: pulumi.String(\"test-admin-123\"),\n\t\t\t\tAdminPassword: pulumi.String(\"test-pwd-123\"),\n\t\t\t\tComputerName: pulumi.String(\"vm\"),\n\t\t\t},\n\t\t\tOsProfileLinuxConfig: \u0026compute.VirtualMachineOsProfileLinuxConfigArgs{\n\t\t\t\tDisablePasswordAuthentication: pulumi.Bool(false),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tvault, err := recoveryservices.NewVault(ctx, \"vault\", \u0026recoveryservices.VaultArgs{\n\t\t\tName: pulumi.String(\"example-recovery-vault\"),\n\t\t\tLocation: secondary.Location,\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryFabric, err := siterecovery.NewFabric(ctx, \"primary\", \u0026siterecovery.FabricArgs{\n\t\t\tName: pulumi.String(\"primary-fabric\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tLocation: primary.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondaryFabric, err := siterecovery.NewFabric(ctx, \"secondary\", \u0026siterecovery.FabricArgs{\n\t\t\tName: pulumi.String(\"secondary-fabric\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tLocation: secondary.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryProtectionContainer, err := siterecovery.NewProtectionContainer(ctx, \"primary\", \u0026siterecovery.ProtectionContainerArgs{\n\t\t\tName: pulumi.String(\"primary-protection-container\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tRecoveryFabricName: primaryFabric.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondaryProtectionContainer, err := siterecovery.NewProtectionContainer(ctx, \"secondary\", \u0026siterecovery.ProtectionContainerArgs{\n\t\t\tName: pulumi.String(\"secondary-protection-container\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tRecoveryFabricName: secondaryFabric.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpolicy, err := siterecovery.NewReplicationPolicy(ctx, \"policy\", \u0026siterecovery.ReplicationPolicyArgs{\n\t\t\tName: pulumi.String(\"policy\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tRecoveryPointRetentionInMinutes: int(24 * 60),\n\t\t\tApplicationConsistentSnapshotFrequencyInMinutes: int(4 * 60),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = siterecovery.NewProtectionContainerMapping(ctx, \"container-mapping\", \u0026siterecovery.ProtectionContainerMappingArgs{\n\t\t\tName: pulumi.String(\"container-mapping\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tRecoveryFabricName: primaryFabric.Name,\n\t\t\tRecoverySourceProtectionContainerName: primaryProtectionContainer.Name,\n\t\t\tRecoveryTargetProtectionContainerId: secondaryProtectionContainer.ID(),\n\t\t\tRecoveryReplicationPolicyId: policy.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondaryVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"secondary\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"network2\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.2.0/24\"),\n\t\t\t},\n\t\t\tLocation: secondary.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = siterecovery.NewNetworkMapping(ctx, \"network-mapping\", \u0026siterecovery.NetworkMappingArgs{\n\t\t\tName: pulumi.String(\"network-mapping\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tSourceRecoveryFabricName: primaryFabric.Name,\n\t\t\tTargetRecoveryFabricName: secondaryFabric.Name,\n\t\t\tSourceNetworkId: primaryVirtualNetwork.ID(),\n\t\t\tTargetNetworkId: secondaryVirtualNetwork.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryAccount, err := storage.NewAccount(ctx, \"primary\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"primaryrecoverycache\"),\n\t\t\tLocation: primary.Location,\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondarySubnet, err := network.NewSubnet(ctx, \"secondary\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"network2-subnet\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tVirtualNetworkName: secondaryVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.2.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondaryPublicIp, err := network.NewPublicIp(ctx, \"secondary\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"vm-public-ip-secondary\"),\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tLocation: secondary.Location,\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tSku: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = siterecovery.NewReplicatedVM(ctx, \"vm-replication\", \u0026siterecovery.ReplicatedVMArgs{\n\t\t\tName: pulumi.String(\"vm-replication\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tSourceRecoveryFabricName: primaryFabric.Name,\n\t\t\tSourceVmId: vm.ID(),\n\t\t\tRecoveryReplicationPolicyId: policy.ID(),\n\t\t\tSourceRecoveryProtectionContainerName: primaryProtectionContainer.Name,\n\t\t\tTargetResourceGroupId: secondary.ID(),\n\t\t\tTargetRecoveryFabricId: secondaryFabric.ID(),\n\t\t\tTargetRecoveryProtectionContainerId: secondaryProtectionContainer.ID(),\n\t\t\tManagedDisks: siterecovery.ReplicatedVMManagedDiskArray{\n\t\t\t\t\u0026siterecovery.ReplicatedVMManagedDiskArgs{\n\t\t\t\t\tDiskId: vm.StorageOsDisk.ApplyT(func(storageOsDisk compute.VirtualMachineStorageOsDisk) (*string, error) {\n\t\t\t\t\t\treturn \u0026storageOsDisk.ManagedDiskId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tStagingStorageAccountId: primaryAccount.ID(),\n\t\t\t\t\tTargetResourceGroupId: secondary.ID(),\n\t\t\t\t\tTargetDiskType: pulumi.String(\"Premium_LRS\"),\n\t\t\t\t\tTargetReplicaDiskType: pulumi.String(\"Premium_LRS\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tNetworkInterfaces: siterecovery.ReplicatedVMNetworkInterfaceArray{\n\t\t\t\t\u0026siterecovery.ReplicatedVMNetworkInterfaceArgs{\n\t\t\t\t\tSourceNetworkInterfaceId: vmNetworkInterface.ID(),\n\t\t\t\t\tTargetSubnetName: secondarySubnet.Name,\n\t\t\t\t\tRecoveryPublicIpAddressId: secondaryPublicIp.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tcontainer_mapping,\n\t\t\tnetwork_mapping,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = siterecovery.NewReplicationRecoveryPlan(ctx, \"example\", \u0026siterecovery.ReplicationRecoveryPlanArgs{\n\t\t\tName: pulumi.String(\"example-recover-plan\"),\n\t\t\tRecoveryVaultId: vault.ID(),\n\t\t\tSourceRecoveryFabricId: primaryFabric.ID(),\n\t\t\tTargetRecoveryFabricId: secondaryFabric.ID(),\n\t\t\tShutdownRecoveryGroup: nil,\n\t\t\tFailoverRecoveryGroup: nil,\n\t\t\tBootRecoveryGroups: siterecovery.ReplicationRecoveryPlanBootRecoveryGroupArray{\n\t\t\t\t\u0026siterecovery.ReplicationRecoveryPlanBootRecoveryGroupArgs{\n\t\t\t\t\tReplicatedProtectedItems: pulumi.StringArray{\n\t\t\t\t\t\tvm_replication.ID(),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.network.NetworkInterface;\nimport com.pulumi.azure.network.NetworkInterfaceArgs;\nimport com.pulumi.azure.network.inputs.NetworkInterfaceIpConfigurationArgs;\nimport com.pulumi.azure.compute.VirtualMachine;\nimport com.pulumi.azure.compute.VirtualMachineArgs;\nimport com.pulumi.azure.compute.inputs.VirtualMachineStorageImageReferenceArgs;\nimport com.pulumi.azure.compute.inputs.VirtualMachineStorageOsDiskArgs;\nimport com.pulumi.azure.compute.inputs.VirtualMachineOsProfileArgs;\nimport com.pulumi.azure.compute.inputs.VirtualMachineOsProfileLinuxConfigArgs;\nimport com.pulumi.azure.recoveryservices.Vault;\nimport com.pulumi.azure.recoveryservices.VaultArgs;\nimport com.pulumi.azure.siterecovery.Fabric;\nimport com.pulumi.azure.siterecovery.FabricArgs;\nimport com.pulumi.azure.siterecovery.ProtectionContainer;\nimport com.pulumi.azure.siterecovery.ProtectionContainerArgs;\nimport com.pulumi.azure.siterecovery.ReplicationPolicy;\nimport com.pulumi.azure.siterecovery.ReplicationPolicyArgs;\nimport com.pulumi.azure.siterecovery.ProtectionContainerMapping;\nimport com.pulumi.azure.siterecovery.ProtectionContainerMappingArgs;\nimport com.pulumi.azure.siterecovery.NetworkMapping;\nimport com.pulumi.azure.siterecovery.NetworkMappingArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.siterecovery.ReplicatedVM;\nimport com.pulumi.azure.siterecovery.ReplicatedVMArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicatedVMManagedDiskArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicatedVMNetworkInterfaceArgs;\nimport com.pulumi.azure.siterecovery.ReplicationRecoveryPlan;\nimport com.pulumi.azure.siterecovery.ReplicationRecoveryPlanArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicationRecoveryPlanShutdownRecoveryGroupArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicationRecoveryPlanFailoverRecoveryGroupArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicationRecoveryPlanBootRecoveryGroupArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var primary = new ResourceGroup(\"primary\", ResourceGroupArgs.builder()\n .name(\"tfex-replicated-vm-primary\")\n .location(\"West US\")\n .build());\n\n var secondary = new ResourceGroup(\"secondary\", ResourceGroupArgs.builder()\n .name(\"tfex-replicated-vm-secondary\")\n .location(\"East US\")\n .build());\n\n var primaryVirtualNetwork = new VirtualNetwork(\"primaryVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"network1\")\n .resourceGroupName(primary.name())\n .addressSpaces(\"192.168.1.0/24\")\n .location(primary.location())\n .build());\n\n var primarySubnet = new Subnet(\"primarySubnet\", SubnetArgs.builder()\n .name(\"network1-subnet\")\n .resourceGroupName(primary.name())\n .virtualNetworkName(primaryVirtualNetwork.name())\n .addressPrefixes(\"192.168.1.0/24\")\n .build());\n\n var primaryPublicIp = new PublicIp(\"primaryPublicIp\", PublicIpArgs.builder()\n .name(\"vm-public-ip-primary\")\n .allocationMethod(\"Static\")\n .location(primary.location())\n .resourceGroupName(primary.name())\n .sku(\"Basic\")\n .build());\n\n var vmNetworkInterface = new NetworkInterface(\"vmNetworkInterface\", NetworkInterfaceArgs.builder()\n .name(\"vm-nic\")\n .location(primary.location())\n .resourceGroupName(primary.name())\n .ipConfigurations(NetworkInterfaceIpConfigurationArgs.builder()\n .name(\"vm\")\n .subnetId(primarySubnet.id())\n .privateIpAddressAllocation(\"Dynamic\")\n .publicIpAddressId(primaryPublicIp.id())\n .build())\n .build());\n\n var vm = new VirtualMachine(\"vm\", VirtualMachineArgs.builder()\n .name(\"vm\")\n .location(primary.location())\n .resourceGroupName(primary.name())\n .vmSize(\"Standard_B1s\")\n .networkInterfaceIds(vmNetworkInterface.id())\n .storageImageReference(VirtualMachineStorageImageReferenceArgs.builder()\n .publisher(\"Canonical\")\n .offer(\"0001-com-ubuntu-server-jammy\")\n .sku(\"22_04-lts\")\n .version(\"latest\")\n .build())\n .storageOsDisk(VirtualMachineStorageOsDiskArgs.builder()\n .name(\"vm-os-disk\")\n .osType(\"Linux\")\n .caching(\"ReadWrite\")\n .createOption(\"FromImage\")\n .managedDiskType(\"Premium_LRS\")\n .build())\n .osProfile(VirtualMachineOsProfileArgs.builder()\n .adminUsername(\"test-admin-123\")\n .adminPassword(\"test-pwd-123\")\n .computerName(\"vm\")\n .build())\n .osProfileLinuxConfig(VirtualMachineOsProfileLinuxConfigArgs.builder()\n .disablePasswordAuthentication(false)\n .build())\n .build());\n\n var vault = new Vault(\"vault\", VaultArgs.builder()\n .name(\"example-recovery-vault\")\n .location(secondary.location())\n .resourceGroupName(secondary.name())\n .sku(\"Standard\")\n .build());\n\n var primaryFabric = new Fabric(\"primaryFabric\", FabricArgs.builder()\n .name(\"primary-fabric\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .location(primary.location())\n .build());\n\n var secondaryFabric = new Fabric(\"secondaryFabric\", FabricArgs.builder()\n .name(\"secondary-fabric\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .location(secondary.location())\n .build());\n\n var primaryProtectionContainer = new ProtectionContainer(\"primaryProtectionContainer\", ProtectionContainerArgs.builder()\n .name(\"primary-protection-container\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .recoveryFabricName(primaryFabric.name())\n .build());\n\n var secondaryProtectionContainer = new ProtectionContainer(\"secondaryProtectionContainer\", ProtectionContainerArgs.builder()\n .name(\"secondary-protection-container\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .recoveryFabricName(secondaryFabric.name())\n .build());\n\n var policy = new ReplicationPolicy(\"policy\", ReplicationPolicyArgs.builder()\n .name(\"policy\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .recoveryPointRetentionInMinutes(24 * 60)\n .applicationConsistentSnapshotFrequencyInMinutes(4 * 60)\n .build());\n\n var container_mapping = new ProtectionContainerMapping(\"container-mapping\", ProtectionContainerMappingArgs.builder()\n .name(\"container-mapping\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .recoveryFabricName(primaryFabric.name())\n .recoverySourceProtectionContainerName(primaryProtectionContainer.name())\n .recoveryTargetProtectionContainerId(secondaryProtectionContainer.id())\n .recoveryReplicationPolicyId(policy.id())\n .build());\n\n var secondaryVirtualNetwork = new VirtualNetwork(\"secondaryVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"network2\")\n .resourceGroupName(secondary.name())\n .addressSpaces(\"192.168.2.0/24\")\n .location(secondary.location())\n .build());\n\n var network_mapping = new NetworkMapping(\"network-mapping\", NetworkMappingArgs.builder()\n .name(\"network-mapping\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .sourceRecoveryFabricName(primaryFabric.name())\n .targetRecoveryFabricName(secondaryFabric.name())\n .sourceNetworkId(primaryVirtualNetwork.id())\n .targetNetworkId(secondaryVirtualNetwork.id())\n .build());\n\n var primaryAccount = new Account(\"primaryAccount\", AccountArgs.builder()\n .name(\"primaryrecoverycache\")\n .location(primary.location())\n .resourceGroupName(primary.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var secondarySubnet = new Subnet(\"secondarySubnet\", SubnetArgs.builder()\n .name(\"network2-subnet\")\n .resourceGroupName(secondary.name())\n .virtualNetworkName(secondaryVirtualNetwork.name())\n .addressPrefixes(\"192.168.2.0/24\")\n .build());\n\n var secondaryPublicIp = new PublicIp(\"secondaryPublicIp\", PublicIpArgs.builder()\n .name(\"vm-public-ip-secondary\")\n .allocationMethod(\"Static\")\n .location(secondary.location())\n .resourceGroupName(secondary.name())\n .sku(\"Basic\")\n .build());\n\n var vm_replication = new ReplicatedVM(\"vm-replication\", ReplicatedVMArgs.builder()\n .name(\"vm-replication\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .sourceRecoveryFabricName(primaryFabric.name())\n .sourceVmId(vm.id())\n .recoveryReplicationPolicyId(policy.id())\n .sourceRecoveryProtectionContainerName(primaryProtectionContainer.name())\n .targetResourceGroupId(secondary.id())\n .targetRecoveryFabricId(secondaryFabric.id())\n .targetRecoveryProtectionContainerId(secondaryProtectionContainer.id())\n .managedDisks(ReplicatedVMManagedDiskArgs.builder()\n .diskId(vm.storageOsDisk().applyValue(storageOsDisk -\u003e storageOsDisk.managedDiskId()))\n .stagingStorageAccountId(primaryAccount.id())\n .targetResourceGroupId(secondary.id())\n .targetDiskType(\"Premium_LRS\")\n .targetReplicaDiskType(\"Premium_LRS\")\n .build())\n .networkInterfaces(ReplicatedVMNetworkInterfaceArgs.builder()\n .sourceNetworkInterfaceId(vmNetworkInterface.id())\n .targetSubnetName(secondarySubnet.name())\n .recoveryPublicIpAddressId(secondaryPublicIp.id())\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n container_mapping,\n network_mapping)\n .build());\n\n var example = new ReplicationRecoveryPlan(\"example\", ReplicationRecoveryPlanArgs.builder()\n .name(\"example-recover-plan\")\n .recoveryVaultId(vault.id())\n .sourceRecoveryFabricId(primaryFabric.id())\n .targetRecoveryFabricId(secondaryFabric.id())\n .shutdownRecoveryGroup()\n .failoverRecoveryGroup()\n .bootRecoveryGroups(ReplicationRecoveryPlanBootRecoveryGroupArgs.builder()\n .replicatedProtectedItems(vm_replication.id())\n .build())\n .build());\n\n }\n}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSite Recovery Fabric can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:siterecovery/replicationRecoveryPlan:ReplicationRecoveryPlan azurerm_site_recovery_replication_recovery_plan.example /subscriptions/00000000-0000-0000-0000-00000000000/resourceGroups/groupName/providers/Microsoft.RecoveryServices/vaults/vaultName/replicationRecoveryPlans/planName\n```\n\n", + "description": "Manages a Site Recovery Replication Recovery Plan within a Recovery Services vault. A recovery plan gathers machines into recovery groups for the purpose of failover.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = new azure.core.ResourceGroup(\"primary\", {\n name: \"tfex-replicated-vm-primary\",\n location: \"West US\",\n});\nconst secondary = new azure.core.ResourceGroup(\"secondary\", {\n name: \"tfex-replicated-vm-secondary\",\n location: \"East US\",\n});\nconst primaryVirtualNetwork = new azure.network.VirtualNetwork(\"primary\", {\n name: \"network1\",\n resourceGroupName: primary.name,\n addressSpaces: [\"192.168.1.0/24\"],\n location: primary.location,\n});\nconst primarySubnet = new azure.network.Subnet(\"primary\", {\n name: \"network1-subnet\",\n resourceGroupName: primary.name,\n virtualNetworkName: primaryVirtualNetwork.name,\n addressPrefixes: [\"192.168.1.0/24\"],\n});\nconst primaryPublicIp = new azure.network.PublicIp(\"primary\", {\n name: \"vm-public-ip-primary\",\n allocationMethod: \"Static\",\n location: primary.location,\n resourceGroupName: primary.name,\n sku: \"Basic\",\n});\nconst vmNetworkInterface = new azure.network.NetworkInterface(\"vm\", {\n name: \"vm-nic\",\n location: primary.location,\n resourceGroupName: primary.name,\n ipConfigurations: [{\n name: \"vm\",\n subnetId: primarySubnet.id,\n privateIpAddressAllocation: \"Dynamic\",\n publicIpAddressId: primaryPublicIp.id,\n }],\n});\nconst vm = new azure.compute.VirtualMachine(\"vm\", {\n name: \"vm\",\n location: primary.location,\n resourceGroupName: primary.name,\n vmSize: \"Standard_B1s\",\n networkInterfaceIds: [vmNetworkInterface.id],\n storageImageReference: {\n publisher: \"Canonical\",\n offer: \"0001-com-ubuntu-server-jammy\",\n sku: \"22_04-lts\",\n version: \"latest\",\n },\n storageOsDisk: {\n name: \"vm-os-disk\",\n osType: \"Linux\",\n caching: \"ReadWrite\",\n createOption: \"FromImage\",\n managedDiskType: \"Premium_LRS\",\n },\n osProfile: {\n adminUsername: \"test-admin-123\",\n adminPassword: \"test-pwd-123\",\n computerName: \"vm\",\n },\n osProfileLinuxConfig: {\n disablePasswordAuthentication: false,\n },\n});\nconst vault = new azure.recoveryservices.Vault(\"vault\", {\n name: \"example-recovery-vault\",\n location: secondary.location,\n resourceGroupName: secondary.name,\n sku: \"Standard\",\n});\nconst primaryFabric = new azure.siterecovery.Fabric(\"primary\", {\n name: \"primary-fabric\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n location: primary.location,\n});\nconst secondaryFabric = new azure.siterecovery.Fabric(\"secondary\", {\n name: \"secondary-fabric\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n location: secondary.location,\n});\nconst primaryProtectionContainer = new azure.siterecovery.ProtectionContainer(\"primary\", {\n name: \"primary-protection-container\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n recoveryFabricName: primaryFabric.name,\n});\nconst secondaryProtectionContainer = new azure.siterecovery.ProtectionContainer(\"secondary\", {\n name: \"secondary-protection-container\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n recoveryFabricName: secondaryFabric.name,\n});\nconst policy = new azure.siterecovery.ReplicationPolicy(\"policy\", {\n name: \"policy\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n recoveryPointRetentionInMinutes: 24 * 60,\n applicationConsistentSnapshotFrequencyInMinutes: 4 * 60,\n});\nconst container_mapping = new azure.siterecovery.ProtectionContainerMapping(\"container-mapping\", {\n name: \"container-mapping\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n recoveryFabricName: primaryFabric.name,\n recoverySourceProtectionContainerName: primaryProtectionContainer.name,\n recoveryTargetProtectionContainerId: secondaryProtectionContainer.id,\n recoveryReplicationPolicyId: policy.id,\n});\nconst secondaryVirtualNetwork = new azure.network.VirtualNetwork(\"secondary\", {\n name: \"network2\",\n resourceGroupName: secondary.name,\n addressSpaces: [\"192.168.2.0/24\"],\n location: secondary.location,\n});\nconst network_mapping = new azure.siterecovery.NetworkMapping(\"network-mapping\", {\n name: \"network-mapping\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n sourceRecoveryFabricName: primaryFabric.name,\n targetRecoveryFabricName: secondaryFabric.name,\n sourceNetworkId: primaryVirtualNetwork.id,\n targetNetworkId: secondaryVirtualNetwork.id,\n});\nconst primaryAccount = new azure.storage.Account(\"primary\", {\n name: \"primaryrecoverycache\",\n location: primary.location,\n resourceGroupName: primary.name,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n});\nconst secondarySubnet = new azure.network.Subnet(\"secondary\", {\n name: \"network2-subnet\",\n resourceGroupName: secondary.name,\n virtualNetworkName: secondaryVirtualNetwork.name,\n addressPrefixes: [\"192.168.2.0/24\"],\n});\nconst secondaryPublicIp = new azure.network.PublicIp(\"secondary\", {\n name: \"vm-public-ip-secondary\",\n allocationMethod: \"Static\",\n location: secondary.location,\n resourceGroupName: secondary.name,\n sku: \"Basic\",\n});\nconst vm_replication = new azure.siterecovery.ReplicatedVM(\"vm-replication\", {\n name: \"vm-replication\",\n resourceGroupName: secondary.name,\n recoveryVaultName: vault.name,\n sourceRecoveryFabricName: primaryFabric.name,\n sourceVmId: vm.id,\n recoveryReplicationPolicyId: policy.id,\n sourceRecoveryProtectionContainerName: primaryProtectionContainer.name,\n targetResourceGroupId: secondary.id,\n targetRecoveryFabricId: secondaryFabric.id,\n targetRecoveryProtectionContainerId: secondaryProtectionContainer.id,\n managedDisks: [{\n diskId: vm.storageOsDisk.apply(storageOsDisk =\u003e storageOsDisk.managedDiskId),\n stagingStorageAccountId: primaryAccount.id,\n targetResourceGroupId: secondary.id,\n targetDiskType: \"Premium_LRS\",\n targetReplicaDiskType: \"Premium_LRS\",\n }],\n networkInterfaces: [{\n sourceNetworkInterfaceId: vmNetworkInterface.id,\n targetSubnetName: secondarySubnet.name,\n recoveryPublicIpAddressId: secondaryPublicIp.id,\n }],\n}, {\n dependsOn: [\n container_mapping,\n network_mapping,\n ],\n});\nconst example = new azure.siterecovery.ReplicationRecoveryPlan(\"example\", {\n name: \"example-recover-plan\",\n recoveryVaultId: vault.id,\n sourceRecoveryFabricId: primaryFabric.id,\n targetRecoveryFabricId: secondaryFabric.id,\n shutdownRecoveryGroup: {},\n failoverRecoveryGroup: {},\n bootRecoveryGroups: [{\n replicatedProtectedItems: [vm_replication.id],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.ResourceGroup(\"primary\",\n name=\"tfex-replicated-vm-primary\",\n location=\"West US\")\nsecondary = azure.core.ResourceGroup(\"secondary\",\n name=\"tfex-replicated-vm-secondary\",\n location=\"East US\")\nprimary_virtual_network = azure.network.VirtualNetwork(\"primary\",\n name=\"network1\",\n resource_group_name=primary.name,\n address_spaces=[\"192.168.1.0/24\"],\n location=primary.location)\nprimary_subnet = azure.network.Subnet(\"primary\",\n name=\"network1-subnet\",\n resource_group_name=primary.name,\n virtual_network_name=primary_virtual_network.name,\n address_prefixes=[\"192.168.1.0/24\"])\nprimary_public_ip = azure.network.PublicIp(\"primary\",\n name=\"vm-public-ip-primary\",\n allocation_method=\"Static\",\n location=primary.location,\n resource_group_name=primary.name,\n sku=\"Basic\")\nvm_network_interface = azure.network.NetworkInterface(\"vm\",\n name=\"vm-nic\",\n location=primary.location,\n resource_group_name=primary.name,\n ip_configurations=[{\n \"name\": \"vm\",\n \"subnet_id\": primary_subnet.id,\n \"private_ip_address_allocation\": \"Dynamic\",\n \"public_ip_address_id\": primary_public_ip.id,\n }])\nvm = azure.compute.VirtualMachine(\"vm\",\n name=\"vm\",\n location=primary.location,\n resource_group_name=primary.name,\n vm_size=\"Standard_B1s\",\n network_interface_ids=[vm_network_interface.id],\n storage_image_reference={\n \"publisher\": \"Canonical\",\n \"offer\": \"0001-com-ubuntu-server-jammy\",\n \"sku\": \"22_04-lts\",\n \"version\": \"latest\",\n },\n storage_os_disk={\n \"name\": \"vm-os-disk\",\n \"os_type\": \"Linux\",\n \"caching\": \"ReadWrite\",\n \"create_option\": \"FromImage\",\n \"managed_disk_type\": \"Premium_LRS\",\n },\n os_profile={\n \"admin_username\": \"test-admin-123\",\n \"admin_password\": \"test-pwd-123\",\n \"computer_name\": \"vm\",\n },\n os_profile_linux_config={\n \"disable_password_authentication\": False,\n })\nvault = azure.recoveryservices.Vault(\"vault\",\n name=\"example-recovery-vault\",\n location=secondary.location,\n resource_group_name=secondary.name,\n sku=\"Standard\")\nprimary_fabric = azure.siterecovery.Fabric(\"primary\",\n name=\"primary-fabric\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n location=primary.location)\nsecondary_fabric = azure.siterecovery.Fabric(\"secondary\",\n name=\"secondary-fabric\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n location=secondary.location)\nprimary_protection_container = azure.siterecovery.ProtectionContainer(\"primary\",\n name=\"primary-protection-container\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n recovery_fabric_name=primary_fabric.name)\nsecondary_protection_container = azure.siterecovery.ProtectionContainer(\"secondary\",\n name=\"secondary-protection-container\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n recovery_fabric_name=secondary_fabric.name)\npolicy = azure.siterecovery.ReplicationPolicy(\"policy\",\n name=\"policy\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n recovery_point_retention_in_minutes=24 * 60,\n application_consistent_snapshot_frequency_in_minutes=4 * 60)\ncontainer_mapping = azure.siterecovery.ProtectionContainerMapping(\"container-mapping\",\n name=\"container-mapping\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n recovery_fabric_name=primary_fabric.name,\n recovery_source_protection_container_name=primary_protection_container.name,\n recovery_target_protection_container_id=secondary_protection_container.id,\n recovery_replication_policy_id=policy.id)\nsecondary_virtual_network = azure.network.VirtualNetwork(\"secondary\",\n name=\"network2\",\n resource_group_name=secondary.name,\n address_spaces=[\"192.168.2.0/24\"],\n location=secondary.location)\nnetwork_mapping = azure.siterecovery.NetworkMapping(\"network-mapping\",\n name=\"network-mapping\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n source_recovery_fabric_name=primary_fabric.name,\n target_recovery_fabric_name=secondary_fabric.name,\n source_network_id=primary_virtual_network.id,\n target_network_id=secondary_virtual_network.id)\nprimary_account = azure.storage.Account(\"primary\",\n name=\"primaryrecoverycache\",\n location=primary.location,\n resource_group_name=primary.name,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\")\nsecondary_subnet = azure.network.Subnet(\"secondary\",\n name=\"network2-subnet\",\n resource_group_name=secondary.name,\n virtual_network_name=secondary_virtual_network.name,\n address_prefixes=[\"192.168.2.0/24\"])\nsecondary_public_ip = azure.network.PublicIp(\"secondary\",\n name=\"vm-public-ip-secondary\",\n allocation_method=\"Static\",\n location=secondary.location,\n resource_group_name=secondary.name,\n sku=\"Basic\")\nvm_replication = azure.siterecovery.ReplicatedVM(\"vm-replication\",\n name=\"vm-replication\",\n resource_group_name=secondary.name,\n recovery_vault_name=vault.name,\n source_recovery_fabric_name=primary_fabric.name,\n source_vm_id=vm.id,\n recovery_replication_policy_id=policy.id,\n source_recovery_protection_container_name=primary_protection_container.name,\n target_resource_group_id=secondary.id,\n target_recovery_fabric_id=secondary_fabric.id,\n target_recovery_protection_container_id=secondary_protection_container.id,\n managed_disks=[{\n \"disk_id\": vm.storage_os_disk.managed_disk_id,\n \"staging_storage_account_id\": primary_account.id,\n \"target_resource_group_id\": secondary.id,\n \"target_disk_type\": \"Premium_LRS\",\n \"target_replica_disk_type\": \"Premium_LRS\",\n }],\n network_interfaces=[{\n \"source_network_interface_id\": vm_network_interface.id,\n \"target_subnet_name\": secondary_subnet.name,\n \"recovery_public_ip_address_id\": secondary_public_ip.id,\n }],\n opts = pulumi.ResourceOptions(depends_on=[\n container_mapping,\n network_mapping,\n ]))\nexample = azure.siterecovery.ReplicationRecoveryPlan(\"example\",\n name=\"example-recover-plan\",\n recovery_vault_id=vault.id,\n source_recovery_fabric_id=primary_fabric.id,\n target_recovery_fabric_id=secondary_fabric.id,\n shutdown_recovery_group={},\n failover_recovery_group={},\n boot_recovery_groups=[{\n \"replicated_protected_items\": [vm_replication.id],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = new Azure.Core.ResourceGroup(\"primary\", new()\n {\n Name = \"tfex-replicated-vm-primary\",\n Location = \"West US\",\n });\n\n var secondary = new Azure.Core.ResourceGroup(\"secondary\", new()\n {\n Name = \"tfex-replicated-vm-secondary\",\n Location = \"East US\",\n });\n\n var primaryVirtualNetwork = new Azure.Network.VirtualNetwork(\"primary\", new()\n {\n Name = \"network1\",\n ResourceGroupName = primary.Name,\n AddressSpaces = new[]\n {\n \"192.168.1.0/24\",\n },\n Location = primary.Location,\n });\n\n var primarySubnet = new Azure.Network.Subnet(\"primary\", new()\n {\n Name = \"network1-subnet\",\n ResourceGroupName = primary.Name,\n VirtualNetworkName = primaryVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"192.168.1.0/24\",\n },\n });\n\n var primaryPublicIp = new Azure.Network.PublicIp(\"primary\", new()\n {\n Name = \"vm-public-ip-primary\",\n AllocationMethod = \"Static\",\n Location = primary.Location,\n ResourceGroupName = primary.Name,\n Sku = \"Basic\",\n });\n\n var vmNetworkInterface = new Azure.Network.NetworkInterface(\"vm\", new()\n {\n Name = \"vm-nic\",\n Location = primary.Location,\n ResourceGroupName = primary.Name,\n IpConfigurations = new[]\n {\n new Azure.Network.Inputs.NetworkInterfaceIpConfigurationArgs\n {\n Name = \"vm\",\n SubnetId = primarySubnet.Id,\n PrivateIpAddressAllocation = \"Dynamic\",\n PublicIpAddressId = primaryPublicIp.Id,\n },\n },\n });\n\n var vm = new Azure.Compute.VirtualMachine(\"vm\", new()\n {\n Name = \"vm\",\n Location = primary.Location,\n ResourceGroupName = primary.Name,\n VmSize = \"Standard_B1s\",\n NetworkInterfaceIds = new[]\n {\n vmNetworkInterface.Id,\n },\n StorageImageReference = new Azure.Compute.Inputs.VirtualMachineStorageImageReferenceArgs\n {\n Publisher = \"Canonical\",\n Offer = \"0001-com-ubuntu-server-jammy\",\n Sku = \"22_04-lts\",\n Version = \"latest\",\n },\n StorageOsDisk = new Azure.Compute.Inputs.VirtualMachineStorageOsDiskArgs\n {\n Name = \"vm-os-disk\",\n OsType = \"Linux\",\n Caching = \"ReadWrite\",\n CreateOption = \"FromImage\",\n ManagedDiskType = \"Premium_LRS\",\n },\n OsProfile = new Azure.Compute.Inputs.VirtualMachineOsProfileArgs\n {\n AdminUsername = \"test-admin-123\",\n AdminPassword = \"test-pwd-123\",\n ComputerName = \"vm\",\n },\n OsProfileLinuxConfig = new Azure.Compute.Inputs.VirtualMachineOsProfileLinuxConfigArgs\n {\n DisablePasswordAuthentication = false,\n },\n });\n\n var vault = new Azure.RecoveryServices.Vault(\"vault\", new()\n {\n Name = \"example-recovery-vault\",\n Location = secondary.Location,\n ResourceGroupName = secondary.Name,\n Sku = \"Standard\",\n });\n\n var primaryFabric = new Azure.SiteRecovery.Fabric(\"primary\", new()\n {\n Name = \"primary-fabric\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n Location = primary.Location,\n });\n\n var secondaryFabric = new Azure.SiteRecovery.Fabric(\"secondary\", new()\n {\n Name = \"secondary-fabric\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n Location = secondary.Location,\n });\n\n var primaryProtectionContainer = new Azure.SiteRecovery.ProtectionContainer(\"primary\", new()\n {\n Name = \"primary-protection-container\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n RecoveryFabricName = primaryFabric.Name,\n });\n\n var secondaryProtectionContainer = new Azure.SiteRecovery.ProtectionContainer(\"secondary\", new()\n {\n Name = \"secondary-protection-container\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n RecoveryFabricName = secondaryFabric.Name,\n });\n\n var policy = new Azure.SiteRecovery.ReplicationPolicy(\"policy\", new()\n {\n Name = \"policy\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n RecoveryPointRetentionInMinutes = 24 * 60,\n ApplicationConsistentSnapshotFrequencyInMinutes = 4 * 60,\n });\n\n var container_mapping = new Azure.SiteRecovery.ProtectionContainerMapping(\"container-mapping\", new()\n {\n Name = \"container-mapping\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n RecoveryFabricName = primaryFabric.Name,\n RecoverySourceProtectionContainerName = primaryProtectionContainer.Name,\n RecoveryTargetProtectionContainerId = secondaryProtectionContainer.Id,\n RecoveryReplicationPolicyId = policy.Id,\n });\n\n var secondaryVirtualNetwork = new Azure.Network.VirtualNetwork(\"secondary\", new()\n {\n Name = \"network2\",\n ResourceGroupName = secondary.Name,\n AddressSpaces = new[]\n {\n \"192.168.2.0/24\",\n },\n Location = secondary.Location,\n });\n\n var network_mapping = new Azure.SiteRecovery.NetworkMapping(\"network-mapping\", new()\n {\n Name = \"network-mapping\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n SourceRecoveryFabricName = primaryFabric.Name,\n TargetRecoveryFabricName = secondaryFabric.Name,\n SourceNetworkId = primaryVirtualNetwork.Id,\n TargetNetworkId = secondaryVirtualNetwork.Id,\n });\n\n var primaryAccount = new Azure.Storage.Account(\"primary\", new()\n {\n Name = \"primaryrecoverycache\",\n Location = primary.Location,\n ResourceGroupName = primary.Name,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n });\n\n var secondarySubnet = new Azure.Network.Subnet(\"secondary\", new()\n {\n Name = \"network2-subnet\",\n ResourceGroupName = secondary.Name,\n VirtualNetworkName = secondaryVirtualNetwork.Name,\n AddressPrefixes = new[]\n {\n \"192.168.2.0/24\",\n },\n });\n\n var secondaryPublicIp = new Azure.Network.PublicIp(\"secondary\", new()\n {\n Name = \"vm-public-ip-secondary\",\n AllocationMethod = \"Static\",\n Location = secondary.Location,\n ResourceGroupName = secondary.Name,\n Sku = \"Basic\",\n });\n\n var vm_replication = new Azure.SiteRecovery.ReplicatedVM(\"vm-replication\", new()\n {\n Name = \"vm-replication\",\n ResourceGroupName = secondary.Name,\n RecoveryVaultName = vault.Name,\n SourceRecoveryFabricName = primaryFabric.Name,\n SourceVmId = vm.Id,\n RecoveryReplicationPolicyId = policy.Id,\n SourceRecoveryProtectionContainerName = primaryProtectionContainer.Name,\n TargetResourceGroupId = secondary.Id,\n TargetRecoveryFabricId = secondaryFabric.Id,\n TargetRecoveryProtectionContainerId = secondaryProtectionContainer.Id,\n ManagedDisks = new[]\n {\n new Azure.SiteRecovery.Inputs.ReplicatedVMManagedDiskArgs\n {\n DiskId = vm.StorageOsDisk.Apply(storageOsDisk =\u003e storageOsDisk.ManagedDiskId),\n StagingStorageAccountId = primaryAccount.Id,\n TargetResourceGroupId = secondary.Id,\n TargetDiskType = \"Premium_LRS\",\n TargetReplicaDiskType = \"Premium_LRS\",\n },\n },\n NetworkInterfaces = new[]\n {\n new Azure.SiteRecovery.Inputs.ReplicatedVMNetworkInterfaceArgs\n {\n SourceNetworkInterfaceId = vmNetworkInterface.Id,\n TargetSubnetName = secondarySubnet.Name,\n RecoveryPublicIpAddressId = secondaryPublicIp.Id,\n },\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n container_mapping,\n network_mapping,\n },\n });\n\n var example = new Azure.SiteRecovery.ReplicationRecoveryPlan(\"example\", new()\n {\n Name = \"example-recover-plan\",\n RecoveryVaultId = vault.Id,\n SourceRecoveryFabricId = primaryFabric.Id,\n TargetRecoveryFabricId = secondaryFabric.Id,\n ShutdownRecoveryGroup = null,\n FailoverRecoveryGroup = null,\n BootRecoveryGroups = new[]\n {\n new Azure.SiteRecovery.Inputs.ReplicationRecoveryPlanBootRecoveryGroupArgs\n {\n ReplicatedProtectedItems = new[]\n {\n vm_replication.Id,\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/compute\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/recoveryservices\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/siterecovery\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.NewResourceGroup(ctx, \"primary\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"tfex-replicated-vm-primary\"),\n\t\t\tLocation: pulumi.String(\"West US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondary, err := core.NewResourceGroup(ctx, \"secondary\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"tfex-replicated-vm-secondary\"),\n\t\t\tLocation: pulumi.String(\"East US\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"primary\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"network1\"),\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.1.0/24\"),\n\t\t\t},\n\t\t\tLocation: primary.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimarySubnet, err := network.NewSubnet(ctx, \"primary\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"network1-subnet\"),\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tVirtualNetworkName: primaryVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.1.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryPublicIp, err := network.NewPublicIp(ctx, \"primary\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"vm-public-ip-primary\"),\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tLocation: primary.Location,\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tSku: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tvmNetworkInterface, err := network.NewNetworkInterface(ctx, \"vm\", \u0026network.NetworkInterfaceArgs{\n\t\t\tName: pulumi.String(\"vm-nic\"),\n\t\t\tLocation: primary.Location,\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tIpConfigurations: network.NetworkInterfaceIpConfigurationArray{\n\t\t\t\t\u0026network.NetworkInterfaceIpConfigurationArgs{\n\t\t\t\t\tName: pulumi.String(\"vm\"),\n\t\t\t\t\tSubnetId: primarySubnet.ID(),\n\t\t\t\t\tPrivateIpAddressAllocation: pulumi.String(\"Dynamic\"),\n\t\t\t\t\tPublicIpAddressId: primaryPublicIp.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tvm, err := compute.NewVirtualMachine(ctx, \"vm\", \u0026compute.VirtualMachineArgs{\n\t\t\tName: pulumi.String(\"vm\"),\n\t\t\tLocation: primary.Location,\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tVmSize: pulumi.String(\"Standard_B1s\"),\n\t\t\tNetworkInterfaceIds: pulumi.StringArray{\n\t\t\t\tvmNetworkInterface.ID(),\n\t\t\t},\n\t\t\tStorageImageReference: \u0026compute.VirtualMachineStorageImageReferenceArgs{\n\t\t\t\tPublisher: pulumi.String(\"Canonical\"),\n\t\t\t\tOffer: pulumi.String(\"0001-com-ubuntu-server-jammy\"),\n\t\t\t\tSku: pulumi.String(\"22_04-lts\"),\n\t\t\t\tVersion: pulumi.String(\"latest\"),\n\t\t\t},\n\t\t\tStorageOsDisk: \u0026compute.VirtualMachineStorageOsDiskArgs{\n\t\t\t\tName: pulumi.String(\"vm-os-disk\"),\n\t\t\t\tOsType: pulumi.String(\"Linux\"),\n\t\t\t\tCaching: pulumi.String(\"ReadWrite\"),\n\t\t\t\tCreateOption: pulumi.String(\"FromImage\"),\n\t\t\t\tManagedDiskType: pulumi.String(\"Premium_LRS\"),\n\t\t\t},\n\t\t\tOsProfile: \u0026compute.VirtualMachineOsProfileArgs{\n\t\t\t\tAdminUsername: pulumi.String(\"test-admin-123\"),\n\t\t\t\tAdminPassword: pulumi.String(\"test-pwd-123\"),\n\t\t\t\tComputerName: pulumi.String(\"vm\"),\n\t\t\t},\n\t\t\tOsProfileLinuxConfig: \u0026compute.VirtualMachineOsProfileLinuxConfigArgs{\n\t\t\t\tDisablePasswordAuthentication: pulumi.Bool(false),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tvault, err := recoveryservices.NewVault(ctx, \"vault\", \u0026recoveryservices.VaultArgs{\n\t\t\tName: pulumi.String(\"example-recovery-vault\"),\n\t\t\tLocation: secondary.Location,\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tSku: pulumi.String(\"Standard\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryFabric, err := siterecovery.NewFabric(ctx, \"primary\", \u0026siterecovery.FabricArgs{\n\t\t\tName: pulumi.String(\"primary-fabric\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tLocation: primary.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondaryFabric, err := siterecovery.NewFabric(ctx, \"secondary\", \u0026siterecovery.FabricArgs{\n\t\t\tName: pulumi.String(\"secondary-fabric\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tLocation: secondary.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryProtectionContainer, err := siterecovery.NewProtectionContainer(ctx, \"primary\", \u0026siterecovery.ProtectionContainerArgs{\n\t\t\tName: pulumi.String(\"primary-protection-container\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tRecoveryFabricName: primaryFabric.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondaryProtectionContainer, err := siterecovery.NewProtectionContainer(ctx, \"secondary\", \u0026siterecovery.ProtectionContainerArgs{\n\t\t\tName: pulumi.String(\"secondary-protection-container\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tRecoveryFabricName: secondaryFabric.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpolicy, err := siterecovery.NewReplicationPolicy(ctx, \"policy\", \u0026siterecovery.ReplicationPolicyArgs{\n\t\t\tName: pulumi.String(\"policy\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tRecoveryPointRetentionInMinutes: int(24 * 60),\n\t\t\tApplicationConsistentSnapshotFrequencyInMinutes: int(4 * 60),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = siterecovery.NewProtectionContainerMapping(ctx, \"container-mapping\", \u0026siterecovery.ProtectionContainerMappingArgs{\n\t\t\tName: pulumi.String(\"container-mapping\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tRecoveryFabricName: primaryFabric.Name,\n\t\t\tRecoverySourceProtectionContainerName: primaryProtectionContainer.Name,\n\t\t\tRecoveryTargetProtectionContainerId: secondaryProtectionContainer.ID(),\n\t\t\tRecoveryReplicationPolicyId: policy.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondaryVirtualNetwork, err := network.NewVirtualNetwork(ctx, \"secondary\", \u0026network.VirtualNetworkArgs{\n\t\t\tName: pulumi.String(\"network2\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tAddressSpaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.2.0/24\"),\n\t\t\t},\n\t\t\tLocation: secondary.Location,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = siterecovery.NewNetworkMapping(ctx, \"network-mapping\", \u0026siterecovery.NetworkMappingArgs{\n\t\t\tName: pulumi.String(\"network-mapping\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tSourceRecoveryFabricName: primaryFabric.Name,\n\t\t\tTargetRecoveryFabricName: secondaryFabric.Name,\n\t\t\tSourceNetworkId: primaryVirtualNetwork.ID(),\n\t\t\tTargetNetworkId: secondaryVirtualNetwork.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprimaryAccount, err := storage.NewAccount(ctx, \"primary\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"primaryrecoverycache\"),\n\t\t\tLocation: primary.Location,\n\t\t\tResourceGroupName: primary.Name,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondarySubnet, err := network.NewSubnet(ctx, \"secondary\", \u0026network.SubnetArgs{\n\t\t\tName: pulumi.String(\"network2-subnet\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tVirtualNetworkName: secondaryVirtualNetwork.Name,\n\t\t\tAddressPrefixes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.2.0/24\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsecondaryPublicIp, err := network.NewPublicIp(ctx, \"secondary\", \u0026network.PublicIpArgs{\n\t\t\tName: pulumi.String(\"vm-public-ip-secondary\"),\n\t\t\tAllocationMethod: pulumi.String(\"Static\"),\n\t\t\tLocation: secondary.Location,\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tSku: pulumi.String(\"Basic\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = siterecovery.NewReplicatedVM(ctx, \"vm-replication\", \u0026siterecovery.ReplicatedVMArgs{\n\t\t\tName: pulumi.String(\"vm-replication\"),\n\t\t\tResourceGroupName: secondary.Name,\n\t\t\tRecoveryVaultName: vault.Name,\n\t\t\tSourceRecoveryFabricName: primaryFabric.Name,\n\t\t\tSourceVmId: vm.ID(),\n\t\t\tRecoveryReplicationPolicyId: policy.ID(),\n\t\t\tSourceRecoveryProtectionContainerName: primaryProtectionContainer.Name,\n\t\t\tTargetResourceGroupId: secondary.ID(),\n\t\t\tTargetRecoveryFabricId: secondaryFabric.ID(),\n\t\t\tTargetRecoveryProtectionContainerId: secondaryProtectionContainer.ID(),\n\t\t\tManagedDisks: siterecovery.ReplicatedVMManagedDiskArray{\n\t\t\t\t\u0026siterecovery.ReplicatedVMManagedDiskArgs{\n\t\t\t\t\tDiskId: vm.StorageOsDisk.ApplyT(func(storageOsDisk compute.VirtualMachineStorageOsDisk) (*string, error) {\n\t\t\t\t\t\treturn \u0026storageOsDisk.ManagedDiskId, nil\n\t\t\t\t\t}).(pulumi.StringPtrOutput),\n\t\t\t\t\tStagingStorageAccountId: primaryAccount.ID(),\n\t\t\t\t\tTargetResourceGroupId: secondary.ID(),\n\t\t\t\t\tTargetDiskType: pulumi.String(\"Premium_LRS\"),\n\t\t\t\t\tTargetReplicaDiskType: pulumi.String(\"Premium_LRS\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tNetworkInterfaces: siterecovery.ReplicatedVMNetworkInterfaceArray{\n\t\t\t\t\u0026siterecovery.ReplicatedVMNetworkInterfaceArgs{\n\t\t\t\t\tSourceNetworkInterfaceId: vmNetworkInterface.ID(),\n\t\t\t\t\tTargetSubnetName: secondarySubnet.Name,\n\t\t\t\t\tRecoveryPublicIpAddressId: secondaryPublicIp.ID(),\n\t\t\t\t},\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tcontainer_mapping,\n\t\t\tnetwork_mapping,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = siterecovery.NewReplicationRecoveryPlan(ctx, \"example\", \u0026siterecovery.ReplicationRecoveryPlanArgs{\n\t\t\tName: pulumi.String(\"example-recover-plan\"),\n\t\t\tRecoveryVaultId: vault.ID(),\n\t\t\tSourceRecoveryFabricId: primaryFabric.ID(),\n\t\t\tTargetRecoveryFabricId: secondaryFabric.ID(),\n\t\t\tShutdownRecoveryGroup: \u0026siterecovery.ReplicationRecoveryPlanShutdownRecoveryGroupArgs{},\n\t\t\tFailoverRecoveryGroup: \u0026siterecovery.ReplicationRecoveryPlanFailoverRecoveryGroupArgs{},\n\t\t\tBootRecoveryGroups: siterecovery.ReplicationRecoveryPlanBootRecoveryGroupArray{\n\t\t\t\t\u0026siterecovery.ReplicationRecoveryPlanBootRecoveryGroupArgs{\n\t\t\t\t\tReplicatedProtectedItems: pulumi.StringArray{\n\t\t\t\t\t\tvm_replication.ID(),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.network.VirtualNetwork;\nimport com.pulumi.azure.network.VirtualNetworkArgs;\nimport com.pulumi.azure.network.Subnet;\nimport com.pulumi.azure.network.SubnetArgs;\nimport com.pulumi.azure.network.PublicIp;\nimport com.pulumi.azure.network.PublicIpArgs;\nimport com.pulumi.azure.network.NetworkInterface;\nimport com.pulumi.azure.network.NetworkInterfaceArgs;\nimport com.pulumi.azure.network.inputs.NetworkInterfaceIpConfigurationArgs;\nimport com.pulumi.azure.compute.VirtualMachine;\nimport com.pulumi.azure.compute.VirtualMachineArgs;\nimport com.pulumi.azure.compute.inputs.VirtualMachineStorageImageReferenceArgs;\nimport com.pulumi.azure.compute.inputs.VirtualMachineStorageOsDiskArgs;\nimport com.pulumi.azure.compute.inputs.VirtualMachineOsProfileArgs;\nimport com.pulumi.azure.compute.inputs.VirtualMachineOsProfileLinuxConfigArgs;\nimport com.pulumi.azure.recoveryservices.Vault;\nimport com.pulumi.azure.recoveryservices.VaultArgs;\nimport com.pulumi.azure.siterecovery.Fabric;\nimport com.pulumi.azure.siterecovery.FabricArgs;\nimport com.pulumi.azure.siterecovery.ProtectionContainer;\nimport com.pulumi.azure.siterecovery.ProtectionContainerArgs;\nimport com.pulumi.azure.siterecovery.ReplicationPolicy;\nimport com.pulumi.azure.siterecovery.ReplicationPolicyArgs;\nimport com.pulumi.azure.siterecovery.ProtectionContainerMapping;\nimport com.pulumi.azure.siterecovery.ProtectionContainerMappingArgs;\nimport com.pulumi.azure.siterecovery.NetworkMapping;\nimport com.pulumi.azure.siterecovery.NetworkMappingArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.siterecovery.ReplicatedVM;\nimport com.pulumi.azure.siterecovery.ReplicatedVMArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicatedVMManagedDiskArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicatedVMNetworkInterfaceArgs;\nimport com.pulumi.azure.siterecovery.ReplicationRecoveryPlan;\nimport com.pulumi.azure.siterecovery.ReplicationRecoveryPlanArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicationRecoveryPlanShutdownRecoveryGroupArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicationRecoveryPlanFailoverRecoveryGroupArgs;\nimport com.pulumi.azure.siterecovery.inputs.ReplicationRecoveryPlanBootRecoveryGroupArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var primary = new ResourceGroup(\"primary\", ResourceGroupArgs.builder()\n .name(\"tfex-replicated-vm-primary\")\n .location(\"West US\")\n .build());\n\n var secondary = new ResourceGroup(\"secondary\", ResourceGroupArgs.builder()\n .name(\"tfex-replicated-vm-secondary\")\n .location(\"East US\")\n .build());\n\n var primaryVirtualNetwork = new VirtualNetwork(\"primaryVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"network1\")\n .resourceGroupName(primary.name())\n .addressSpaces(\"192.168.1.0/24\")\n .location(primary.location())\n .build());\n\n var primarySubnet = new Subnet(\"primarySubnet\", SubnetArgs.builder()\n .name(\"network1-subnet\")\n .resourceGroupName(primary.name())\n .virtualNetworkName(primaryVirtualNetwork.name())\n .addressPrefixes(\"192.168.1.0/24\")\n .build());\n\n var primaryPublicIp = new PublicIp(\"primaryPublicIp\", PublicIpArgs.builder()\n .name(\"vm-public-ip-primary\")\n .allocationMethod(\"Static\")\n .location(primary.location())\n .resourceGroupName(primary.name())\n .sku(\"Basic\")\n .build());\n\n var vmNetworkInterface = new NetworkInterface(\"vmNetworkInterface\", NetworkInterfaceArgs.builder()\n .name(\"vm-nic\")\n .location(primary.location())\n .resourceGroupName(primary.name())\n .ipConfigurations(NetworkInterfaceIpConfigurationArgs.builder()\n .name(\"vm\")\n .subnetId(primarySubnet.id())\n .privateIpAddressAllocation(\"Dynamic\")\n .publicIpAddressId(primaryPublicIp.id())\n .build())\n .build());\n\n var vm = new VirtualMachine(\"vm\", VirtualMachineArgs.builder()\n .name(\"vm\")\n .location(primary.location())\n .resourceGroupName(primary.name())\n .vmSize(\"Standard_B1s\")\n .networkInterfaceIds(vmNetworkInterface.id())\n .storageImageReference(VirtualMachineStorageImageReferenceArgs.builder()\n .publisher(\"Canonical\")\n .offer(\"0001-com-ubuntu-server-jammy\")\n .sku(\"22_04-lts\")\n .version(\"latest\")\n .build())\n .storageOsDisk(VirtualMachineStorageOsDiskArgs.builder()\n .name(\"vm-os-disk\")\n .osType(\"Linux\")\n .caching(\"ReadWrite\")\n .createOption(\"FromImage\")\n .managedDiskType(\"Premium_LRS\")\n .build())\n .osProfile(VirtualMachineOsProfileArgs.builder()\n .adminUsername(\"test-admin-123\")\n .adminPassword(\"test-pwd-123\")\n .computerName(\"vm\")\n .build())\n .osProfileLinuxConfig(VirtualMachineOsProfileLinuxConfigArgs.builder()\n .disablePasswordAuthentication(false)\n .build())\n .build());\n\n var vault = new Vault(\"vault\", VaultArgs.builder()\n .name(\"example-recovery-vault\")\n .location(secondary.location())\n .resourceGroupName(secondary.name())\n .sku(\"Standard\")\n .build());\n\n var primaryFabric = new Fabric(\"primaryFabric\", FabricArgs.builder()\n .name(\"primary-fabric\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .location(primary.location())\n .build());\n\n var secondaryFabric = new Fabric(\"secondaryFabric\", FabricArgs.builder()\n .name(\"secondary-fabric\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .location(secondary.location())\n .build());\n\n var primaryProtectionContainer = new ProtectionContainer(\"primaryProtectionContainer\", ProtectionContainerArgs.builder()\n .name(\"primary-protection-container\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .recoveryFabricName(primaryFabric.name())\n .build());\n\n var secondaryProtectionContainer = new ProtectionContainer(\"secondaryProtectionContainer\", ProtectionContainerArgs.builder()\n .name(\"secondary-protection-container\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .recoveryFabricName(secondaryFabric.name())\n .build());\n\n var policy = new ReplicationPolicy(\"policy\", ReplicationPolicyArgs.builder()\n .name(\"policy\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .recoveryPointRetentionInMinutes(24 * 60)\n .applicationConsistentSnapshotFrequencyInMinutes(4 * 60)\n .build());\n\n var container_mapping = new ProtectionContainerMapping(\"container-mapping\", ProtectionContainerMappingArgs.builder()\n .name(\"container-mapping\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .recoveryFabricName(primaryFabric.name())\n .recoverySourceProtectionContainerName(primaryProtectionContainer.name())\n .recoveryTargetProtectionContainerId(secondaryProtectionContainer.id())\n .recoveryReplicationPolicyId(policy.id())\n .build());\n\n var secondaryVirtualNetwork = new VirtualNetwork(\"secondaryVirtualNetwork\", VirtualNetworkArgs.builder()\n .name(\"network2\")\n .resourceGroupName(secondary.name())\n .addressSpaces(\"192.168.2.0/24\")\n .location(secondary.location())\n .build());\n\n var network_mapping = new NetworkMapping(\"network-mapping\", NetworkMappingArgs.builder()\n .name(\"network-mapping\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .sourceRecoveryFabricName(primaryFabric.name())\n .targetRecoveryFabricName(secondaryFabric.name())\n .sourceNetworkId(primaryVirtualNetwork.id())\n .targetNetworkId(secondaryVirtualNetwork.id())\n .build());\n\n var primaryAccount = new Account(\"primaryAccount\", AccountArgs.builder()\n .name(\"primaryrecoverycache\")\n .location(primary.location())\n .resourceGroupName(primary.name())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .build());\n\n var secondarySubnet = new Subnet(\"secondarySubnet\", SubnetArgs.builder()\n .name(\"network2-subnet\")\n .resourceGroupName(secondary.name())\n .virtualNetworkName(secondaryVirtualNetwork.name())\n .addressPrefixes(\"192.168.2.0/24\")\n .build());\n\n var secondaryPublicIp = new PublicIp(\"secondaryPublicIp\", PublicIpArgs.builder()\n .name(\"vm-public-ip-secondary\")\n .allocationMethod(\"Static\")\n .location(secondary.location())\n .resourceGroupName(secondary.name())\n .sku(\"Basic\")\n .build());\n\n var vm_replication = new ReplicatedVM(\"vm-replication\", ReplicatedVMArgs.builder()\n .name(\"vm-replication\")\n .resourceGroupName(secondary.name())\n .recoveryVaultName(vault.name())\n .sourceRecoveryFabricName(primaryFabric.name())\n .sourceVmId(vm.id())\n .recoveryReplicationPolicyId(policy.id())\n .sourceRecoveryProtectionContainerName(primaryProtectionContainer.name())\n .targetResourceGroupId(secondary.id())\n .targetRecoveryFabricId(secondaryFabric.id())\n .targetRecoveryProtectionContainerId(secondaryProtectionContainer.id())\n .managedDisks(ReplicatedVMManagedDiskArgs.builder()\n .diskId(vm.storageOsDisk().applyValue(storageOsDisk -\u003e storageOsDisk.managedDiskId()))\n .stagingStorageAccountId(primaryAccount.id())\n .targetResourceGroupId(secondary.id())\n .targetDiskType(\"Premium_LRS\")\n .targetReplicaDiskType(\"Premium_LRS\")\n .build())\n .networkInterfaces(ReplicatedVMNetworkInterfaceArgs.builder()\n .sourceNetworkInterfaceId(vmNetworkInterface.id())\n .targetSubnetName(secondarySubnet.name())\n .recoveryPublicIpAddressId(secondaryPublicIp.id())\n .build())\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n container_mapping,\n network_mapping)\n .build());\n\n var example = new ReplicationRecoveryPlan(\"example\", ReplicationRecoveryPlanArgs.builder()\n .name(\"example-recover-plan\")\n .recoveryVaultId(vault.id())\n .sourceRecoveryFabricId(primaryFabric.id())\n .targetRecoveryFabricId(secondaryFabric.id())\n .shutdownRecoveryGroup()\n .failoverRecoveryGroup()\n .bootRecoveryGroups(ReplicationRecoveryPlanBootRecoveryGroupArgs.builder()\n .replicatedProtectedItems(vm_replication.id())\n .build())\n .build());\n\n }\n}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSite Recovery Fabric can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:siterecovery/replicationRecoveryPlan:ReplicationRecoveryPlan azurerm_site_recovery_replication_recovery_plan.example /subscriptions/00000000-0000-0000-0000-00000000000/resourceGroups/groupName/providers/Microsoft.RecoveryServices/vaults/vaultName/replicationRecoveryPlans/planName\n```\n\n", "properties": { "azureToAzureSettings": { "$ref": "#/types/azure:siterecovery/ReplicationRecoveryPlanAzureToAzureSettings:ReplicationRecoveryPlanAzureToAzureSettings", @@ -251893,7 +251893,7 @@ } }, "azure:stack/hciCluster:HciCluster": { - "description": "Manages an Azure Stack HCI Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst example = azuread.getApplication({\n displayName: \"Allowed resource types\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleHciCluster = new azure.stack.HciCluster(\"example\", {\n name: \"example-cluster\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n clientId: example.then(example =\u003e example.applicationId),\n tenantId: current.then(current =\u003e current.tenantId),\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\nexample = azuread.get_application(display_name=\"Allowed resource types\")\ncurrent = azure.core.get_client_config()\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_hci_cluster = azure.stack.HciCluster(\"example\",\n name=\"example-cluster\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n client_id=example.application_id,\n tenant_id=current.tenant_id,\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = AzureAD.GetApplication.Invoke(new()\n {\n DisplayName = \"Allowed resource types\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleHciCluster = new Azure.Stack.HciCluster(\"example\", new()\n {\n Name = \"example-cluster\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n ClientId = example.Apply(getApplicationResult =\u003e getApplicationResult.ApplicationId),\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n Identity = new Azure.Stack.Inputs.HciClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/stack\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := azuread.LookupApplication(ctx, \u0026azuread.LookupApplicationArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Allowed resource types\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = stack.NewHciCluster(ctx, \"example\", \u0026stack.HciClusterArgs{\n\t\t\tName: pulumi.String(\"example-cluster\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tClientId: pulumi.String(example.ApplicationId),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tIdentity: \u0026stack.HciClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetApplicationArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.stack.HciCluster;\nimport com.pulumi.azure.stack.HciClusterArgs;\nimport com.pulumi.azure.stack.inputs.HciClusterIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = AzureadFunctions.getApplication(GetApplicationArgs.builder()\n .displayName(\"Allowed resource types\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleHciCluster = new HciCluster(\"exampleHciCluster\", HciClusterArgs.builder()\n .name(\"example-cluster\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .clientId(example.applyValue(getApplicationResult -\u003e getApplicationResult.applicationId()))\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .identity(HciClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleHciCluster:\n type: azure:stack:HciCluster\n name: example\n properties:\n name: example-cluster\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n clientId: ${example.applicationId}\n tenantId: ${current.tenantId}\n identity:\n type: SystemAssigned\nvariables:\n example:\n fn::invoke:\n Function: azuread:getApplication\n Arguments:\n displayName: Allowed resource types\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAzure Stack HCI Clusters can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:stack/hciCluster:HciCluster example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.AzureStackHCI/clusters/cluster1\n```\n\n", + "description": "Manages an Azure Stack HCI Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azuread from \"@pulumi/azuread\";\n\nconst example = azuread.getApplication({\n displayName: \"Allowed resource types\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleHciCluster = new azure.stack.HciCluster(\"example\", {\n name: \"example-cluster\",\n resourceGroupName: exampleResourceGroup.name,\n location: exampleResourceGroup.location,\n clientId: example.then(example =\u003e example.applicationId),\n tenantId: current.then(current =\u003e current.tenantId),\n identity: {\n type: \"SystemAssigned\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azuread as azuread\n\nexample = azuread.get_application(display_name=\"Allowed resource types\")\ncurrent = azure.core.get_client_config()\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_hci_cluster = azure.stack.HciCluster(\"example\",\n name=\"example-cluster\",\n resource_group_name=example_resource_group.name,\n location=example_resource_group.location,\n client_id=example.application_id,\n tenant_id=current.tenant_id,\n identity={\n \"type\": \"SystemAssigned\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing AzureAD = Pulumi.AzureAD;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = AzureAD.GetApplication.Invoke(new()\n {\n DisplayName = \"Allowed resource types\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleHciCluster = new Azure.Stack.HciCluster(\"example\", new()\n {\n Name = \"example-cluster\",\n ResourceGroupName = exampleResourceGroup.Name,\n Location = exampleResourceGroup.Location,\n ClientId = example.Apply(getApplicationResult =\u003e getApplicationResult.ApplicationId),\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n Identity = new Azure.Stack.Inputs.HciClusterIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/stack\"\n\t\"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := azuread.LookupApplication(ctx, \u0026azuread.LookupApplicationArgs{\n\t\t\tDisplayName: pulumi.StringRef(\"Allowed resource types\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = stack.NewHciCluster(ctx, \"example\", \u0026stack.HciClusterArgs{\n\t\t\tName: pulumi.String(\"example-cluster\"),\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tClientId: pulumi.String(example.ApplicationId),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tIdentity: \u0026stack.HciClusterIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azuread.AzureadFunctions;\nimport com.pulumi.azuread.inputs.GetApplicationArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.stack.HciCluster;\nimport com.pulumi.azure.stack.HciClusterArgs;\nimport com.pulumi.azure.stack.inputs.HciClusterIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = AzureadFunctions.getApplication(GetApplicationArgs.builder()\n .displayName(\"Allowed resource types\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleHciCluster = new HciCluster(\"exampleHciCluster\", HciClusterArgs.builder()\n .name(\"example-cluster\")\n .resourceGroupName(exampleResourceGroup.name())\n .location(exampleResourceGroup.location())\n .clientId(example.applyValue(getApplicationResult -\u003e getApplicationResult.applicationId()))\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .identity(HciClusterIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleHciCluster:\n type: azure:stack:HciCluster\n name: example\n properties:\n name: example-cluster\n resourceGroupName: ${exampleResourceGroup.name}\n location: ${exampleResourceGroup.location}\n clientId: ${example.applicationId}\n tenantId: ${current.tenantId}\n identity:\n type: SystemAssigned\nvariables:\n example:\n fn::invoke:\n Function: azuread:getApplication\n Arguments:\n displayName: Allowed resource types\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAzure Stack HCI Clusters can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:stack/hciCluster:HciCluster example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.AzureStackHCI/clusters/cluster1\n```\n\n", "properties": { "automanageConfigurationId": { "type": "string", @@ -254258,7 +254258,7 @@ } }, "azure:storage/customerManagedKey:CustomerManagedKey": { - "description": "Manages a Customer Managed Key for a Storage Account.\n\n\u003e **NOTE:** It's possible to define a Customer Managed Key both within the `azure.storage.Account` resource via the `customer_managed_key` block and by using the `azure.storage.CustomerManagedKey` resource. However it's not possible to use both methods to manage a Customer Managed Key for a Storage Account, since there'll be conflicts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestor\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst storage = new azure.keyvault.AccessPolicy(\"storage\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleAccount.identity.apply(identity =\u003e identity?.principalId),\n secretPermissions: [\"Get\"],\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n secretPermissions: [\"Get\"],\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"tfex-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n client,\n storage,\n ],\n});\nconst exampleCustomerManagedKey = new azure.storage.CustomerManagedKey(\"example\", {\n storageAccountId: exampleAccount.id,\n keyVaultId: exampleKeyVault.id,\n keyName: exampleKey.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestor\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nstorage = azure.keyvault.AccessPolicy(\"storage\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_account.identity.principal_id,\n secret_permissions=[\"Get\"],\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n secret_permissions=[\"Get\"],\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"tfex-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n storage,\n ]))\nexample_customer_managed_key = azure.storage.CustomerManagedKey(\"example\",\n storage_account_id=example_account.id,\n key_vault_id=example_key_vault.id,\n key_name=example_key.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestor\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n Identity = new Azure.Storage.Inputs.AccountIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var storage = new Azure.KeyVault.AccessPolicy(\"storage\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleAccount.Identity.Apply(identity =\u003e identity?.PrincipalId),\n SecretPermissions = new[]\n {\n \"Get\",\n },\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n },\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"tfex-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n storage,\n },\n });\n\n var exampleCustomerManagedKey = new Azure.Storage.CustomerManagedKey(\"example\", new()\n {\n StorageAccountId = exampleAccount.Id,\n KeyVaultId = exampleKeyVault.Id,\n KeyName = exampleKey.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestor\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t\tIdentity: \u0026storage.AccountIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tstorage, err := keyvault.NewAccessPolicy(ctx, \"storage\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(exampleAccount.Identity.ApplyT(func(identity storage.AccountIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\tpulumi.String(\"SetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"tfex-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tstorage,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = storage.NewCustomerManagedKey(ctx, \"example\", \u0026storage.CustomerManagedKeyArgs{\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyName: exampleKey.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.inputs.AccountIdentityArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.storage.CustomerManagedKey;\nimport com.pulumi.azure.storage.CustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestor\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .identity(AccountIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var storage = new AccessPolicy(\"storage\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleAccount.identity().applyValue(identity -\u003e identity.principalId()))\n .secretPermissions(\"Get\")\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions(\"Get\")\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"tfex-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n storage)\n .build());\n\n var exampleCustomerManagedKey = new CustomerManagedKey(\"exampleCustomerManagedKey\", CustomerManagedKeyArgs.builder()\n .storageAccountId(exampleAccount.id())\n .keyVaultId(exampleKeyVault.id())\n .keyName(exampleKey.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n storage:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleAccount.identity.principalId}\n secretPermissions:\n - Get\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n secretPermissions:\n - Get\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n - SetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: tfex-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${client}\n - ${storage}\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestor\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: GRS\n identity:\n type: SystemAssigned\n exampleCustomerManagedKey:\n type: azure:storage:CustomerManagedKey\n name: example\n properties:\n storageAccountId: ${exampleAccount.id}\n keyVaultId: ${exampleKeyVault.id}\n keyName: ${exampleKey.name}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustomer Managed Keys for a Storage Account can be imported using the `resource id` of the Storage Account, e.g.\n\n```sh\n$ pulumi import azure:storage/customerManagedKey:CustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Storage/storageAccounts/myaccount\n```\n\n", + "description": "Manages a Customer Managed Key for a Storage Account.\n\n\u003e **NOTE:** It's possible to define a Customer Managed Key both within the `azure.storage.Account` resource via the `customer_managed_key` block and by using the `azure.storage.CustomerManagedKey` resource. However it's not possible to use both methods to manage a Customer Managed Key for a Storage Account, since there'll be conflicts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekv\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestor\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"GRS\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst storage = new azure.keyvault.AccessPolicy(\"storage\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: exampleAccount.identity.apply(identity =\u003e identity?.principalId),\n secretPermissions: [\"Get\"],\n keyPermissions: [\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ],\n});\nconst client = new azure.keyvault.AccessPolicy(\"client\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n secretPermissions: [\"Get\"],\n keyPermissions: [\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"tfex-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [\n client,\n storage,\n ],\n});\nconst exampleCustomerManagedKey = new azure.storage.CustomerManagedKey(\"example\", {\n storageAccountId: exampleAccount.id,\n keyVaultId: exampleKeyVault.id,\n keyName: exampleKey.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekv\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestor\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"GRS\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nstorage = azure.keyvault.AccessPolicy(\"storage\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=example_account.identity.principal_id,\n secret_permissions=[\"Get\"],\n key_permissions=[\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n ])\nclient = azure.keyvault.AccessPolicy(\"client\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n secret_permissions=[\"Get\"],\n key_permissions=[\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"tfex-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[\n client,\n storage,\n ]))\nexample_customer_managed_key = azure.storage.CustomerManagedKey(\"example\",\n storage_account_id=example_account.id,\n key_vault_id=example_key_vault.id,\n key_name=example_key.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekv\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestor\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"GRS\",\n Identity = new Azure.Storage.Inputs.AccountIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var storage = new Azure.KeyVault.AccessPolicy(\"storage\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = exampleAccount.Identity.Apply(identity =\u003e identity?.PrincipalId),\n SecretPermissions = new[]\n {\n \"Get\",\n },\n KeyPermissions = new[]\n {\n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\",\n },\n });\n\n var client = new Azure.KeyVault.AccessPolicy(\"client\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n SecretPermissions = new[]\n {\n \"Get\",\n },\n KeyPermissions = new[]\n {\n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"tfex-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n client,\n storage,\n },\n });\n\n var exampleCustomerManagedKey = new Azure.Storage.CustomerManagedKey(\"example\", new()\n {\n StorageAccountId = exampleAccount.Id,\n KeyVaultId = exampleKeyVault.Id,\n KeyName = exampleKey.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekv\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestor\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"GRS\"),\n\t\t\tIdentity: \u0026storage.AccountIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tstorage, err := keyvault.NewAccessPolicy(ctx, \"storage\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(exampleAccount.Identity.ApplyT(func(identity storage.AccountIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tclient, err := keyvault.NewAccessPolicy(ctx, \"client\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t},\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\tpulumi.String(\"Restore\"),\n\t\t\t\tpulumi.String(\"Recover\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"Encrypt\"),\n\t\t\t\tpulumi.String(\"Decrypt\"),\n\t\t\t\tpulumi.String(\"Sign\"),\n\t\t\t\tpulumi.String(\"Verify\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t\tpulumi.String(\"SetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"tfex-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"decrypt\"),\n\t\t\t\tpulumi.String(\"encrypt\"),\n\t\t\t\tpulumi.String(\"sign\"),\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"verify\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tclient,\n\t\t\tstorage,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = storage.NewCustomerManagedKey(ctx, \"example\", \u0026storage.CustomerManagedKeyArgs{\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyName: exampleKey.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.inputs.AccountIdentityArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.storage.CustomerManagedKey;\nimport com.pulumi.azure.storage.CustomerManagedKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekv\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestor\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"GRS\")\n .identity(AccountIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var storage = new AccessPolicy(\"storage\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(exampleAccount.identity().applyValue(identity -\u003e identity.principalId()))\n .secretPermissions(\"Get\")\n .keyPermissions( \n \"Get\",\n \"UnwrapKey\",\n \"WrapKey\")\n .build());\n\n var client = new AccessPolicy(\"client\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .secretPermissions(\"Get\")\n .keyPermissions( \n \"Get\",\n \"Create\",\n \"Delete\",\n \"List\",\n \"Restore\",\n \"Recover\",\n \"UnwrapKey\",\n \"WrapKey\",\n \"Purge\",\n \"Encrypt\",\n \"Decrypt\",\n \"Sign\",\n \"Verify\",\n \"GetRotationPolicy\",\n \"SetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"tfex-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"decrypt\",\n \"encrypt\",\n \"sign\",\n \"unwrapKey\",\n \"verify\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn( \n client,\n storage)\n .build());\n\n var exampleCustomerManagedKey = new CustomerManagedKey(\"exampleCustomerManagedKey\", CustomerManagedKeyArgs.builder()\n .storageAccountId(exampleAccount.id())\n .keyVaultId(exampleKeyVault.id())\n .keyName(exampleKey.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekv\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n storage:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${exampleAccount.identity.principalId}\n secretPermissions:\n - Get\n keyPermissions:\n - Get\n - UnwrapKey\n - WrapKey\n client:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n secretPermissions:\n - Get\n keyPermissions:\n - Get\n - Create\n - Delete\n - List\n - Restore\n - Recover\n - UnwrapKey\n - WrapKey\n - Purge\n - Encrypt\n - Decrypt\n - Sign\n - Verify\n - GetRotationPolicy\n - SetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: tfex-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - decrypt\n - encrypt\n - sign\n - unwrapKey\n - verify\n - wrapKey\n options:\n dependson:\n - ${client}\n - ${storage}\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestor\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: GRS\n identity:\n type: SystemAssigned\n exampleCustomerManagedKey:\n type: azure:storage:CustomerManagedKey\n name: example\n properties:\n storageAccountId: ${exampleAccount.id}\n keyVaultId: ${exampleKeyVault.id}\n keyName: ${exampleKey.name}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustomer Managed Keys for a Storage Account can be imported using the `resource id` of the Storage Account, e.g.\n\n```sh\n$ pulumi import azure:storage/customerManagedKey:CustomerManagedKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myresourcegroup/providers/Microsoft.Storage/storageAccounts/myaccount\n```\n\n", "properties": { "federatedIdentityClientId": { "type": "string", @@ -260781,7 +260781,7 @@ } }, "azure:synapse/roleAssignment:RoleAssignment": { - "description": "Manages a Synapse Role Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleFirewallRule = new azure.synapse.FirewallRule(\"example\", {\n name: \"AllowAll\",\n synapseWorkspaceId: exampleWorkspace.id,\n startIpAddress: \"0.0.0.0\",\n endIpAddress: \"255.255.255.255\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleRoleAssignment = new azure.synapse.RoleAssignment(\"example\", {\n synapseWorkspaceId: exampleWorkspace.id,\n roleName: \"Synapse SQL Administrator\",\n principalId: current.then(current =\u003e current.objectId),\n}, {\n dependsOn: [exampleFirewallRule],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_firewall_rule = azure.synapse.FirewallRule(\"example\",\n name=\"AllowAll\",\n synapse_workspace_id=example_workspace.id,\n start_ip_address=\"0.0.0.0\",\n end_ip_address=\"255.255.255.255\")\ncurrent = azure.core.get_client_config()\nexample_role_assignment = azure.synapse.RoleAssignment(\"example\",\n synapse_workspace_id=example_workspace.id,\n role_name=\"Synapse SQL Administrator\",\n principal_id=current.object_id,\n opts = pulumi.ResourceOptions(depends_on=[example_firewall_rule]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleFirewallRule = new Azure.Synapse.FirewallRule(\"example\", new()\n {\n Name = \"AllowAll\",\n SynapseWorkspaceId = exampleWorkspace.Id,\n StartIpAddress = \"0.0.0.0\",\n EndIpAddress = \"255.255.255.255\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleAssignment = new Azure.Synapse.RoleAssignment(\"example\", new()\n {\n SynapseWorkspaceId = exampleWorkspace.Id,\n RoleName = \"Synapse SQL Administrator\",\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleFirewallRule,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFirewallRule, err := synapse.NewFirewallRule(ctx, \"example\", \u0026synapse.FirewallRuleArgs{\n\t\t\tName: pulumi.String(\"AllowAll\"),\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tStartIpAddress: pulumi.String(\"0.0.0.0\"),\n\t\t\tEndIpAddress: pulumi.String(\"255.255.255.255\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewRoleAssignment(ctx, \"example\", \u0026synapse.RoleAssignmentArgs{\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tRoleName: pulumi.String(\"Synapse SQL Administrator\"),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleFirewallRule,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.FirewallRule;\nimport com.pulumi.azure.synapse.FirewallRuleArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.synapse.RoleAssignment;\nimport com.pulumi.azure.synapse.RoleAssignmentArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleFirewallRule = new FirewallRule(\"exampleFirewallRule\", FirewallRuleArgs.builder()\n .name(\"AllowAll\")\n .synapseWorkspaceId(exampleWorkspace.id())\n .startIpAddress(\"0.0.0.0\")\n .endIpAddress(\"255.255.255.255\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleRoleAssignment = new RoleAssignment(\"exampleRoleAssignment\", RoleAssignmentArgs.builder()\n .synapseWorkspaceId(exampleWorkspace.id())\n .roleName(\"Synapse SQL Administrator\")\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleFirewallRule)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n exampleFirewallRule:\n type: azure:synapse:FirewallRule\n name: example\n properties:\n name: AllowAll\n synapseWorkspaceId: ${exampleWorkspace.id}\n startIpAddress: 0.0.0.0\n endIpAddress: 255.255.255.255\n exampleRoleAssignment:\n type: azure:synapse:RoleAssignment\n name: example\n properties:\n synapseWorkspaceId: ${exampleWorkspace.id}\n roleName: Synapse SQL Administrator\n principalId: ${current.objectId}\n options:\n dependson:\n - ${exampleFirewallRule}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Role Assignment can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/roleAssignment:RoleAssignment example \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1|000000000000\"\n```\n\n", + "description": "Manages a Synapse Role Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n});\nconst exampleFirewallRule = new azure.synapse.FirewallRule(\"example\", {\n name: \"AllowAll\",\n synapseWorkspaceId: exampleWorkspace.id,\n startIpAddress: \"0.0.0.0\",\n endIpAddress: \"255.255.255.255\",\n});\nconst current = azure.core.getClientConfig({});\nconst exampleRoleAssignment = new azure.synapse.RoleAssignment(\"example\", {\n synapseWorkspaceId: exampleWorkspace.id,\n roleName: \"Synapse SQL Administrator\",\n principalId: current.then(current =\u003e current.objectId),\n}, {\n dependsOn: [exampleFirewallRule],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n })\nexample_firewall_rule = azure.synapse.FirewallRule(\"example\",\n name=\"AllowAll\",\n synapse_workspace_id=example_workspace.id,\n start_ip_address=\"0.0.0.0\",\n end_ip_address=\"255.255.255.255\")\ncurrent = azure.core.get_client_config()\nexample_role_assignment = azure.synapse.RoleAssignment(\"example\",\n synapse_workspace_id=example_workspace.id,\n role_name=\"Synapse SQL Administrator\",\n principal_id=current.object_id,\n opts = pulumi.ResourceOptions(depends_on=[example_firewall_rule]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n });\n\n var exampleFirewallRule = new Azure.Synapse.FirewallRule(\"example\", new()\n {\n Name = \"AllowAll\",\n SynapseWorkspaceId = exampleWorkspace.Id,\n StartIpAddress = \"0.0.0.0\",\n EndIpAddress = \"255.255.255.255\",\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleRoleAssignment = new Azure.Synapse.RoleAssignment(\"example\", new()\n {\n SynapseWorkspaceId = exampleWorkspace.Id,\n RoleName = \"Synapse SQL Administrator\",\n PrincipalId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleFirewallRule,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleFirewallRule, err := synapse.NewFirewallRule(ctx, \"example\", \u0026synapse.FirewallRuleArgs{\n\t\t\tName: pulumi.String(\"AllowAll\"),\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tStartIpAddress: pulumi.String(\"0.0.0.0\"),\n\t\t\tEndIpAddress: pulumi.String(\"255.255.255.255\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewRoleAssignment(ctx, \"example\", \u0026synapse.RoleAssignmentArgs{\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tRoleName: pulumi.String(\"Synapse SQL Administrator\"),\n\t\t\tPrincipalId: pulumi.String(current.ObjectId),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleFirewallRule,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.FirewallRule;\nimport com.pulumi.azure.synapse.FirewallRuleArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.synapse.RoleAssignment;\nimport com.pulumi.azure.synapse.RoleAssignmentArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .build());\n\n var exampleFirewallRule = new FirewallRule(\"exampleFirewallRule\", FirewallRuleArgs.builder()\n .name(\"AllowAll\")\n .synapseWorkspaceId(exampleWorkspace.id())\n .startIpAddress(\"0.0.0.0\")\n .endIpAddress(\"255.255.255.255\")\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleRoleAssignment = new RoleAssignment(\"exampleRoleAssignment\", RoleAssignmentArgs.builder()\n .synapseWorkspaceId(exampleWorkspace.id())\n .roleName(\"Synapse SQL Administrator\")\n .principalId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleFirewallRule)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n exampleFirewallRule:\n type: azure:synapse:FirewallRule\n name: example\n properties:\n name: AllowAll\n synapseWorkspaceId: ${exampleWorkspace.id}\n startIpAddress: 0.0.0.0\n endIpAddress: 255.255.255.255\n exampleRoleAssignment:\n type: azure:synapse:RoleAssignment\n name: example\n properties:\n synapseWorkspaceId: ${exampleWorkspace.id}\n roleName: Synapse SQL Administrator\n principalId: ${current.objectId}\n options:\n dependson:\n - ${exampleFirewallRule}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Role Assignment can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/roleAssignment:RoleAssignment example \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1|000000000000\"\n```\n\n", "properties": { "principalId": { "type": "string", @@ -261943,7 +261943,7 @@ } }, "azure:synapse/workspace:Workspace": { - "description": "Manages a Synapse Workspace.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n tags:\n Env: production\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Creating A Workspace With Customer Managed Key And Azure AD Admin\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst deployer = new azure.keyvault.AccessPolicy(\"deployer\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspaceencryptionkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [deployer],\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n customerManagedKey: {\n keyVersionlessId: exampleKey.versionlessId,\n keyName: \"enckey\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\nconst workspacePolicy = new azure.keyvault.AccessPolicy(\"workspace_policy\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleWorkspace.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleWorkspace.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n});\nconst exampleWorkspaceKey = new azure.synapse.WorkspaceKey(\"example\", {\n customerManagedKeyVersionlessId: exampleKey.versionlessId,\n synapseWorkspaceId: exampleWorkspace.id,\n active: true,\n customerManagedKeyName: \"enckey\",\n}, {\n dependsOn: [workspacePolicy],\n});\nconst exampleWorkspaceAadAdmin = new azure.synapse.WorkspaceAadAdmin(\"example\", {\n synapseWorkspaceId: exampleWorkspace.id,\n login: \"AzureAD Admin\",\n objectId: \"00000000-0000-0000-0000-000000000000\",\n tenantId: \"00000000-0000-0000-0000-000000000000\",\n}, {\n dependsOn: [exampleWorkspaceKey],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\ndeployer = azure.keyvault.AccessPolicy(\"deployer\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspaceencryptionkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[deployer]))\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n customer_managed_key={\n \"key_versionless_id\": example_key.versionless_id,\n \"key_name\": \"enckey\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\nworkspace_policy = azure.keyvault.AccessPolicy(\"workspace_policy\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_workspace.identity.tenant_id,\n object_id=example_workspace.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ])\nexample_workspace_key = azure.synapse.WorkspaceKey(\"example\",\n customer_managed_key_versionless_id=example_key.versionless_id,\n synapse_workspace_id=example_workspace.id,\n active=True,\n customer_managed_key_name=\"enckey\",\n opts = pulumi.ResourceOptions(depends_on=[workspace_policy]))\nexample_workspace_aad_admin = azure.synapse.WorkspaceAadAdmin(\"example\",\n synapse_workspace_id=example_workspace.id,\n login=\"AzureAD Admin\",\n object_id=\"00000000-0000-0000-0000-000000000000\",\n tenant_id=\"00000000-0000-0000-0000-000000000000\",\n opts = pulumi.ResourceOptions(depends_on=[example_workspace_key]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var deployer = new Azure.KeyVault.AccessPolicy(\"deployer\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspaceencryptionkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n deployer,\n },\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n CustomerManagedKey = new Azure.Synapse.Inputs.WorkspaceCustomerManagedKeyArgs\n {\n KeyVersionlessId = exampleKey.VersionlessId,\n KeyName = \"enckey\",\n },\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n var workspacePolicy = new Azure.KeyVault.AccessPolicy(\"workspace_policy\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleWorkspace.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleWorkspace.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n });\n\n var exampleWorkspaceKey = new Azure.Synapse.WorkspaceKey(\"example\", new()\n {\n CustomerManagedKeyVersionlessId = exampleKey.VersionlessId,\n SynapseWorkspaceId = exampleWorkspace.Id,\n Active = true,\n CustomerManagedKeyName = \"enckey\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n workspacePolicy,\n },\n });\n\n var exampleWorkspaceAadAdmin = new Azure.Synapse.WorkspaceAadAdmin(\"example\", new()\n {\n SynapseWorkspaceId = exampleWorkspace.Id,\n Login = \"AzureAD Admin\",\n ObjectId = \"00000000-0000-0000-0000-000000000000\",\n TenantId = \"00000000-0000-0000-0000-000000000000\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleWorkspaceKey,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdeployer, err := keyvault.NewAccessPolicy(ctx, \"deployer\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspaceencryptionkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdeployer,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tCustomerManagedKey: \u0026synapse.WorkspaceCustomerManagedKeyArgs{\n\t\t\t\tKeyVersionlessId: exampleKey.VersionlessId,\n\t\t\t\tKeyName: pulumi.String(\"enckey\"),\n\t\t\t},\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tworkspacePolicy, err := keyvault.NewAccessPolicy(ctx, \"workspace_policy\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleWorkspace.Identity.ApplyT(func(identity synapse.WorkspaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleWorkspace.Identity.ApplyT(func(identity synapse.WorkspaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspaceKey, err := synapse.NewWorkspaceKey(ctx, \"example\", \u0026synapse.WorkspaceKeyArgs{\n\t\t\tCustomerManagedKeyVersionlessId: exampleKey.VersionlessId,\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tActive: pulumi.Bool(true),\n\t\t\tCustomerManagedKeyName: pulumi.String(\"enckey\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tworkspacePolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspaceAadAdmin(ctx, \"example\", \u0026synapse.WorkspaceAadAdminArgs{\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLogin: pulumi.String(\"AzureAD Admin\"),\n\t\t\tObjectId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tTenantId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleWorkspaceKey,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceCustomerManagedKeyArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.WorkspaceKey;\nimport com.pulumi.azure.synapse.WorkspaceKeyArgs;\nimport com.pulumi.azure.synapse.WorkspaceAadAdmin;\nimport com.pulumi.azure.synapse.WorkspaceAadAdminArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var deployer = new AccessPolicy(\"deployer\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspaceencryptionkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(deployer)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .customerManagedKey(WorkspaceCustomerManagedKeyArgs.builder()\n .keyVersionlessId(exampleKey.versionlessId())\n .keyName(\"enckey\")\n .build())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n var workspacePolicy = new AccessPolicy(\"workspacePolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleWorkspace.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleWorkspace.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build());\n\n var exampleWorkspaceKey = new WorkspaceKey(\"exampleWorkspaceKey\", WorkspaceKeyArgs.builder()\n .customerManagedKeyVersionlessId(exampleKey.versionlessId())\n .synapseWorkspaceId(exampleWorkspace.id())\n .active(true)\n .customerManagedKeyName(\"enckey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(workspacePolicy)\n .build());\n\n var exampleWorkspaceAadAdmin = new WorkspaceAadAdmin(\"exampleWorkspaceAadAdmin\", WorkspaceAadAdminArgs.builder()\n .synapseWorkspaceId(exampleWorkspace.id())\n .login(\"AzureAD Admin\")\n .objectId(\"00000000-0000-0000-0000-000000000000\")\n .tenantId(\"00000000-0000-0000-0000-000000000000\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleWorkspaceKey)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n deployer:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspaceencryptionkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${deployer}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n customerManagedKey:\n keyVersionlessId: ${exampleKey.versionlessId}\n keyName: enckey\n identity:\n type: SystemAssigned\n tags:\n Env: production\n workspacePolicy:\n type: azure:keyvault:AccessPolicy\n name: workspace_policy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleWorkspace.identity.tenantId}\n objectId: ${exampleWorkspace.identity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleWorkspaceKey:\n type: azure:synapse:WorkspaceKey\n name: example\n properties:\n customerManagedKeyVersionlessId: ${exampleKey.versionlessId}\n synapseWorkspaceId: ${exampleWorkspace.id}\n active: true\n customerManagedKeyName: enckey\n options:\n dependson:\n - ${workspacePolicy}\n exampleWorkspaceAadAdmin:\n type: azure:synapse:WorkspaceAadAdmin\n name: example\n properties:\n synapseWorkspaceId: ${exampleWorkspace.id}\n login: AzureAD Admin\n objectId: 00000000-0000-0000-0000-000000000000\n tenantId: 00000000-0000-0000-0000-000000000000\n options:\n dependson:\n - ${exampleWorkspaceKey}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Workspace can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/workspace:Workspace example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1\n```\n\n", + "description": "Manages a Synapse Workspace.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n tags:\n Env: production\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Creating A Workspace With Customer Managed Key And Azure AD Admin\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst deployer = new azure.keyvault.AccessPolicy(\"deployer\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspaceencryptionkey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [deployer],\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n customerManagedKey: {\n keyVersionlessId: exampleKey.versionlessId,\n keyName: \"enckey\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\nconst workspacePolicy = new azure.keyvault.AccessPolicy(\"workspace_policy\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleWorkspace.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleWorkspace.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n});\nconst exampleWorkspaceKey = new azure.synapse.WorkspaceKey(\"example\", {\n customerManagedKeyVersionlessId: exampleKey.versionlessId,\n synapseWorkspaceId: exampleWorkspace.id,\n active: true,\n customerManagedKeyName: \"enckey\",\n}, {\n dependsOn: [workspacePolicy],\n});\nconst exampleWorkspaceAadAdmin = new azure.synapse.WorkspaceAadAdmin(\"example\", {\n synapseWorkspaceId: exampleWorkspace.id,\n login: \"AzureAD Admin\",\n objectId: \"00000000-0000-0000-0000-000000000000\",\n tenantId: \"00000000-0000-0000-0000-000000000000\",\n}, {\n dependsOn: [exampleWorkspaceKey],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\ndeployer = azure.keyvault.AccessPolicy(\"deployer\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspaceencryptionkey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[deployer]))\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n customer_managed_key={\n \"key_versionless_id\": example_key.versionless_id,\n \"key_name\": \"enckey\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\nworkspace_policy = azure.keyvault.AccessPolicy(\"workspace_policy\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_workspace.identity.tenant_id,\n object_id=example_workspace.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ])\nexample_workspace_key = azure.synapse.WorkspaceKey(\"example\",\n customer_managed_key_versionless_id=example_key.versionless_id,\n synapse_workspace_id=example_workspace.id,\n active=True,\n customer_managed_key_name=\"enckey\",\n opts = pulumi.ResourceOptions(depends_on=[workspace_policy]))\nexample_workspace_aad_admin = azure.synapse.WorkspaceAadAdmin(\"example\",\n synapse_workspace_id=example_workspace.id,\n login=\"AzureAD Admin\",\n object_id=\"00000000-0000-0000-0000-000000000000\",\n tenant_id=\"00000000-0000-0000-0000-000000000000\",\n opts = pulumi.ResourceOptions(depends_on=[example_workspace_key]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var deployer = new Azure.KeyVault.AccessPolicy(\"deployer\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspaceencryptionkey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n deployer,\n },\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n CustomerManagedKey = new Azure.Synapse.Inputs.WorkspaceCustomerManagedKeyArgs\n {\n KeyVersionlessId = exampleKey.VersionlessId,\n KeyName = \"enckey\",\n },\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n var workspacePolicy = new Azure.KeyVault.AccessPolicy(\"workspace_policy\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleWorkspace.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleWorkspace.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n });\n\n var exampleWorkspaceKey = new Azure.Synapse.WorkspaceKey(\"example\", new()\n {\n CustomerManagedKeyVersionlessId = exampleKey.VersionlessId,\n SynapseWorkspaceId = exampleWorkspace.Id,\n Active = true,\n CustomerManagedKeyName = \"enckey\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n workspacePolicy,\n },\n });\n\n var exampleWorkspaceAadAdmin = new Azure.Synapse.WorkspaceAadAdmin(\"example\", new()\n {\n SynapseWorkspaceId = exampleWorkspace.Id,\n Login = \"AzureAD Admin\",\n ObjectId = \"00000000-0000-0000-0000-000000000000\",\n TenantId = \"00000000-0000-0000-0000-000000000000\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleWorkspaceKey,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdeployer, err := keyvault.NewAccessPolicy(ctx, \"deployer\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspaceencryptionkey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdeployer,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tCustomerManagedKey: \u0026synapse.WorkspaceCustomerManagedKeyArgs{\n\t\t\t\tKeyVersionlessId: exampleKey.VersionlessId,\n\t\t\t\tKeyName: pulumi.String(\"enckey\"),\n\t\t\t},\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tworkspacePolicy, err := keyvault.NewAccessPolicy(ctx, \"workspace_policy\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleWorkspace.Identity.ApplyT(func(identity synapse.WorkspaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleWorkspace.Identity.ApplyT(func(identity synapse.WorkspaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspaceKey, err := synapse.NewWorkspaceKey(ctx, \"example\", \u0026synapse.WorkspaceKeyArgs{\n\t\t\tCustomerManagedKeyVersionlessId: exampleKey.VersionlessId,\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tActive: pulumi.Bool(true),\n\t\t\tCustomerManagedKeyName: pulumi.String(\"enckey\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tworkspacePolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspaceAadAdmin(ctx, \"example\", \u0026synapse.WorkspaceAadAdminArgs{\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLogin: pulumi.String(\"AzureAD Admin\"),\n\t\t\tObjectId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tTenantId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleWorkspaceKey,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceCustomerManagedKeyArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.WorkspaceKey;\nimport com.pulumi.azure.synapse.WorkspaceKeyArgs;\nimport com.pulumi.azure.synapse.WorkspaceAadAdmin;\nimport com.pulumi.azure.synapse.WorkspaceAadAdminArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var deployer = new AccessPolicy(\"deployer\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspaceencryptionkey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(deployer)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .customerManagedKey(WorkspaceCustomerManagedKeyArgs.builder()\n .keyVersionlessId(exampleKey.versionlessId())\n .keyName(\"enckey\")\n .build())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n var workspacePolicy = new AccessPolicy(\"workspacePolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleWorkspace.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleWorkspace.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build());\n\n var exampleWorkspaceKey = new WorkspaceKey(\"exampleWorkspaceKey\", WorkspaceKeyArgs.builder()\n .customerManagedKeyVersionlessId(exampleKey.versionlessId())\n .synapseWorkspaceId(exampleWorkspace.id())\n .active(true)\n .customerManagedKeyName(\"enckey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(workspacePolicy)\n .build());\n\n var exampleWorkspaceAadAdmin = new WorkspaceAadAdmin(\"exampleWorkspaceAadAdmin\", WorkspaceAadAdminArgs.builder()\n .synapseWorkspaceId(exampleWorkspace.id())\n .login(\"AzureAD Admin\")\n .objectId(\"00000000-0000-0000-0000-000000000000\")\n .tenantId(\"00000000-0000-0000-0000-000000000000\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleWorkspaceKey)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n deployer:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspaceencryptionkey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${deployer}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n customerManagedKey:\n keyVersionlessId: ${exampleKey.versionlessId}\n keyName: enckey\n identity:\n type: SystemAssigned\n tags:\n Env: production\n workspacePolicy:\n type: azure:keyvault:AccessPolicy\n name: workspace_policy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleWorkspace.identity.tenantId}\n objectId: ${exampleWorkspace.identity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleWorkspaceKey:\n type: azure:synapse:WorkspaceKey\n name: example\n properties:\n customerManagedKeyVersionlessId: ${exampleKey.versionlessId}\n synapseWorkspaceId: ${exampleWorkspace.id}\n active: true\n customerManagedKeyName: enckey\n options:\n dependson:\n - ${workspacePolicy}\n exampleWorkspaceAadAdmin:\n type: azure:synapse:WorkspaceAadAdmin\n name: example\n properties:\n synapseWorkspaceId: ${exampleWorkspace.id}\n login: AzureAD Admin\n objectId: 00000000-0000-0000-0000-000000000000\n tenantId: 00000000-0000-0000-0000-000000000000\n options:\n dependson:\n - ${exampleWorkspaceKey}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Workspace can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/workspace:Workspace example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1\n```\n\n", "properties": { "azureDevopsRepo": { "$ref": "#/types/azure:synapse/WorkspaceAzureDevopsRepo:WorkspaceAzureDevopsRepo", @@ -262261,7 +262261,7 @@ } }, "azure:synapse/workspaceAadAdmin:WorkspaceAadAdmin": { - "description": "Manages an Azure Active Directory Administrator setting for a Synapse Workspace\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst deployer = new azure.keyvault.AccessPolicy(\"deployer\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspace-encryption-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [deployer],\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\nconst exampleWorkspaceAadAdmin = new azure.synapse.WorkspaceAadAdmin(\"example\", {\n synapseWorkspaceId: exampleWorkspace.id,\n login: \"AzureAD Admin\",\n objectId: current.then(current =\u003e current.objectId),\n tenantId: current.then(current =\u003e current.tenantId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\ndeployer = azure.keyvault.AccessPolicy(\"deployer\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspace-encryption-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[deployer]))\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\nexample_workspace_aad_admin = azure.synapse.WorkspaceAadAdmin(\"example\",\n synapse_workspace_id=example_workspace.id,\n login=\"AzureAD Admin\",\n object_id=current.object_id,\n tenant_id=current.tenant_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var deployer = new Azure.KeyVault.AccessPolicy(\"deployer\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspace-encryption-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n deployer,\n },\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n var exampleWorkspaceAadAdmin = new Azure.Synapse.WorkspaceAadAdmin(\"example\", new()\n {\n SynapseWorkspaceId = exampleWorkspace.Id,\n Login = \"AzureAD Admin\",\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdeployer, err := keyvault.NewAccessPolicy(ctx, \"deployer\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspace-encryption-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdeployer,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspaceAadAdmin(ctx, \"example\", \u0026synapse.WorkspaceAadAdminArgs{\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLogin: pulumi.String(\"AzureAD Admin\"),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.WorkspaceAadAdmin;\nimport com.pulumi.azure.synapse.WorkspaceAadAdminArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var deployer = new AccessPolicy(\"deployer\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspace-encryption-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(deployer)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n var exampleWorkspaceAadAdmin = new WorkspaceAadAdmin(\"exampleWorkspaceAadAdmin\", WorkspaceAadAdminArgs.builder()\n .synapseWorkspaceId(exampleWorkspace.id())\n .login(\"AzureAD Admin\")\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n deployer:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspace-encryption-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${deployer}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n tags:\n Env: production\n exampleWorkspaceAadAdmin:\n type: azure:synapse:WorkspaceAadAdmin\n name: example\n properties:\n synapseWorkspaceId: ${exampleWorkspace.id}\n login: AzureAD Admin\n objectId: ${current.objectId}\n tenantId: ${current.tenantId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Workspace Azure AD Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/workspaceAadAdmin:WorkspaceAadAdmin example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Synapse/workspaces/workspace1/administrators/activeDirectory\n```\n\n", + "description": "Manages an Azure Active Directory Administrator setting for a Synapse Workspace\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst deployer = new azure.keyvault.AccessPolicy(\"deployer\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspace-encryption-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [deployer],\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\nconst exampleWorkspaceAadAdmin = new azure.synapse.WorkspaceAadAdmin(\"example\", {\n synapseWorkspaceId: exampleWorkspace.id,\n login: \"AzureAD Admin\",\n objectId: current.then(current =\u003e current.objectId),\n tenantId: current.then(current =\u003e current.tenantId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\ndeployer = azure.keyvault.AccessPolicy(\"deployer\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspace-encryption-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[deployer]))\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\nexample_workspace_aad_admin = azure.synapse.WorkspaceAadAdmin(\"example\",\n synapse_workspace_id=example_workspace.id,\n login=\"AzureAD Admin\",\n object_id=current.object_id,\n tenant_id=current.tenant_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var deployer = new Azure.KeyVault.AccessPolicy(\"deployer\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspace-encryption-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n deployer,\n },\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n var exampleWorkspaceAadAdmin = new Azure.Synapse.WorkspaceAadAdmin(\"example\", new()\n {\n SynapseWorkspaceId = exampleWorkspace.Id,\n Login = \"AzureAD Admin\",\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdeployer, err := keyvault.NewAccessPolicy(ctx, \"deployer\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspace-encryption-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdeployer,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspaceAadAdmin(ctx, \"example\", \u0026synapse.WorkspaceAadAdminArgs{\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLogin: pulumi.String(\"AzureAD Admin\"),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.WorkspaceAadAdmin;\nimport com.pulumi.azure.synapse.WorkspaceAadAdminArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var deployer = new AccessPolicy(\"deployer\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspace-encryption-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(deployer)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n var exampleWorkspaceAadAdmin = new WorkspaceAadAdmin(\"exampleWorkspaceAadAdmin\", WorkspaceAadAdminArgs.builder()\n .synapseWorkspaceId(exampleWorkspace.id())\n .login(\"AzureAD Admin\")\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n deployer:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspace-encryption-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${deployer}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n tags:\n Env: production\n exampleWorkspaceAadAdmin:\n type: azure:synapse:WorkspaceAadAdmin\n name: example\n properties:\n synapseWorkspaceId: ${exampleWorkspace.id}\n login: AzureAD Admin\n objectId: ${current.objectId}\n tenantId: ${current.tenantId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Workspace Azure AD Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/workspaceAadAdmin:WorkspaceAadAdmin example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Synapse/workspaces/workspace1/administrators/activeDirectory\n```\n\n", "properties": { "login": { "type": "string", @@ -262430,7 +262430,7 @@ } }, "azure:synapse/workspaceKey:WorkspaceKey": { - "description": "Manages Synapse Workspace keys\n\n\u003e **Note:** Keys that are actively protecting a workspace cannot be deleted. When the keys resource is deleted, if the key is inactive it will be deleted, if it is active it will not be deleted.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst deployer = new azure.keyvault.AccessPolicy(\"deployer\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspaceEncryptionKey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [deployer],\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n customerManagedKey: {\n keyVersionlessId: exampleKey.versionlessId,\n keyName: \"enckey\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\nconst workspacePolicy = new azure.keyvault.AccessPolicy(\"workspace_policy\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleWorkspace.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleWorkspace.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n});\nconst exampleWorkspaceKey = new azure.synapse.WorkspaceKey(\"example\", {\n customerManagedKeyVersionlessId: exampleKey.versionlessId,\n synapseWorkspaceId: exampleWorkspace.id,\n active: true,\n customerManagedKeyName: \"enckey\",\n}, {\n dependsOn: [workspacePolicy],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\ndeployer = azure.keyvault.AccessPolicy(\"deployer\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspaceEncryptionKey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[deployer]))\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n customer_managed_key={\n \"key_versionless_id\": example_key.versionless_id,\n \"key_name\": \"enckey\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\nworkspace_policy = azure.keyvault.AccessPolicy(\"workspace_policy\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_workspace.identity.tenant_id,\n object_id=example_workspace.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ])\nexample_workspace_key = azure.synapse.WorkspaceKey(\"example\",\n customer_managed_key_versionless_id=example_key.versionless_id,\n synapse_workspace_id=example_workspace.id,\n active=True,\n customer_managed_key_name=\"enckey\",\n opts = pulumi.ResourceOptions(depends_on=[workspace_policy]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var deployer = new Azure.KeyVault.AccessPolicy(\"deployer\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspaceEncryptionKey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n deployer,\n },\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n CustomerManagedKey = new Azure.Synapse.Inputs.WorkspaceCustomerManagedKeyArgs\n {\n KeyVersionlessId = exampleKey.VersionlessId,\n KeyName = \"enckey\",\n },\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n var workspacePolicy = new Azure.KeyVault.AccessPolicy(\"workspace_policy\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleWorkspace.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleWorkspace.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n });\n\n var exampleWorkspaceKey = new Azure.Synapse.WorkspaceKey(\"example\", new()\n {\n CustomerManagedKeyVersionlessId = exampleKey.VersionlessId,\n SynapseWorkspaceId = exampleWorkspace.Id,\n Active = true,\n CustomerManagedKeyName = \"enckey\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n workspacePolicy,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdeployer, err := keyvault.NewAccessPolicy(ctx, \"deployer\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspaceEncryptionKey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdeployer,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tCustomerManagedKey: \u0026synapse.WorkspaceCustomerManagedKeyArgs{\n\t\t\t\tKeyVersionlessId: exampleKey.VersionlessId,\n\t\t\t\tKeyName: pulumi.String(\"enckey\"),\n\t\t\t},\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tworkspacePolicy, err := keyvault.NewAccessPolicy(ctx, \"workspace_policy\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleWorkspace.Identity.ApplyT(func(identity synapse.WorkspaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleWorkspace.Identity.ApplyT(func(identity synapse.WorkspaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspaceKey(ctx, \"example\", \u0026synapse.WorkspaceKeyArgs{\n\t\t\tCustomerManagedKeyVersionlessId: exampleKey.VersionlessId,\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tActive: pulumi.Bool(true),\n\t\t\tCustomerManagedKeyName: pulumi.String(\"enckey\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tworkspacePolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceCustomerManagedKeyArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.WorkspaceKey;\nimport com.pulumi.azure.synapse.WorkspaceKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var deployer = new AccessPolicy(\"deployer\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspaceEncryptionKey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(deployer)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .customerManagedKey(WorkspaceCustomerManagedKeyArgs.builder()\n .keyVersionlessId(exampleKey.versionlessId())\n .keyName(\"enckey\")\n .build())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n var workspacePolicy = new AccessPolicy(\"workspacePolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleWorkspace.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleWorkspace.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build());\n\n var exampleWorkspaceKey = new WorkspaceKey(\"exampleWorkspaceKey\", WorkspaceKeyArgs.builder()\n .customerManagedKeyVersionlessId(exampleKey.versionlessId())\n .synapseWorkspaceId(exampleWorkspace.id())\n .active(true)\n .customerManagedKeyName(\"enckey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(workspacePolicy)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n deployer:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspaceEncryptionKey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${deployer}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n customerManagedKey:\n keyVersionlessId: ${exampleKey.versionlessId}\n keyName: enckey\n identity:\n type: SystemAssigned\n tags:\n Env: production\n workspacePolicy:\n type: azure:keyvault:AccessPolicy\n name: workspace_policy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleWorkspace.identity.tenantId}\n objectId: ${exampleWorkspace.identity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleWorkspaceKey:\n type: azure:synapse:WorkspaceKey\n name: example\n properties:\n customerManagedKeyVersionlessId: ${exampleKey.versionlessId}\n synapseWorkspaceId: ${exampleWorkspace.id}\n active: true\n customerManagedKeyName: enckey\n options:\n dependson:\n - ${workspacePolicy}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Workspace Keys can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/workspaceKey:WorkspaceKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1/keys/key1\n```\n\n", + "description": "Manages Synapse Workspace keys\n\n\u003e **Note:** Keys that are actively protecting a workspace cannot be deleted. When the keys resource is deleted, if the key is inactive it will be deleted, if it is active it will not be deleted.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst deployer = new azure.keyvault.AccessPolicy(\"deployer\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspaceEncryptionKey\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [deployer],\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n customerManagedKey: {\n keyVersionlessId: exampleKey.versionlessId,\n keyName: \"enckey\",\n },\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\nconst workspacePolicy = new azure.keyvault.AccessPolicy(\"workspace_policy\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: exampleWorkspace.identity.apply(identity =\u003e identity?.tenantId),\n objectId: exampleWorkspace.identity.apply(identity =\u003e identity?.principalId),\n keyPermissions: [\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ],\n});\nconst exampleWorkspaceKey = new azure.synapse.WorkspaceKey(\"example\", {\n customerManagedKeyVersionlessId: exampleKey.versionlessId,\n synapseWorkspaceId: exampleWorkspace.id,\n active: true,\n customerManagedKeyName: \"enckey\",\n}, {\n dependsOn: [workspacePolicy],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\ndeployer = azure.keyvault.AccessPolicy(\"deployer\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspaceEncryptionKey\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[deployer]))\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n customer_managed_key={\n \"key_versionless_id\": example_key.versionless_id,\n \"key_name\": \"enckey\",\n },\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\nworkspace_policy = azure.keyvault.AccessPolicy(\"workspace_policy\",\n key_vault_id=example_key_vault.id,\n tenant_id=example_workspace.identity.tenant_id,\n object_id=example_workspace.identity.principal_id,\n key_permissions=[\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n ])\nexample_workspace_key = azure.synapse.WorkspaceKey(\"example\",\n customer_managed_key_versionless_id=example_key.versionless_id,\n synapse_workspace_id=example_workspace.id,\n active=True,\n customer_managed_key_name=\"enckey\",\n opts = pulumi.ResourceOptions(depends_on=[workspace_policy]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var deployer = new Azure.KeyVault.AccessPolicy(\"deployer\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspaceEncryptionKey\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n deployer,\n },\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n CustomerManagedKey = new Azure.Synapse.Inputs.WorkspaceCustomerManagedKeyArgs\n {\n KeyVersionlessId = exampleKey.VersionlessId,\n KeyName = \"enckey\",\n },\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n var workspacePolicy = new Azure.KeyVault.AccessPolicy(\"workspace_policy\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = exampleWorkspace.Identity.Apply(identity =\u003e identity?.TenantId),\n ObjectId = exampleWorkspace.Identity.Apply(identity =\u003e identity?.PrincipalId),\n KeyPermissions = new[]\n {\n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\",\n },\n });\n\n var exampleWorkspaceKey = new Azure.Synapse.WorkspaceKey(\"example\", new()\n {\n CustomerManagedKeyVersionlessId = exampleKey.VersionlessId,\n SynapseWorkspaceId = exampleWorkspace.Id,\n Active = true,\n CustomerManagedKeyName = \"enckey\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n workspacePolicy,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdeployer, err := keyvault.NewAccessPolicy(ctx, \"deployer\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKey, err := keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspaceEncryptionKey\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdeployer,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tCustomerManagedKey: \u0026synapse.WorkspaceCustomerManagedKeyArgs{\n\t\t\t\tKeyVersionlessId: exampleKey.VersionlessId,\n\t\t\t\tKeyName: pulumi.String(\"enckey\"),\n\t\t\t},\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tworkspacePolicy, err := keyvault.NewAccessPolicy(ctx, \"workspace_policy\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(exampleWorkspace.Identity.ApplyT(func(identity synapse.WorkspaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.TenantId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tObjectId: pulumi.String(exampleWorkspace.Identity.ApplyT(func(identity synapse.WorkspaceIdentity) (*string, error) {\n\t\t\t\treturn \u0026identity.PrincipalId, nil\n\t\t\t}).(pulumi.StringPtrOutput)),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"WrapKey\"),\n\t\t\t\tpulumi.String(\"UnwrapKey\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspaceKey(ctx, \"example\", \u0026synapse.WorkspaceKeyArgs{\n\t\t\tCustomerManagedKeyVersionlessId: exampleKey.VersionlessId,\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tActive: pulumi.Bool(true),\n\t\t\tCustomerManagedKeyName: pulumi.String(\"enckey\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tworkspacePolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceCustomerManagedKeyArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.WorkspaceKey;\nimport com.pulumi.azure.synapse.WorkspaceKeyArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var deployer = new AccessPolicy(\"deployer\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspaceEncryptionKey\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(deployer)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .customerManagedKey(WorkspaceCustomerManagedKeyArgs.builder()\n .keyVersionlessId(exampleKey.versionlessId())\n .keyName(\"enckey\")\n .build())\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n var workspacePolicy = new AccessPolicy(\"workspacePolicy\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(exampleWorkspace.identity().applyValue(identity -\u003e identity.tenantId()))\n .objectId(exampleWorkspace.identity().applyValue(identity -\u003e identity.principalId()))\n .keyPermissions( \n \"Get\",\n \"WrapKey\",\n \"UnwrapKey\")\n .build());\n\n var exampleWorkspaceKey = new WorkspaceKey(\"exampleWorkspaceKey\", WorkspaceKeyArgs.builder()\n .customerManagedKeyVersionlessId(exampleKey.versionlessId())\n .synapseWorkspaceId(exampleWorkspace.id())\n .active(true)\n .customerManagedKeyName(\"enckey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(workspacePolicy)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n deployer:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspaceEncryptionKey\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${deployer}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n customerManagedKey:\n keyVersionlessId: ${exampleKey.versionlessId}\n keyName: enckey\n identity:\n type: SystemAssigned\n tags:\n Env: production\n workspacePolicy:\n type: azure:keyvault:AccessPolicy\n name: workspace_policy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${exampleWorkspace.identity.tenantId}\n objectId: ${exampleWorkspace.identity.principalId}\n keyPermissions:\n - Get\n - WrapKey\n - UnwrapKey\n exampleWorkspaceKey:\n type: azure:synapse:WorkspaceKey\n name: example\n properties:\n customerManagedKeyVersionlessId: ${exampleKey.versionlessId}\n synapseWorkspaceId: ${exampleWorkspace.id}\n active: true\n customerManagedKeyName: enckey\n options:\n dependson:\n - ${workspacePolicy}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Workspace Keys can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/workspaceKey:WorkspaceKey example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1/keys/key1\n```\n\n", "properties": { "active": { "type": "boolean", @@ -262641,7 +262641,7 @@ } }, "azure:synapse/workspaceSqlAadAdmin:WorkspaceSqlAadAdmin": { - "description": "Manages an Azure Active Directory SQL Administrator setting for a Synapse Workspace\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst deployer = new azure.keyvault.AccessPolicy(\"deployer\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspace-encryption-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [deployer],\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\nconst exampleWorkspaceSqlAadAdmin = new azure.synapse.WorkspaceSqlAadAdmin(\"example\", {\n synapseWorkspaceId: exampleWorkspace.id,\n login: \"AzureAD Admin\",\n objectId: current.then(current =\u003e current.objectId),\n tenantId: current.then(current =\u003e current.tenantId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\ndeployer = azure.keyvault.AccessPolicy(\"deployer\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspace-encryption-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[deployer]))\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\nexample_workspace_sql_aad_admin = azure.synapse.WorkspaceSqlAadAdmin(\"example\",\n synapse_workspace_id=example_workspace.id,\n login=\"AzureAD Admin\",\n object_id=current.object_id,\n tenant_id=current.tenant_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var deployer = new Azure.KeyVault.AccessPolicy(\"deployer\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspace-encryption-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n deployer,\n },\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n var exampleWorkspaceSqlAadAdmin = new Azure.Synapse.WorkspaceSqlAadAdmin(\"example\", new()\n {\n SynapseWorkspaceId = exampleWorkspace.Id,\n Login = \"AzureAD Admin\",\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdeployer, err := keyvault.NewAccessPolicy(ctx, \"deployer\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspace-encryption-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdeployer,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspaceSqlAadAdmin(ctx, \"example\", \u0026synapse.WorkspaceSqlAadAdminArgs{\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLogin: pulumi.String(\"AzureAD Admin\"),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.WorkspaceSqlAadAdmin;\nimport com.pulumi.azure.synapse.WorkspaceSqlAadAdminArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var deployer = new AccessPolicy(\"deployer\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspace-encryption-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(deployer)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n var exampleWorkspaceSqlAadAdmin = new WorkspaceSqlAadAdmin(\"exampleWorkspaceSqlAadAdmin\", WorkspaceSqlAadAdminArgs.builder()\n .synapseWorkspaceId(exampleWorkspace.id())\n .login(\"AzureAD Admin\")\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n deployer:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspace-encryption-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${deployer}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n tags:\n Env: production\n exampleWorkspaceSqlAadAdmin:\n type: azure:synapse:WorkspaceSqlAadAdmin\n name: example\n properties:\n synapseWorkspaceId: ${exampleWorkspace.id}\n login: AzureAD Admin\n objectId: ${current.objectId}\n tenantId: ${current.tenantId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Workspace Azure AD Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/workspaceSqlAadAdmin:WorkspaceSqlAadAdmin example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Synapse/workspaces/workspace1/sqlAdministrators/activeDirectory\n```\n\n", + "description": "Manages an Azure Active Directory SQL Administrator setting for a Synapse Workspace\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleAccount = new azure.storage.Account(\"example\", {\n name: \"examplestorageacc\",\n resourceGroupName: example.name,\n location: example.location,\n accountTier: \"Standard\",\n accountReplicationType: \"LRS\",\n accountKind: \"StorageV2\",\n isHnsEnabled: true,\n});\nconst exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem(\"example\", {\n name: \"example\",\n storageAccountId: exampleAccount.id,\n});\nconst current = azure.core.getClientConfig({});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"example\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n purgeProtectionEnabled: true,\n});\nconst deployer = new azure.keyvault.AccessPolicy(\"deployer\", {\n keyVaultId: exampleKeyVault.id,\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n keyPermissions: [\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ],\n});\nconst exampleKey = new azure.keyvault.Key(\"example\", {\n name: \"workspace-encryption-key\",\n keyVaultId: exampleKeyVault.id,\n keyType: \"RSA\",\n keySize: 2048,\n keyOpts: [\n \"unwrapKey\",\n \"wrapKey\",\n ],\n}, {\n dependsOn: [deployer],\n});\nconst exampleWorkspace = new azure.synapse.Workspace(\"example\", {\n name: \"example\",\n resourceGroupName: example.name,\n location: example.location,\n storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,\n sqlAdministratorLogin: \"sqladminuser\",\n sqlAdministratorLoginPassword: \"H@Sh1CoR3!\",\n identity: {\n type: \"SystemAssigned\",\n },\n tags: {\n Env: \"production\",\n },\n});\nconst exampleWorkspaceSqlAadAdmin = new azure.synapse.WorkspaceSqlAadAdmin(\"example\", {\n synapseWorkspaceId: exampleWorkspace.id,\n login: \"AzureAD Admin\",\n objectId: current.then(current =\u003e current.objectId),\n tenantId: current.then(current =\u003e current.tenantId),\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_account = azure.storage.Account(\"example\",\n name=\"examplestorageacc\",\n resource_group_name=example.name,\n location=example.location,\n account_tier=\"Standard\",\n account_replication_type=\"LRS\",\n account_kind=\"StorageV2\",\n is_hns_enabled=True)\nexample_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem(\"example\",\n name=\"example\",\n storage_account_id=example_account.id)\ncurrent = azure.core.get_client_config()\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"example\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n purge_protection_enabled=True)\ndeployer = azure.keyvault.AccessPolicy(\"deployer\",\n key_vault_id=example_key_vault.id,\n tenant_id=current.tenant_id,\n object_id=current.object_id,\n key_permissions=[\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n ])\nexample_key = azure.keyvault.Key(\"example\",\n name=\"workspace-encryption-key\",\n key_vault_id=example_key_vault.id,\n key_type=\"RSA\",\n key_size=2048,\n key_opts=[\n \"unwrapKey\",\n \"wrapKey\",\n ],\n opts = pulumi.ResourceOptions(depends_on=[deployer]))\nexample_workspace = azure.synapse.Workspace(\"example\",\n name=\"example\",\n resource_group_name=example.name,\n location=example.location,\n storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,\n sql_administrator_login=\"sqladminuser\",\n sql_administrator_login_password=\"H@Sh1CoR3!\",\n identity={\n \"type\": \"SystemAssigned\",\n },\n tags={\n \"Env\": \"production\",\n })\nexample_workspace_sql_aad_admin = azure.synapse.WorkspaceSqlAadAdmin(\"example\",\n synapse_workspace_id=example_workspace.id,\n login=\"AzureAD Admin\",\n object_id=current.object_id,\n tenant_id=current.tenant_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleAccount = new Azure.Storage.Account(\"example\", new()\n {\n Name = \"examplestorageacc\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n AccountTier = \"Standard\",\n AccountReplicationType = \"LRS\",\n AccountKind = \"StorageV2\",\n IsHnsEnabled = true,\n });\n\n var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem(\"example\", new()\n {\n Name = \"example\",\n StorageAccountId = exampleAccount.Id,\n });\n\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"example\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n PurgeProtectionEnabled = true,\n });\n\n var deployer = new Azure.KeyVault.AccessPolicy(\"deployer\", new()\n {\n KeyVaultId = exampleKeyVault.Id,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n KeyPermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\",\n },\n });\n\n var exampleKey = new Azure.KeyVault.Key(\"example\", new()\n {\n Name = \"workspace-encryption-key\",\n KeyVaultId = exampleKeyVault.Id,\n KeyType = \"RSA\",\n KeySize = 2048,\n KeyOpts = new[]\n {\n \"unwrapKey\",\n \"wrapKey\",\n },\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n deployer,\n },\n });\n\n var exampleWorkspace = new Azure.Synapse.Workspace(\"example\", new()\n {\n Name = \"example\",\n ResourceGroupName = example.Name,\n Location = example.Location,\n StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,\n SqlAdministratorLogin = \"sqladminuser\",\n SqlAdministratorLoginPassword = \"H@Sh1CoR3!\",\n Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs\n {\n Type = \"SystemAssigned\",\n },\n Tags = \n {\n { \"Env\", \"production\" },\n },\n });\n\n var exampleWorkspaceSqlAadAdmin = new Azure.Synapse.WorkspaceSqlAadAdmin(\"example\", new()\n {\n SynapseWorkspaceId = exampleWorkspace.Id,\n Login = \"AzureAD Admin\",\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/storage\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/synapse\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleAccount, err := storage.NewAccount(ctx, \"example\", \u0026storage.AccountArgs{\n\t\t\tName: pulumi.String(\"examplestorageacc\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tAccountTier: pulumi.String(\"Standard\"),\n\t\t\tAccountReplicationType: pulumi.String(\"LRS\"),\n\t\t\tAccountKind: pulumi.String(\"StorageV2\"),\n\t\t\tIsHnsEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, \"example\", \u0026storage.DataLakeGen2FilesystemArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tStorageAccountId: exampleAccount.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tPurgeProtectionEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdeployer, err := keyvault.NewAccessPolicy(ctx, \"deployer\", \u0026keyvault.AccessPolicyArgs{\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\tpulumi.String(\"Delete\"),\n\t\t\t\tpulumi.String(\"Purge\"),\n\t\t\t\tpulumi.String(\"GetRotationPolicy\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = keyvault.NewKey(ctx, \"example\", \u0026keyvault.KeyArgs{\n\t\t\tName: pulumi.String(\"workspace-encryption-key\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tKeyType: pulumi.String(\"RSA\"),\n\t\t\tKeySize: pulumi.Int(2048),\n\t\t\tKeyOpts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"unwrapKey\"),\n\t\t\t\tpulumi.String(\"wrapKey\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tdeployer,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWorkspace, err := synapse.NewWorkspace(ctx, \"example\", \u0026synapse.WorkspaceArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tLocation: example.Location,\n\t\t\tStorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),\n\t\t\tSqlAdministratorLogin: pulumi.String(\"sqladminuser\"),\n\t\t\tSqlAdministratorLoginPassword: pulumi.String(\"H@Sh1CoR3!\"),\n\t\t\tIdentity: \u0026synapse.WorkspaceIdentityArgs{\n\t\t\t\tType: pulumi.String(\"SystemAssigned\"),\n\t\t\t},\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"Env\": pulumi.String(\"production\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = synapse.NewWorkspaceSqlAadAdmin(ctx, \"example\", \u0026synapse.WorkspaceSqlAadAdminArgs{\n\t\t\tSynapseWorkspaceId: exampleWorkspace.ID(),\n\t\t\tLogin: pulumi.String(\"AzureAD Admin\"),\n\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.storage.Account;\nimport com.pulumi.azure.storage.AccountArgs;\nimport com.pulumi.azure.storage.DataLakeGen2Filesystem;\nimport com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.AccessPolicy;\nimport com.pulumi.azure.keyvault.AccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Key;\nimport com.pulumi.azure.keyvault.KeyArgs;\nimport com.pulumi.azure.synapse.Workspace;\nimport com.pulumi.azure.synapse.WorkspaceArgs;\nimport com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;\nimport com.pulumi.azure.synapse.WorkspaceSqlAadAdmin;\nimport com.pulumi.azure.synapse.WorkspaceSqlAadAdminArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleAccount = new Account(\"exampleAccount\", AccountArgs.builder()\n .name(\"examplestorageacc\")\n .resourceGroupName(example.name())\n .location(example.location())\n .accountTier(\"Standard\")\n .accountReplicationType(\"LRS\")\n .accountKind(\"StorageV2\")\n .isHnsEnabled(\"true\")\n .build());\n\n var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem(\"exampleDataLakeGen2Filesystem\", DataLakeGen2FilesystemArgs.builder()\n .name(\"example\")\n .storageAccountId(exampleAccount.id())\n .build());\n\n final var current = CoreFunctions.getClientConfig();\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"example\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .purgeProtectionEnabled(true)\n .build());\n\n var deployer = new AccessPolicy(\"deployer\", AccessPolicyArgs.builder()\n .keyVaultId(exampleKeyVault.id())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .keyPermissions( \n \"Create\",\n \"Get\",\n \"Delete\",\n \"Purge\",\n \"GetRotationPolicy\")\n .build());\n\n var exampleKey = new Key(\"exampleKey\", KeyArgs.builder()\n .name(\"workspace-encryption-key\")\n .keyVaultId(exampleKeyVault.id())\n .keyType(\"RSA\")\n .keySize(2048)\n .keyOpts( \n \"unwrapKey\",\n \"wrapKey\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(deployer)\n .build());\n\n var exampleWorkspace = new Workspace(\"exampleWorkspace\", WorkspaceArgs.builder()\n .name(\"example\")\n .resourceGroupName(example.name())\n .location(example.location())\n .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())\n .sqlAdministratorLogin(\"sqladminuser\")\n .sqlAdministratorLoginPassword(\"H@Sh1CoR3!\")\n .identity(WorkspaceIdentityArgs.builder()\n .type(\"SystemAssigned\")\n .build())\n .tags(Map.of(\"Env\", \"production\"))\n .build());\n\n var exampleWorkspaceSqlAadAdmin = new WorkspaceSqlAadAdmin(\"exampleWorkspaceSqlAadAdmin\", WorkspaceSqlAadAdminArgs.builder()\n .synapseWorkspaceId(exampleWorkspace.id())\n .login(\"AzureAD Admin\")\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleAccount:\n type: azure:storage:Account\n name: example\n properties:\n name: examplestorageacc\n resourceGroupName: ${example.name}\n location: ${example.location}\n accountTier: Standard\n accountReplicationType: LRS\n accountKind: StorageV2\n isHnsEnabled: 'true'\n exampleDataLakeGen2Filesystem:\n type: azure:storage:DataLakeGen2Filesystem\n name: example\n properties:\n name: example\n storageAccountId: ${exampleAccount.id}\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: example\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n purgeProtectionEnabled: true\n deployer:\n type: azure:keyvault:AccessPolicy\n properties:\n keyVaultId: ${exampleKeyVault.id}\n tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n keyPermissions:\n - Create\n - Get\n - Delete\n - Purge\n - GetRotationPolicy\n exampleKey:\n type: azure:keyvault:Key\n name: example\n properties:\n name: workspace-encryption-key\n keyVaultId: ${exampleKeyVault.id}\n keyType: RSA\n keySize: 2048\n keyOpts:\n - unwrapKey\n - wrapKey\n options:\n dependson:\n - ${deployer}\n exampleWorkspace:\n type: azure:synapse:Workspace\n name: example\n properties:\n name: example\n resourceGroupName: ${example.name}\n location: ${example.location}\n storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}\n sqlAdministratorLogin: sqladminuser\n sqlAdministratorLoginPassword: H@Sh1CoR3!\n identity:\n type: SystemAssigned\n tags:\n Env: production\n exampleWorkspaceSqlAadAdmin:\n type: azure:synapse:WorkspaceSqlAadAdmin\n name: example\n properties:\n synapseWorkspaceId: ${exampleWorkspace.id}\n login: AzureAD Admin\n objectId: ${current.objectId}\n tenantId: ${current.tenantId}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSynapse Workspace Azure AD Administrator can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:synapse/workspaceSqlAadAdmin:WorkspaceSqlAadAdmin example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Synapse/workspaces/workspace1/sqlAdministrators/activeDirectory\n```\n\n", "properties": { "login": { "type": "string", @@ -263590,7 +263590,7 @@ "deprecationMessage": "azure.trafficmanager.Profile has been deprecated in favor of azure.network.TrafficManagerProfile" }, "azure:voice/servicesCommunicationsGateway:ServicesCommunicationsGateway": { - "description": "Manages a Voice Services Communications Gateways.\n\n!\u003e **NOTE:** You must have signed an Operator Connect agreement with Microsoft to use this resource. For more information, see [`Prerequisites`](https://learn.microsoft.com/en-us/azure/communications-gateway/prepare-to-deploy#prerequisites). \n\n!\u003e **NOTE:** Access to Azure Communications Gateway is restricted, see [`Get access to Azure Communications Gateway for your Azure subscription`](https://learn.microsoft.com/en-us/azure/communications-gateway/prepare-to-deploy#9-get-access-to-azure-communications-gateway-for-your-azure-subscription) for details.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicesCommunicationsGateway = new azure.voice.ServicesCommunicationsGateway(\"example\", {\n name: \"example-vcg\",\n location: \"West Europe\",\n resourceGroupName: example.name,\n connectivity: \"PublicAddress\",\n codecs: \"PCMA\",\n e911Type: \"DirectToEsrp\",\n platforms: [\n \"OperatorConnect\",\n \"TeamsPhoneMobile\",\n ],\n serviceLocations: [\n {\n location: \"eastus\",\n allowedMediaSourceAddressPrefixes: [\"10.1.2.0/24\"],\n allowedSignalingSourceAddressPrefixes: [\"10.1.1.0/24\"],\n esrpAddresses: [\"198.51.100.3\"],\n operatorAddresses: [\"198.51.100.1\"],\n },\n {\n location: \"eastus2\",\n allowedMediaSourceAddressPrefixes: [\"10.2.2.0/24\"],\n allowedSignalingSourceAddressPrefixes: [\"10.2.1.0/24\"],\n esrpAddresses: [\"198.51.100.4\"],\n operatorAddresses: [\"198.51.100.2\"],\n },\n ],\n autoGeneratedDomainNameLabelScope: \"SubscriptionReuse\",\n apiBridge: JSON.stringify({}),\n emergencyDialStrings: [\n \"911\",\n \"933\",\n ],\n onPremMcpEnabled: false,\n tags: {\n key: \"value\",\n },\n microsoftTeamsVoicemailPilotNumber: \"1\",\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_services_communications_gateway = azure.voice.ServicesCommunicationsGateway(\"example\",\n name=\"example-vcg\",\n location=\"West Europe\",\n resource_group_name=example.name,\n connectivity=\"PublicAddress\",\n codecs=\"PCMA\",\n e911_type=\"DirectToEsrp\",\n platforms=[\n \"OperatorConnect\",\n \"TeamsPhoneMobile\",\n ],\n service_locations=[\n {\n \"location\": \"eastus\",\n \"allowed_media_source_address_prefixes\": [\"10.1.2.0/24\"],\n \"allowed_signaling_source_address_prefixes\": [\"10.1.1.0/24\"],\n \"esrp_addresses\": [\"198.51.100.3\"],\n \"operator_addresses\": [\"198.51.100.1\"],\n },\n {\n \"location\": \"eastus2\",\n \"allowed_media_source_address_prefixes\": [\"10.2.2.0/24\"],\n \"allowed_signaling_source_address_prefixes\": [\"10.2.1.0/24\"],\n \"esrp_addresses\": [\"198.51.100.4\"],\n \"operator_addresses\": [\"198.51.100.2\"],\n },\n ],\n auto_generated_domain_name_label_scope=\"SubscriptionReuse\",\n api_bridge=json.dumps({}),\n emergency_dial_strings=[\n \"911\",\n \"933\",\n ],\n on_prem_mcp_enabled=False,\n tags={\n \"key\": \"value\",\n },\n microsoft_teams_voicemail_pilot_number=\"1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicesCommunicationsGateway = new Azure.Voice.ServicesCommunicationsGateway(\"example\", new()\n {\n Name = \"example-vcg\",\n Location = \"West Europe\",\n ResourceGroupName = example.Name,\n Connectivity = \"PublicAddress\",\n Codecs = \"PCMA\",\n E911Type = \"DirectToEsrp\",\n Platforms = new[]\n {\n \"OperatorConnect\",\n \"TeamsPhoneMobile\",\n },\n ServiceLocations = new[]\n {\n new Azure.Voice.Inputs.ServicesCommunicationsGatewayServiceLocationArgs\n {\n Location = \"eastus\",\n AllowedMediaSourceAddressPrefixes = new[]\n {\n \"10.1.2.0/24\",\n },\n AllowedSignalingSourceAddressPrefixes = new[]\n {\n \"10.1.1.0/24\",\n },\n EsrpAddresses = new[]\n {\n \"198.51.100.3\",\n },\n OperatorAddresses = new[]\n {\n \"198.51.100.1\",\n },\n },\n new Azure.Voice.Inputs.ServicesCommunicationsGatewayServiceLocationArgs\n {\n Location = \"eastus2\",\n AllowedMediaSourceAddressPrefixes = new[]\n {\n \"10.2.2.0/24\",\n },\n AllowedSignalingSourceAddressPrefixes = new[]\n {\n \"10.2.1.0/24\",\n },\n EsrpAddresses = new[]\n {\n \"198.51.100.4\",\n },\n OperatorAddresses = new[]\n {\n \"198.51.100.2\",\n },\n },\n },\n AutoGeneratedDomainNameLabelScope = \"SubscriptionReuse\",\n ApiBridge = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n }),\n EmergencyDialStrings = new[]\n {\n \"911\",\n \"933\",\n },\n OnPremMcpEnabled = false,\n Tags = \n {\n { \"key\", \"value\" },\n },\n MicrosoftTeamsVoicemailPilotNumber = \"1\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/voice\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = voice.NewServicesCommunicationsGateway(ctx, \"example\", \u0026voice.ServicesCommunicationsGatewayArgs{\n\t\t\tName: pulumi.String(\"example-vcg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tConnectivity: pulumi.String(\"PublicAddress\"),\n\t\t\tCodecs: pulumi.String(\"PCMA\"),\n\t\t\tE911Type: pulumi.String(\"DirectToEsrp\"),\n\t\t\tPlatforms: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"OperatorConnect\"),\n\t\t\t\tpulumi.String(\"TeamsPhoneMobile\"),\n\t\t\t},\n\t\t\tServiceLocations: voice.ServicesCommunicationsGatewayServiceLocationArray{\n\t\t\t\t\u0026voice.ServicesCommunicationsGatewayServiceLocationArgs{\n\t\t\t\t\tLocation: pulumi.String(\"eastus\"),\n\t\t\t\t\tAllowedMediaSourceAddressPrefixes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"10.1.2.0/24\"),\n\t\t\t\t\t},\n\t\t\t\t\tAllowedSignalingSourceAddressPrefixes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"10.1.1.0/24\"),\n\t\t\t\t\t},\n\t\t\t\t\tEsrpAddresses: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"198.51.100.3\"),\n\t\t\t\t\t},\n\t\t\t\t\tOperatorAddresses: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"198.51.100.1\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026voice.ServicesCommunicationsGatewayServiceLocationArgs{\n\t\t\t\t\tLocation: pulumi.String(\"eastus2\"),\n\t\t\t\t\tAllowedMediaSourceAddressPrefixes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"10.2.2.0/24\"),\n\t\t\t\t\t},\n\t\t\t\t\tAllowedSignalingSourceAddressPrefixes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"10.2.1.0/24\"),\n\t\t\t\t\t},\n\t\t\t\t\tEsrpAddresses: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"198.51.100.4\"),\n\t\t\t\t\t},\n\t\t\t\t\tOperatorAddresses: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"198.51.100.2\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAutoGeneratedDomainNameLabelScope: pulumi.String(\"SubscriptionReuse\"),\n\t\t\tApiBridge: pulumi.String(json0),\n\t\t\tEmergencyDialStrings: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"911\"),\n\t\t\t\tpulumi.String(\"933\"),\n\t\t\t},\n\t\t\tOnPremMcpEnabled: pulumi.Bool(false),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"key\": pulumi.String(\"value\"),\n\t\t\t},\n\t\t\tMicrosoftTeamsVoicemailPilotNumber: pulumi.String(\"1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.voice.ServicesCommunicationsGateway;\nimport com.pulumi.azure.voice.ServicesCommunicationsGatewayArgs;\nimport com.pulumi.azure.voice.inputs.ServicesCommunicationsGatewayServiceLocationArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicesCommunicationsGateway = new ServicesCommunicationsGateway(\"exampleServicesCommunicationsGateway\", ServicesCommunicationsGatewayArgs.builder()\n .name(\"example-vcg\")\n .location(\"West Europe\")\n .resourceGroupName(example.name())\n .connectivity(\"PublicAddress\")\n .codecs(\"PCMA\")\n .e911Type(\"DirectToEsrp\")\n .platforms( \n \"OperatorConnect\",\n \"TeamsPhoneMobile\")\n .serviceLocations( \n ServicesCommunicationsGatewayServiceLocationArgs.builder()\n .location(\"eastus\")\n .allowedMediaSourceAddressPrefixes(\"10.1.2.0/24\")\n .allowedSignalingSourceAddressPrefixes(\"10.1.1.0/24\")\n .esrpAddresses(\"198.51.100.3\")\n .operatorAddresses(\"198.51.100.1\")\n .build(),\n ServicesCommunicationsGatewayServiceLocationArgs.builder()\n .location(\"eastus2\")\n .allowedMediaSourceAddressPrefixes(\"10.2.2.0/24\")\n .allowedSignalingSourceAddressPrefixes(\"10.2.1.0/24\")\n .esrpAddresses(\"198.51.100.4\")\n .operatorAddresses(\"198.51.100.2\")\n .build())\n .autoGeneratedDomainNameLabelScope(\"SubscriptionReuse\")\n .apiBridge(serializeJson(\n jsonObject(\n\n )))\n .emergencyDialStrings( \n \"911\",\n \"933\")\n .onPremMcpEnabled(false)\n .tags(Map.of(\"key\", \"value\"))\n .microsoftTeamsVoicemailPilotNumber(\"1\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicesCommunicationsGateway:\n type: azure:voice:ServicesCommunicationsGateway\n name: example\n properties:\n name: example-vcg\n location: West Europe\n resourceGroupName: ${example.name}\n connectivity: PublicAddress\n codecs: PCMA\n e911Type: DirectToEsrp\n platforms:\n - OperatorConnect\n - TeamsPhoneMobile\n serviceLocations:\n - location: eastus\n allowedMediaSourceAddressPrefixes:\n - 10.1.2.0/24\n allowedSignalingSourceAddressPrefixes:\n - 10.1.1.0/24\n esrpAddresses:\n - 198.51.100.3\n operatorAddresses:\n - 198.51.100.1\n - location: eastus2\n allowedMediaSourceAddressPrefixes:\n - 10.2.2.0/24\n allowedSignalingSourceAddressPrefixes:\n - 10.2.1.0/24\n esrpAddresses:\n - 198.51.100.4\n operatorAddresses:\n - 198.51.100.2\n autoGeneratedDomainNameLabelScope: SubscriptionReuse\n apiBridge:\n fn::toJSON: {}\n emergencyDialStrings:\n - '911'\n - '933'\n onPremMcpEnabled: false\n tags:\n key: value\n microsoftTeamsVoicemailPilotNumber: '1'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nVoice Services Communications Gateways can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:voice/servicesCommunicationsGateway:ServicesCommunicationsGateway example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.VoiceServices/communicationsGateways/communicationsGateway1\n```\n\n", + "description": "Manages a Voice Services Communications Gateways.\n\n!\u003e **NOTE:** You must have signed an Operator Connect agreement with Microsoft to use this resource. For more information, see [`Prerequisites`](https://learn.microsoft.com/en-us/azure/communications-gateway/prepare-to-deploy#prerequisites). \n\n!\u003e **NOTE:** Access to Azure Communications Gateway is restricted, see [`Get access to Azure Communications Gateway for your Azure subscription`](https://learn.microsoft.com/en-us/azure/communications-gateway/prepare-to-deploy#9-get-access-to-azure-communications-gateway-for-your-azure-subscription) for details.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleServicesCommunicationsGateway = new azure.voice.ServicesCommunicationsGateway(\"example\", {\n name: \"example-vcg\",\n location: \"West Europe\",\n resourceGroupName: example.name,\n connectivity: \"PublicAddress\",\n codecs: \"PCMA\",\n e911Type: \"DirectToEsrp\",\n platforms: [\n \"OperatorConnect\",\n \"TeamsPhoneMobile\",\n ],\n serviceLocations: [\n {\n location: \"eastus\",\n allowedMediaSourceAddressPrefixes: [\"10.1.2.0/24\"],\n allowedSignalingSourceAddressPrefixes: [\"10.1.1.0/24\"],\n esrpAddresses: [\"198.51.100.3\"],\n operatorAddresses: [\"198.51.100.1\"],\n },\n {\n location: \"eastus2\",\n allowedMediaSourceAddressPrefixes: [\"10.2.2.0/24\"],\n allowedSignalingSourceAddressPrefixes: [\"10.2.1.0/24\"],\n esrpAddresses: [\"198.51.100.4\"],\n operatorAddresses: [\"198.51.100.2\"],\n },\n ],\n autoGeneratedDomainNameLabelScope: \"SubscriptionReuse\",\n apiBridge: JSON.stringify({}),\n emergencyDialStrings: [\n \"911\",\n \"933\",\n ],\n onPremMcpEnabled: false,\n tags: {\n key: \"value\",\n },\n microsoftTeamsVoicemailPilotNumber: \"1\",\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_azure as azure\n\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_services_communications_gateway = azure.voice.ServicesCommunicationsGateway(\"example\",\n name=\"example-vcg\",\n location=\"West Europe\",\n resource_group_name=example.name,\n connectivity=\"PublicAddress\",\n codecs=\"PCMA\",\n e911_type=\"DirectToEsrp\",\n platforms=[\n \"OperatorConnect\",\n \"TeamsPhoneMobile\",\n ],\n service_locations=[\n {\n \"location\": \"eastus\",\n \"allowed_media_source_address_prefixes\": [\"10.1.2.0/24\"],\n \"allowed_signaling_source_address_prefixes\": [\"10.1.1.0/24\"],\n \"esrp_addresses\": [\"198.51.100.3\"],\n \"operator_addresses\": [\"198.51.100.1\"],\n },\n {\n \"location\": \"eastus2\",\n \"allowed_media_source_address_prefixes\": [\"10.2.2.0/24\"],\n \"allowed_signaling_source_address_prefixes\": [\"10.2.1.0/24\"],\n \"esrp_addresses\": [\"198.51.100.4\"],\n \"operator_addresses\": [\"198.51.100.2\"],\n },\n ],\n auto_generated_domain_name_label_scope=\"SubscriptionReuse\",\n api_bridge=json.dumps({}),\n emergency_dial_strings=[\n \"911\",\n \"933\",\n ],\n on_prem_mcp_enabled=False,\n tags={\n \"key\": \"value\",\n },\n microsoft_teams_voicemail_pilot_number=\"1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleServicesCommunicationsGateway = new Azure.Voice.ServicesCommunicationsGateway(\"example\", new()\n {\n Name = \"example-vcg\",\n Location = \"West Europe\",\n ResourceGroupName = example.Name,\n Connectivity = \"PublicAddress\",\n Codecs = \"PCMA\",\n E911Type = \"DirectToEsrp\",\n Platforms = new[]\n {\n \"OperatorConnect\",\n \"TeamsPhoneMobile\",\n },\n ServiceLocations = new[]\n {\n new Azure.Voice.Inputs.ServicesCommunicationsGatewayServiceLocationArgs\n {\n Location = \"eastus\",\n AllowedMediaSourceAddressPrefixes = new[]\n {\n \"10.1.2.0/24\",\n },\n AllowedSignalingSourceAddressPrefixes = new[]\n {\n \"10.1.1.0/24\",\n },\n EsrpAddresses = new[]\n {\n \"198.51.100.3\",\n },\n OperatorAddresses = new[]\n {\n \"198.51.100.1\",\n },\n },\n new Azure.Voice.Inputs.ServicesCommunicationsGatewayServiceLocationArgs\n {\n Location = \"eastus2\",\n AllowedMediaSourceAddressPrefixes = new[]\n {\n \"10.2.2.0/24\",\n },\n AllowedSignalingSourceAddressPrefixes = new[]\n {\n \"10.2.1.0/24\",\n },\n EsrpAddresses = new[]\n {\n \"198.51.100.4\",\n },\n OperatorAddresses = new[]\n {\n \"198.51.100.2\",\n },\n },\n },\n AutoGeneratedDomainNameLabelScope = \"SubscriptionReuse\",\n ApiBridge = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n }),\n EmergencyDialStrings = new[]\n {\n \"911\",\n \"933\",\n },\n OnPremMcpEnabled = false,\n Tags = \n {\n { \"key\", \"value\" },\n },\n MicrosoftTeamsVoicemailPilotNumber = \"1\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/voice\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = voice.NewServicesCommunicationsGateway(ctx, \"example\", \u0026voice.ServicesCommunicationsGatewayArgs{\n\t\t\tName: pulumi.String(\"example-vcg\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t\tResourceGroupName: example.Name,\n\t\t\tConnectivity: pulumi.String(\"PublicAddress\"),\n\t\t\tCodecs: pulumi.String(\"PCMA\"),\n\t\t\tE911Type: pulumi.String(\"DirectToEsrp\"),\n\t\t\tPlatforms: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"OperatorConnect\"),\n\t\t\t\tpulumi.String(\"TeamsPhoneMobile\"),\n\t\t\t},\n\t\t\tServiceLocations: voice.ServicesCommunicationsGatewayServiceLocationArray{\n\t\t\t\t\u0026voice.ServicesCommunicationsGatewayServiceLocationArgs{\n\t\t\t\t\tLocation: pulumi.String(\"eastus\"),\n\t\t\t\t\tAllowedMediaSourceAddressPrefixes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"10.1.2.0/24\"),\n\t\t\t\t\t},\n\t\t\t\t\tAllowedSignalingSourceAddressPrefixes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"10.1.1.0/24\"),\n\t\t\t\t\t},\n\t\t\t\t\tEsrpAddresses: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"198.51.100.3\"),\n\t\t\t\t\t},\n\t\t\t\t\tOperatorAddresses: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"198.51.100.1\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026voice.ServicesCommunicationsGatewayServiceLocationArgs{\n\t\t\t\t\tLocation: pulumi.String(\"eastus2\"),\n\t\t\t\t\tAllowedMediaSourceAddressPrefixes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"10.2.2.0/24\"),\n\t\t\t\t\t},\n\t\t\t\t\tAllowedSignalingSourceAddressPrefixes: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"10.2.1.0/24\"),\n\t\t\t\t\t},\n\t\t\t\t\tEsrpAddresses: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"198.51.100.4\"),\n\t\t\t\t\t},\n\t\t\t\t\tOperatorAddresses: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"198.51.100.2\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tAutoGeneratedDomainNameLabelScope: pulumi.String(\"SubscriptionReuse\"),\n\t\t\tApiBridge: pulumi.String(json0),\n\t\t\tEmergencyDialStrings: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"911\"),\n\t\t\t\tpulumi.String(\"933\"),\n\t\t\t},\n\t\t\tOnPremMcpEnabled: pulumi.Bool(false),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"key\": pulumi.String(\"value\"),\n\t\t\t},\n\t\t\tMicrosoftTeamsVoicemailPilotNumber: pulumi.String(\"1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.voice.ServicesCommunicationsGateway;\nimport com.pulumi.azure.voice.ServicesCommunicationsGatewayArgs;\nimport com.pulumi.azure.voice.inputs.ServicesCommunicationsGatewayServiceLocationArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleServicesCommunicationsGateway = new ServicesCommunicationsGateway(\"exampleServicesCommunicationsGateway\", ServicesCommunicationsGatewayArgs.builder()\n .name(\"example-vcg\")\n .location(\"West Europe\")\n .resourceGroupName(example.name())\n .connectivity(\"PublicAddress\")\n .codecs(\"PCMA\")\n .e911Type(\"DirectToEsrp\")\n .platforms( \n \"OperatorConnect\",\n \"TeamsPhoneMobile\")\n .serviceLocations( \n ServicesCommunicationsGatewayServiceLocationArgs.builder()\n .location(\"eastus\")\n .allowedMediaSourceAddressPrefixes(\"10.1.2.0/24\")\n .allowedSignalingSourceAddressPrefixes(\"10.1.1.0/24\")\n .esrpAddresses(\"198.51.100.3\")\n .operatorAddresses(\"198.51.100.1\")\n .build(),\n ServicesCommunicationsGatewayServiceLocationArgs.builder()\n .location(\"eastus2\")\n .allowedMediaSourceAddressPrefixes(\"10.2.2.0/24\")\n .allowedSignalingSourceAddressPrefixes(\"10.2.1.0/24\")\n .esrpAddresses(\"198.51.100.4\")\n .operatorAddresses(\"198.51.100.2\")\n .build())\n .autoGeneratedDomainNameLabelScope(\"SubscriptionReuse\")\n .apiBridge(serializeJson(\n jsonObject(\n\n )))\n .emergencyDialStrings( \n \"911\",\n \"933\")\n .onPremMcpEnabled(false)\n .tags(Map.of(\"key\", \"value\"))\n .microsoftTeamsVoicemailPilotNumber(\"1\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleServicesCommunicationsGateway:\n type: azure:voice:ServicesCommunicationsGateway\n name: example\n properties:\n name: example-vcg\n location: West Europe\n resourceGroupName: ${example.name}\n connectivity: PublicAddress\n codecs: PCMA\n e911Type: DirectToEsrp\n platforms:\n - OperatorConnect\n - TeamsPhoneMobile\n serviceLocations:\n - location: eastus\n allowedMediaSourceAddressPrefixes:\n - 10.1.2.0/24\n allowedSignalingSourceAddressPrefixes:\n - 10.1.1.0/24\n esrpAddresses:\n - 198.51.100.3\n operatorAddresses:\n - 198.51.100.1\n - location: eastus2\n allowedMediaSourceAddressPrefixes:\n - 10.2.2.0/24\n allowedSignalingSourceAddressPrefixes:\n - 10.2.1.0/24\n esrpAddresses:\n - 198.51.100.4\n operatorAddresses:\n - 198.51.100.2\n autoGeneratedDomainNameLabelScope: SubscriptionReuse\n apiBridge:\n fn::toJSON: {}\n emergencyDialStrings:\n - '911'\n - '933'\n onPremMcpEnabled: false\n tags:\n key: value\n microsoftTeamsVoicemailPilotNumber: '1'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nVoice Services Communications Gateways can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:voice/servicesCommunicationsGateway:ServicesCommunicationsGateway example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.VoiceServices/communicationsGateways/communicationsGateway1\n```\n\n", "properties": { "apiBridge": { "type": "string", @@ -264108,7 +264108,7 @@ } }, "azure:webpubsub/customCertificate:CustomCertificate": { - "description": "Manages an Azure Web PubSub Custom Certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azurerm from \"@pulumi/azurerm\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleWebPubsubService = new azurerm.index.WebPubsubService(\"example\", {\n name: \"example-webpubsub\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n sku: [{\n name: \"Premium_P1\",\n capacity: 1,\n }],\n identity: [{\n type: \"SystemAssigned\",\n }],\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: testAzurermWebPubsubService.identity[0].principalId,\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\nconst test = new azure.webpubsub.CustomCertificate(\"test\", {\n name: \"example-cert\",\n webPubsubId: exampleWebPubsubService.id,\n customCertificateId: exampleCertificate.id,\n}, {\n dependsOn: [exampleAzurermKeyVaultAccessPolicy],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azurerm as azurerm\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_web_pubsub_service = azurerm.index.WebPubsubService(\"example\",\n name=example-webpubsub,\n location=test_azurerm_resource_group.location,\n resource_group_name=test_azurerm_resource_group.name,\n sku=[{\n name: Premium_P1,\n capacity: 1,\n }],\n identity=[{\n type: SystemAssigned,\n }])\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": test_azurerm_web_pubsub_service[\"identity\"][0][\"principalId\"],\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\ntest = azure.webpubsub.CustomCertificate(\"test\",\n name=\"example-cert\",\n web_pubsub_id=example_web_pubsub_service[\"id\"],\n custom_certificate_id=example_certificate.id,\n opts = pulumi.ResourceOptions(depends_on=[example_azurerm_key_vault_access_policy]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Azurerm = Pulumi.Azurerm;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleWebPubsubService = new Azurerm.Index.WebPubsubService(\"example\", new()\n {\n Name = \"example-webpubsub\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n Sku = new[]\n {\n \n {\n { \"name\", \"Premium_P1\" },\n { \"capacity\", 1 },\n },\n },\n Identity = new[]\n {\n \n {\n { \"type\", \"SystemAssigned\" },\n },\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = testAzurermWebPubsubService.Identity[0].PrincipalId,\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n var test = new Azure.WebPubSub.CustomCertificate(\"test\", new()\n {\n Name = \"example-cert\",\n WebPubsubId = exampleWebPubsubService.Id,\n CustomCertificateId = exampleCertificate.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAzurermKeyVaultAccessPolicy,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/webpubsub\"\n\t\"github.com/pulumi/pulumi-azurerm/sdk/go/azurerm\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWebPubsubService, err := azurerm.NewWebPubsubService(ctx, \"example\", \u0026azurerm.WebPubsubServiceArgs{\n\t\t\tName: \"example-webpubsub\",\n\t\t\tLocation: testAzurermResourceGroup.Location,\n\t\t\tResourceGroupName: testAzurermResourceGroup.Name,\n\t\t\tSku: []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"name\": \"Premium_P1\",\n\t\t\t\t\t\"capacity\": 1,\n\t\t\t\t},\n\t\t\t},\n\t\t\tIdentity: []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"type\": \"SystemAssigned\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.Any(testAzurermWebPubsubService.Identity[0].PrincipalId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = webpubsub.NewCustomCertificate(ctx, \"test\", \u0026webpubsub.CustomCertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tWebPubsubId: exampleWebPubsubService.Id,\n\t\t\tCustomCertificateId: exampleCertificate.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAzurermKeyVaultAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azurerm.webPubsubService;\nimport com.pulumi.azurerm.WebPubsubServiceArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.webpubsub.CustomCertificate;\nimport com.pulumi.azure.webpubsub.CustomCertificateArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleWebPubsubService = new WebPubsubService(\"exampleWebPubsubService\", WebPubsubServiceArgs.builder()\n .name(\"example-webpubsub\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .sku(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))\n .identity(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(testAzurermWebPubsubService.identity()[0].principalId())\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n var test = new CustomCertificate(\"test\", CustomCertificateArgs.builder()\n .name(\"example-cert\")\n .webPubsubId(exampleWebPubsubService.id())\n .customCertificateId(exampleCertificate.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAzurermKeyVaultAccessPolicy)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleWebPubsubService:\n type: azurerm:webPubsubService\n name: example\n properties:\n name: example-webpubsub\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n sku:\n - name: Premium_P1\n capacity: 1\n identity:\n - type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n - tenantId: ${current.tenantId}\n objectId: ${testAzurermWebPubsubService.identity[0].principalId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\n test:\n type: azure:webpubsub:CustomCertificate\n properties:\n name: example-cert\n webPubsubId: ${exampleWebPubsubService.id}\n customCertificateId: ${exampleCertificate.id}\n options:\n dependson:\n - ${exampleAzurermKeyVaultAccessPolicy}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustom Certificate for a Web PubSub service can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:webpubsub/customCertificate:CustomCertificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/webPubSub/WebPubsub1/customCertificates/cert1\n```\n\n", + "description": "Manages an Azure Web PubSub Custom Certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\nimport * as azurerm from \"@pulumi/azurerm\";\nimport * as std from \"@pulumi/std\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst exampleWebPubsubService = new azurerm.index.WebPubsubService(\"example\", {\n name: \"example-webpubsub\",\n location: testAzurermResourceGroup.location,\n resourceGroupName: testAzurermResourceGroup.name,\n sku: [{\n name: \"Premium_P1\",\n capacity: 1,\n }],\n identity: [{\n type: \"SystemAssigned\",\n }],\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"premium\",\n accessPolicies: [\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n {\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: testAzurermWebPubsubService.identity[0].principalId,\n certificatePermissions: [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n secretPermissions: [\n \"Get\",\n \"List\",\n ],\n },\n ],\n});\nconst exampleCertificate = new azure.keyvault.Certificate(\"example\", {\n name: \"imported-cert\",\n keyVaultId: exampleKeyVault.id,\n certificate: {\n contents: std.filebase64({\n input: \"certificate-to-import.pfx\",\n }).then(invoke =\u003e invoke.result),\n password: \"\",\n },\n});\nconst test = new azure.webpubsub.CustomCertificate(\"test\", {\n name: \"example-cert\",\n webPubsubId: exampleWebPubsubService.id,\n customCertificateId: exampleCertificate.id,\n}, {\n dependsOn: [exampleAzurermKeyVaultAccessPolicy],\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\nimport pulumi_azurerm as azurerm\nimport pulumi_std as std\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\nexample_web_pubsub_service = azurerm.index.WebPubsubService(\"example\",\n name=example-webpubsub,\n location=test_azurerm_resource_group.location,\n resource_group_name=test_azurerm_resource_group.name,\n sku=[{\n name: Premium_P1,\n capacity: 1,\n }],\n identity=[{\n type: SystemAssigned,\n }])\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"premium\",\n access_policies=[\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n {\n \"tenant_id\": current.tenant_id,\n \"object_id\": test_azurerm_web_pubsub_service[\"identity\"][0][\"principalId\"],\n \"certificate_permissions\": [\n \"Create\",\n \"Get\",\n \"List\",\n ],\n \"secret_permissions\": [\n \"Get\",\n \"List\",\n ],\n },\n ])\nexample_certificate = azure.keyvault.Certificate(\"example\",\n name=\"imported-cert\",\n key_vault_id=example_key_vault.id,\n certificate={\n \"contents\": std.filebase64(input=\"certificate-to-import.pfx\").result,\n \"password\": \"\",\n })\ntest = azure.webpubsub.CustomCertificate(\"test\",\n name=\"example-cert\",\n web_pubsub_id=example_web_pubsub_service[\"id\"],\n custom_certificate_id=example_certificate.id,\n opts = pulumi.ResourceOptions(depends_on=[example_azurerm_key_vault_access_policy]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\nusing Azurerm = Pulumi.Azurerm;\nusing Std = Pulumi.Std;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var exampleWebPubsubService = new Azurerm.Index.WebPubsubService(\"example\", new()\n {\n Name = \"example-webpubsub\",\n Location = testAzurermResourceGroup.Location,\n ResourceGroupName = testAzurermResourceGroup.Name,\n Sku = new[]\n {\n \n {\n { \"name\", \"Premium_P1\" },\n { \"capacity\", 1 },\n },\n },\n Identity = new[]\n {\n \n {\n { \"type\", \"SystemAssigned\" },\n },\n },\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"premium\",\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = testAzurermWebPubsubService.Identity[0].PrincipalId,\n CertificatePermissions = new[]\n {\n \"Create\",\n \"Get\",\n \"List\",\n },\n SecretPermissions = new[]\n {\n \"Get\",\n \"List\",\n },\n },\n },\n });\n\n var exampleCertificate = new Azure.KeyVault.Certificate(\"example\", new()\n {\n Name = \"imported-cert\",\n KeyVaultId = exampleKeyVault.Id,\n KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs\n {\n Contents = Std.Filebase64.Invoke(new()\n {\n Input = \"certificate-to-import.pfx\",\n }).Apply(invoke =\u003e invoke.Result),\n Password = \"\",\n },\n });\n\n var test = new Azure.WebPubSub.CustomCertificate(\"test\", new()\n {\n Name = \"example-cert\",\n WebPubsubId = exampleWebPubsubService.Id,\n CustomCertificateId = exampleCertificate.Id,\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n exampleAzurermKeyVaultAccessPolicy,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/webpubsub\"\n\t\"github.com/pulumi/pulumi-azurerm/sdk/go/azurerm\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleWebPubsubService, err := azurerm.NewWebPubsubService(ctx, \"example\", \u0026azurerm.WebPubsubServiceArgs{\n\t\t\tName: \"example-webpubsub\",\n\t\t\tLocation: testAzurermResourceGroup.Location,\n\t\t\tResourceGroupName: testAzurermResourceGroup.Name,\n\t\t\tSku: []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"name\": \"Premium_P1\",\n\t\t\t\t\t\"capacity\": 1,\n\t\t\t\t},\n\t\t\t},\n\t\t\tIdentity: []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"type\": \"SystemAssigned\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"premium\"),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.Any(testAzurermWebPubsubService.Identity[0].PrincipalId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Create\"),\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"Get\"),\n\t\t\t\t\t\tpulumi.String(\"List\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFilebase64, err := std.Filebase64(ctx, \u0026std.Filebase64Args{\n\t\t\tInput: \"certificate-to-import.pfx\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleCertificate, err := keyvault.NewCertificate(ctx, \"example\", \u0026keyvault.CertificateArgs{\n\t\t\tName: pulumi.String(\"imported-cert\"),\n\t\t\tKeyVaultId: exampleKeyVault.ID(),\n\t\t\tCertificate: \u0026keyvault.CertificateCertificateArgs{\n\t\t\t\tContents: pulumi.String(invokeFilebase64.Result),\n\t\t\t\tPassword: pulumi.String(\"\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = webpubsub.NewCustomCertificate(ctx, \"test\", \u0026webpubsub.CustomCertificateArgs{\n\t\t\tName: pulumi.String(\"example-cert\"),\n\t\t\tWebPubsubId: exampleWebPubsubService.Id,\n\t\t\tCustomCertificateId: exampleCertificate.ID(),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\texampleAzurermKeyVaultAccessPolicy,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azurerm.webPubsubService;\nimport com.pulumi.azurerm.WebPubsubServiceArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.keyvault.Certificate;\nimport com.pulumi.azure.keyvault.CertificateArgs;\nimport com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;\nimport com.pulumi.azure.webpubsub.CustomCertificate;\nimport com.pulumi.azure.webpubsub.CustomCertificateArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n var exampleWebPubsubService = new WebPubsubService(\"exampleWebPubsubService\", WebPubsubServiceArgs.builder()\n .name(\"example-webpubsub\")\n .location(testAzurermResourceGroup.location())\n .resourceGroupName(testAzurermResourceGroup.name())\n .sku(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))\n .identity(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"premium\")\n .accessPolicies( \n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build(),\n KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(testAzurermWebPubsubService.identity()[0].principalId())\n .certificatePermissions( \n \"Create\",\n \"Get\",\n \"List\")\n .secretPermissions( \n \"Get\",\n \"List\")\n .build())\n .build());\n\n var exampleCertificate = new Certificate(\"exampleCertificate\", CertificateArgs.builder()\n .name(\"imported-cert\")\n .keyVaultId(exampleKeyVault.id())\n .certificate(CertificateCertificateArgs.builder()\n .contents(StdFunctions.filebase64(Filebase64Args.builder()\n .input(\"certificate-to-import.pfx\")\n .build()).result())\n .password(\"\")\n .build())\n .build());\n\n var test = new CustomCertificate(\"test\", CustomCertificateArgs.builder()\n .name(\"example-cert\")\n .webPubsubId(exampleWebPubsubService.id())\n .customCertificateId(exampleCertificate.id())\n .build(), CustomResourceOptions.builder()\n .dependsOn(exampleAzurermKeyVaultAccessPolicy)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: example-resources\n location: West Europe\n exampleWebPubsubService:\n type: azurerm:webPubsubService\n name: example\n properties:\n name: example-webpubsub\n location: ${testAzurermResourceGroup.location}\n resourceGroupName: ${testAzurermResourceGroup.name}\n sku:\n - name: Premium_P1\n capacity: 1\n identity:\n - type: SystemAssigned\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: premium\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n - tenantId: ${current.tenantId}\n objectId: ${testAzurermWebPubsubService.identity[0].principalId}\n certificatePermissions:\n - Create\n - Get\n - List\n secretPermissions:\n - Get\n - List\n exampleCertificate:\n type: azure:keyvault:Certificate\n name: example\n properties:\n name: imported-cert\n keyVaultId: ${exampleKeyVault.id}\n certificate:\n contents:\n fn::invoke:\n Function: std:filebase64\n Arguments:\n input: certificate-to-import.pfx\n Return: result\n password:\n test:\n type: azure:webpubsub:CustomCertificate\n properties:\n name: example-cert\n webPubsubId: ${exampleWebPubsubService.id}\n customCertificateId: ${exampleCertificate.id}\n options:\n dependson:\n - ${exampleAzurermKeyVaultAccessPolicy}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustom Certificate for a Web PubSub service can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:webpubsub/customCertificate:CustomCertificate example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/webPubSub/WebPubsub1/customCertificates/cert1\n```\n\n", "properties": { "certificateVersion": { "type": "string", @@ -264712,7 +264712,7 @@ } }, "azure:webpubsub/sharedPrivateLinkResource:SharedPrivateLinkResource": { - "description": "Manages the Shared Private Link Resource for a Web Pubsub service.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"terraform-webpubsub\",\n location: \"east us\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\"managecontacts\"],\n keyPermissions: [\"create\"],\n secretPermissions: [\"set\"],\n }],\n});\nconst exampleService = new azure.webpubsub.Service(\"example\", {\n name: \"tfex-webpubsub\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard_S1\",\n capacity: 1,\n});\nconst exampleSharedPrivateLinkResource = new azure.webpubsub.SharedPrivateLinkResource(\"example\", {\n name: \"tfex-webpubsub-splr\",\n webPubsubId: exampleService.id,\n subresourceName: \"vault\",\n targetResourceId: exampleKeyVault.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"terraform-webpubsub\",\n location=\"east us\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\"managecontacts\"],\n \"key_permissions\": [\"create\"],\n \"secret_permissions\": [\"set\"],\n }])\nexample_service = azure.webpubsub.Service(\"example\",\n name=\"tfex-webpubsub\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard_S1\",\n capacity=1)\nexample_shared_private_link_resource = azure.webpubsub.SharedPrivateLinkResource(\"example\",\n name=\"tfex-webpubsub-splr\",\n web_pubsub_id=example_service.id,\n subresource_name=\"vault\",\n target_resource_id=example_key_vault.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"terraform-webpubsub\",\n Location = \"east us\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"managecontacts\",\n },\n KeyPermissions = new[]\n {\n \"create\",\n },\n SecretPermissions = new[]\n {\n \"set\",\n },\n },\n },\n });\n\n var exampleService = new Azure.WebPubSub.Service(\"example\", new()\n {\n Name = \"tfex-webpubsub\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard_S1\",\n Capacity = 1,\n });\n\n var exampleSharedPrivateLinkResource = new Azure.WebPubSub.SharedPrivateLinkResource(\"example\", new()\n {\n Name = \"tfex-webpubsub-splr\",\n WebPubsubId = exampleService.Id,\n SubresourceName = \"vault\",\n TargetResourceId = exampleKeyVault.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/webpubsub\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"terraform-webpubsub\"),\n\t\t\tLocation: pulumi.String(\"east us\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"managecontacts\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"create\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := webpubsub.NewService(ctx, \"example\", \u0026webpubsub.ServiceArgs{\n\t\t\tName: pulumi.String(\"tfex-webpubsub\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard_S1\"),\n\t\t\tCapacity: pulumi.Int(1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = webpubsub.NewSharedPrivateLinkResource(ctx, \"example\", \u0026webpubsub.SharedPrivateLinkResourceArgs{\n\t\t\tName: pulumi.String(\"tfex-webpubsub-splr\"),\n\t\t\tWebPubsubId: exampleService.ID(),\n\t\t\tSubresourceName: pulumi.String(\"vault\"),\n\t\t\tTargetResourceId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.webpubsub.Service;\nimport com.pulumi.azure.webpubsub.ServiceArgs;\nimport com.pulumi.azure.webpubsub.SharedPrivateLinkResource;\nimport com.pulumi.azure.webpubsub.SharedPrivateLinkResourceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"terraform-webpubsub\")\n .location(\"east us\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions(\"managecontacts\")\n .keyPermissions(\"create\")\n .secretPermissions(\"set\")\n .build())\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"tfex-webpubsub\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard_S1\")\n .capacity(1)\n .build());\n\n var exampleSharedPrivateLinkResource = new SharedPrivateLinkResource(\"exampleSharedPrivateLinkResource\", SharedPrivateLinkResourceArgs.builder()\n .name(\"tfex-webpubsub-splr\")\n .webPubsubId(exampleService.id())\n .subresourceName(\"vault\")\n .targetResourceId(exampleKeyVault.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: terraform-webpubsub\n location: east us\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - managecontacts\n keyPermissions:\n - create\n secretPermissions:\n - set\n exampleService:\n type: azure:webpubsub:Service\n name: example\n properties:\n name: tfex-webpubsub\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard_S1\n capacity: 1\n exampleSharedPrivateLinkResource:\n type: azure:webpubsub:SharedPrivateLinkResource\n name: example\n properties:\n name: tfex-webpubsub-splr\n webPubsubId: ${exampleService.id}\n subresourceName: vault\n targetResourceId: ${exampleKeyVault.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWeb Pubsub Shared Private Link Resource can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:webpubsub/sharedPrivateLinkResource:SharedPrivateLinkResource example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/webPubSub/webPubSub1/sharedPrivateLinkResources/resource1\n```\n\n", + "description": "Manages the Shared Private Link Resource for a Web Pubsub service.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst example = new azure.core.ResourceGroup(\"example\", {\n name: \"terraform-webpubsub\",\n location: \"east us\",\n});\nconst exampleKeyVault = new azure.keyvault.KeyVault(\"example\", {\n name: \"examplekeyvault\",\n location: example.location,\n resourceGroupName: example.name,\n tenantId: current.then(current =\u003e current.tenantId),\n skuName: \"standard\",\n softDeleteRetentionDays: 7,\n accessPolicies: [{\n tenantId: current.then(current =\u003e current.tenantId),\n objectId: current.then(current =\u003e current.objectId),\n certificatePermissions: [\"managecontacts\"],\n keyPermissions: [\"create\"],\n secretPermissions: [\"set\"],\n }],\n});\nconst exampleService = new azure.webpubsub.Service(\"example\", {\n name: \"tfex-webpubsub\",\n location: example.location,\n resourceGroupName: example.name,\n sku: \"Standard_S1\",\n capacity: 1,\n});\nconst exampleSharedPrivateLinkResource = new azure.webpubsub.SharedPrivateLinkResource(\"example\", {\n name: \"tfex-webpubsub-splr\",\n webPubsubId: exampleService.id,\n subresourceName: \"vault\",\n targetResourceId: exampleKeyVault.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nexample = azure.core.ResourceGroup(\"example\",\n name=\"terraform-webpubsub\",\n location=\"east us\")\nexample_key_vault = azure.keyvault.KeyVault(\"example\",\n name=\"examplekeyvault\",\n location=example.location,\n resource_group_name=example.name,\n tenant_id=current.tenant_id,\n sku_name=\"standard\",\n soft_delete_retention_days=7,\n access_policies=[{\n \"tenant_id\": current.tenant_id,\n \"object_id\": current.object_id,\n \"certificate_permissions\": [\"managecontacts\"],\n \"key_permissions\": [\"create\"],\n \"secret_permissions\": [\"set\"],\n }])\nexample_service = azure.webpubsub.Service(\"example\",\n name=\"tfex-webpubsub\",\n location=example.location,\n resource_group_name=example.name,\n sku=\"Standard_S1\",\n capacity=1)\nexample_shared_private_link_resource = azure.webpubsub.SharedPrivateLinkResource(\"example\",\n name=\"tfex-webpubsub-splr\",\n web_pubsub_id=example_service.id,\n subresource_name=\"vault\",\n target_resource_id=example_key_vault.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var example = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"terraform-webpubsub\",\n Location = \"east us\",\n });\n\n var exampleKeyVault = new Azure.KeyVault.KeyVault(\"example\", new()\n {\n Name = \"examplekeyvault\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n SkuName = \"standard\",\n SoftDeleteRetentionDays = 7,\n AccessPolicies = new[]\n {\n new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs\n {\n TenantId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n ObjectId = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ObjectId),\n CertificatePermissions = new[]\n {\n \"managecontacts\",\n },\n KeyPermissions = new[]\n {\n \"create\",\n },\n SecretPermissions = new[]\n {\n \"set\",\n },\n },\n },\n });\n\n var exampleService = new Azure.WebPubSub.Service(\"example\", new()\n {\n Name = \"tfex-webpubsub\",\n Location = example.Location,\n ResourceGroupName = example.Name,\n Sku = \"Standard_S1\",\n Capacity = 1,\n });\n\n var exampleSharedPrivateLinkResource = new Azure.WebPubSub.SharedPrivateLinkResource(\"example\", new()\n {\n Name = \"tfex-webpubsub-splr\",\n WebPubsubId = exampleService.Id,\n SubresourceName = \"vault\",\n TargetResourceId = exampleKeyVault.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/keyvault\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/webpubsub\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texample, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"terraform-webpubsub\"),\n\t\t\tLocation: pulumi.String(\"east us\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleKeyVault, err := keyvault.NewKeyVault(ctx, \"example\", \u0026keyvault.KeyVaultArgs{\n\t\t\tName: pulumi.String(\"examplekeyvault\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\tSkuName: pulumi.String(\"standard\"),\n\t\t\tSoftDeleteRetentionDays: pulumi.Int(7),\n\t\t\tAccessPolicies: keyvault.KeyVaultAccessPolicyArray{\n\t\t\t\t\u0026keyvault.KeyVaultAccessPolicyArgs{\n\t\t\t\t\tTenantId: pulumi.String(current.TenantId),\n\t\t\t\t\tObjectId: pulumi.String(current.ObjectId),\n\t\t\t\t\tCertificatePermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"managecontacts\"),\n\t\t\t\t\t},\n\t\t\t\t\tKeyPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"create\"),\n\t\t\t\t\t},\n\t\t\t\t\tSecretPermissions: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"set\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleService, err := webpubsub.NewService(ctx, \"example\", \u0026webpubsub.ServiceArgs{\n\t\t\tName: pulumi.String(\"tfex-webpubsub\"),\n\t\t\tLocation: example.Location,\n\t\t\tResourceGroupName: example.Name,\n\t\t\tSku: pulumi.String(\"Standard_S1\"),\n\t\t\tCapacity: pulumi.Int(1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = webpubsub.NewSharedPrivateLinkResource(ctx, \"example\", \u0026webpubsub.SharedPrivateLinkResourceArgs{\n\t\t\tName: pulumi.String(\"tfex-webpubsub-splr\"),\n\t\t\tWebPubsubId: exampleService.ID(),\n\t\t\tSubresourceName: pulumi.String(\"vault\"),\n\t\t\tTargetResourceId: exampleKeyVault.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.keyvault.KeyVault;\nimport com.pulumi.azure.keyvault.KeyVaultArgs;\nimport com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;\nimport com.pulumi.azure.webpubsub.Service;\nimport com.pulumi.azure.webpubsub.ServiceArgs;\nimport com.pulumi.azure.webpubsub.SharedPrivateLinkResource;\nimport com.pulumi.azure.webpubsub.SharedPrivateLinkResourceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n var example = new ResourceGroup(\"example\", ResourceGroupArgs.builder()\n .name(\"terraform-webpubsub\")\n .location(\"east us\")\n .build());\n\n var exampleKeyVault = new KeyVault(\"exampleKeyVault\", KeyVaultArgs.builder()\n .name(\"examplekeyvault\")\n .location(example.location())\n .resourceGroupName(example.name())\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .skuName(\"standard\")\n .softDeleteRetentionDays(7)\n .accessPolicies(KeyVaultAccessPolicyArgs.builder()\n .tenantId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .objectId(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.objectId()))\n .certificatePermissions(\"managecontacts\")\n .keyPermissions(\"create\")\n .secretPermissions(\"set\")\n .build())\n .build());\n\n var exampleService = new Service(\"exampleService\", ServiceArgs.builder()\n .name(\"tfex-webpubsub\")\n .location(example.location())\n .resourceGroupName(example.name())\n .sku(\"Standard_S1\")\n .capacity(1)\n .build());\n\n var exampleSharedPrivateLinkResource = new SharedPrivateLinkResource(\"exampleSharedPrivateLinkResource\", SharedPrivateLinkResourceArgs.builder()\n .name(\"tfex-webpubsub-splr\")\n .webPubsubId(exampleService.id())\n .subresourceName(\"vault\")\n .targetResourceId(exampleKeyVault.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: azure:core:ResourceGroup\n properties:\n name: terraform-webpubsub\n location: east us\n exampleKeyVault:\n type: azure:keyvault:KeyVault\n name: example\n properties:\n name: examplekeyvault\n location: ${example.location}\n resourceGroupName: ${example.name}\n tenantId: ${current.tenantId}\n skuName: standard\n softDeleteRetentionDays: 7\n accessPolicies:\n - tenantId: ${current.tenantId}\n objectId: ${current.objectId}\n certificatePermissions:\n - managecontacts\n keyPermissions:\n - create\n secretPermissions:\n - set\n exampleService:\n type: azure:webpubsub:Service\n name: example\n properties:\n name: tfex-webpubsub\n location: ${example.location}\n resourceGroupName: ${example.name}\n sku: Standard_S1\n capacity: 1\n exampleSharedPrivateLinkResource:\n type: azure:webpubsub:SharedPrivateLinkResource\n name: example\n properties:\n name: tfex-webpubsub-splr\n webPubsubId: ${exampleService.id}\n subresourceName: vault\n targetResourceId: ${exampleKeyVault.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWeb Pubsub Shared Private Link Resource can be imported using the `resource id`, e.g.\n\n```sh\n$ pulumi import azure:webpubsub/sharedPrivateLinkResource:SharedPrivateLinkResource example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.SignalRService/webPubSub/webPubSub1/sharedPrivateLinkResources/resource1\n```\n\n", "properties": { "name": { "type": "string", @@ -269304,7 +269304,7 @@ } }, "azure:authorization/getRoleDefinition:getRoleDefinition": { - "description": "Use this data source to access information about an existing Role Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst customRoleDefinition = new azure.authorization.RoleDefinition(\"custom\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"CustomRoleDef\",\n scope: primary.then(primary =\u003e primary.id),\n});\nconst custom = pulumi.all([customRoleDefinition.roleDefinitionId, primary]).apply(([roleDefinitionId, primary]) =\u003e azure.authorization.getRoleDefinitionOutput({\n roleDefinitionId: roleDefinitionId,\n scope: primary.id,\n}));\nconst custom-byname = pulumi.all([customRoleDefinition.name, primary]).apply(([name, primary]) =\u003e azure.authorization.getRoleDefinitionOutput({\n name: name,\n scope: primary.id,\n}));\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Contributor\",\n});\nexport const customRoleDefinitionId = custom.apply(custom =\u003e custom.id);\nexport const contributorRoleDefinitionId = builtin.then(builtin =\u003e builtin.id);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\ncustom_role_definition = azure.authorization.RoleDefinition(\"custom\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"CustomRoleDef\",\n scope=primary.id)\ncustom = custom_role_definition.role_definition_id.apply(lambda role_definition_id: azure.authorization.get_role_definition_output(role_definition_id=role_definition_id,\n scope=primary.id))\ncustom_byname = custom_role_definition.name.apply(lambda name: azure.authorization.get_role_definition_output(name=name,\n scope=primary.id))\nbuiltin = azure.authorization.get_role_definition(name=\"Contributor\")\npulumi.export(\"customRoleDefinitionId\", custom.id)\npulumi.export(\"contributorRoleDefinitionId\", builtin.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var customRoleDefinition = new Azure.Authorization.RoleDefinition(\"custom\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"CustomRoleDef\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var custom = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n RoleDefinitionId = customRoleDefinition.RoleDefinitionId,\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var custom_byname = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = customRoleDefinition.Name,\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Contributor\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"customRoleDefinitionId\"] = custom.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n [\"contributorRoleDefinitionId\"] = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustomRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"custom\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"CustomRoleDef\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustom := customRoleDefinition.RoleDefinitionId.ApplyT(func(roleDefinitionId string) (authorization.GetRoleDefinitionResult, error) {\n\t\t\treturn authorization.GetRoleDefinitionResult(interface{}(authorization.LookupRoleDefinitionOutput(ctx, authorization.GetRoleDefinitionOutputArgs{\n\t\t\t\tRoleDefinitionId: roleDefinitionId,\n\t\t\t\tScope: primary.Id,\n\t\t\t}, nil))), nil\n\t\t}).(authorization.GetRoleDefinitionResultOutput)\n\t\t_ = customRoleDefinition.Name.ApplyT(func(name string) (authorization.GetRoleDefinitionResult, error) {\n\t\t\treturn authorization.GetRoleDefinitionResult(interface{}(authorization.LookupRoleDefinitionOutput(ctx, authorization.GetRoleDefinitionOutputArgs{\n\t\t\t\tName: name,\n\t\t\t\tScope: primary.Id,\n\t\t\t}, nil))), nil\n\t\t}).(authorization.GetRoleDefinitionResultOutput)\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Contributor\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"customRoleDefinitionId\", custom.ApplyT(func(custom authorization.GetRoleDefinitionResult) (*string, error) {\n\t\t\treturn \u0026custom.Id, nil\n\t\t}).(pulumi.StringPtrOutput))\n\t\tctx.Export(\"contributorRoleDefinitionId\", builtin.Id)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var customRoleDefinition = new RoleDefinition(\"customRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"CustomRoleDef\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var custom = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .roleDefinitionId(customRoleDefinition.roleDefinitionId())\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var custom-byname = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(customRoleDefinition.name())\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Contributor\")\n .build());\n\n ctx.export(\"customRoleDefinitionId\", custom.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult).applyValue(custom -\u003e custom.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())));\n ctx.export(\"contributorRoleDefinitionId\", builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()));\n }\n}\n```\n```yaml\nresources:\n customRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: custom\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: CustomRoleDef\n scope: ${primary.id}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n custom:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n roleDefinitionId: ${customRoleDefinition.roleDefinitionId}\n scope: ${primary.id}\n custom-byname:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: ${customRoleDefinition.name}\n scope: ${primary.id}\n builtin:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Contributor\noutputs:\n customRoleDefinitionId: ${custom.id}\n contributorRoleDefinitionId: ${builtin.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access information about an existing Role Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst customRoleDefinition = new azure.authorization.RoleDefinition(\"custom\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"CustomRoleDef\",\n scope: primary.then(primary =\u003e primary.id),\n});\nconst custom = pulumi.all([customRoleDefinition.roleDefinitionId, primary]).apply(([roleDefinitionId, primary]) =\u003e azure.authorization.getRoleDefinitionOutput({\n roleDefinitionId: roleDefinitionId,\n scope: primary.id,\n}));\nconst custom-byname = pulumi.all([customRoleDefinition.name, primary]).apply(([name, primary]) =\u003e azure.authorization.getRoleDefinitionOutput({\n name: name,\n scope: primary.id,\n}));\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Contributor\",\n});\nexport const customRoleDefinitionId = custom.apply(custom =\u003e custom.id);\nexport const contributorRoleDefinitionId = builtin.then(builtin =\u003e builtin.id);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\ncustom_role_definition = azure.authorization.RoleDefinition(\"custom\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"CustomRoleDef\",\n scope=primary.id)\ncustom = custom_role_definition.role_definition_id.apply(lambda role_definition_id: azure.authorization.get_role_definition_output(role_definition_id=role_definition_id,\n scope=primary.id))\ncustom_byname = custom_role_definition.name.apply(lambda name: azure.authorization.get_role_definition_output(name=name,\n scope=primary.id))\nbuiltin = azure.authorization.get_role_definition(name=\"Contributor\")\npulumi.export(\"customRoleDefinitionId\", custom.id)\npulumi.export(\"contributorRoleDefinitionId\", builtin.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var customRoleDefinition = new Azure.Authorization.RoleDefinition(\"custom\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"CustomRoleDef\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var custom = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n RoleDefinitionId = customRoleDefinition.RoleDefinitionId,\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var custom_byname = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = customRoleDefinition.Name,\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Contributor\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"customRoleDefinitionId\"] = custom.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n [\"contributorRoleDefinitionId\"] = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustomRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"custom\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"CustomRoleDef\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustom := customRoleDefinition.RoleDefinitionId.ApplyT(func(roleDefinitionId string) (authorization.GetRoleDefinitionResult, error) {\n\t\t\treturn authorization.GetRoleDefinitionResult(interface{}(authorization.LookupRoleDefinitionOutput(ctx, authorization.GetRoleDefinitionOutputArgs{\n\t\t\t\tRoleDefinitionId: roleDefinitionId,\n\t\t\t\tScope: primary.Id,\n\t\t\t}, nil))), nil\n\t\t}).(authorization.GetRoleDefinitionResultOutput)\n\t\t_ = customRoleDefinition.Name.ApplyT(func(name string) (authorization.GetRoleDefinitionResult, error) {\n\t\t\treturn authorization.GetRoleDefinitionResult(interface{}(authorization.LookupRoleDefinitionOutput(ctx, authorization.GetRoleDefinitionOutputArgs{\n\t\t\t\tName: name,\n\t\t\t\tScope: primary.Id,\n\t\t\t}, nil))), nil\n\t\t}).(authorization.GetRoleDefinitionResultOutput)\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Contributor\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"customRoleDefinitionId\", custom.ApplyT(func(custom authorization.GetRoleDefinitionResult) (*string, error) {\n\t\t\treturn \u0026custom.Id, nil\n\t\t}).(pulumi.StringPtrOutput))\n\t\tctx.Export(\"contributorRoleDefinitionId\", builtin.Id)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var customRoleDefinition = new RoleDefinition(\"customRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"CustomRoleDef\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var custom = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .roleDefinitionId(customRoleDefinition.roleDefinitionId())\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var custom-byname = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(customRoleDefinition.name())\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Contributor\")\n .build());\n\n ctx.export(\"customRoleDefinitionId\", custom.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult).applyValue(custom -\u003e custom.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())));\n ctx.export(\"contributorRoleDefinitionId\", builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()));\n }\n}\n```\n```yaml\nresources:\n customRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: custom\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: CustomRoleDef\n scope: ${primary.id}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n custom:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n roleDefinitionId: ${customRoleDefinition.roleDefinitionId}\n scope: ${primary.id}\n custom-byname:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: ${customRoleDefinition.name}\n scope: ${primary.id}\n builtin:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Contributor\noutputs:\n customRoleDefinitionId: ${custom.id}\n contributorRoleDefinitionId: ${builtin.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getRoleDefinition.\n", "properties": { @@ -270851,7 +270851,7 @@ } }, "azure:blueprint/getDefinition:getDefinition": { - "description": "Use this data source to access information about an existing Azure Blueprint Definition\n\n\u003e **NOTE:** Azure Blueprints are in Preview and potentially subject to breaking change without notice.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst root = current.then(current =\u003e azure.management.getGroup({\n name: current.tenantId,\n}));\nconst example = root.then(root =\u003e azure.blueprint.getDefinition({\n name: \"exampleManagementGroupBP\",\n scopeId: root.id,\n}));\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nroot = azure.management.get_group(name=current.tenant_id)\nexample = azure.blueprint.get_definition(name=\"exampleManagementGroupBP\",\n scope_id=root.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var root = Azure.Management.GetGroup.Invoke(new()\n {\n Name = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n var example = Azure.Blueprint.GetDefinition.Invoke(new()\n {\n Name = \"exampleManagementGroupBP\",\n ScopeId = root.Apply(getGroupResult =\u003e getGroupResult.Id),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/blueprint\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troot, err := management.LookupGroup(ctx, \u0026management.LookupGroupArgs{\n\t\t\tName: pulumi.StringRef(current.TenantId),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = blueprint.GetDefinition(ctx, \u0026blueprint.GetDefinitionArgs{\n\t\t\tName: \"exampleManagementGroupBP\",\n\t\t\tScopeId: root.Id,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.management.ManagementFunctions;\nimport com.pulumi.azure.management.inputs.GetGroupArgs;\nimport com.pulumi.azure.blueprint.BlueprintFunctions;\nimport com.pulumi.azure.blueprint.inputs.GetDefinitionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var root = ManagementFunctions.getGroup(GetGroupArgs.builder()\n .name(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n final var example = BlueprintFunctions.getDefinition(GetDefinitionArgs.builder()\n .name(\"exampleManagementGroupBP\")\n .scopeId(root.applyValue(getGroupResult -\u003e getGroupResult.id()))\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n root:\n fn::invoke:\n Function: azure:management:getGroup\n Arguments:\n name: ${current.tenantId}\n example:\n fn::invoke:\n Function: azure:blueprint:getDefinition\n Arguments:\n name: exampleManagementGroupBP\n scopeId: ${root.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access information about an existing Azure Blueprint Definition\n\n\u003e **NOTE:** Azure Blueprints are in Preview and potentially subject to breaking change without notice.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nconst root = current.then(current =\u003e azure.management.getGroup({\n name: current.tenantId,\n}));\nconst example = root.then(root =\u003e azure.blueprint.getDefinition({\n name: \"exampleManagementGroupBP\",\n scopeId: root.id,\n}));\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\nroot = azure.management.get_group(name=current.tenant_id)\nexample = azure.blueprint.get_definition(name=\"exampleManagementGroupBP\",\n scope_id=root.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n var root = Azure.Management.GetGroup.Invoke(new()\n {\n Name = current.Apply(getClientConfigResult =\u003e getClientConfigResult.TenantId),\n });\n\n var example = Azure.Blueprint.GetDefinition.Invoke(new()\n {\n Name = \"exampleManagementGroupBP\",\n ScopeId = root.Apply(getGroupResult =\u003e getGroupResult.Id),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/blueprint\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/management\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troot, err := management.LookupGroup(ctx, \u0026management.LookupGroupArgs{\n\t\t\tName: pulumi.StringRef(current.TenantId),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = blueprint.GetDefinition(ctx, \u0026blueprint.GetDefinitionArgs{\n\t\t\tName: \"exampleManagementGroupBP\",\n\t\t\tScopeId: root.Id,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.management.ManagementFunctions;\nimport com.pulumi.azure.management.inputs.GetGroupArgs;\nimport com.pulumi.azure.blueprint.BlueprintFunctions;\nimport com.pulumi.azure.blueprint.inputs.GetDefinitionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n final var root = ManagementFunctions.getGroup(GetGroupArgs.builder()\n .name(current.applyValue(getClientConfigResult -\u003e getClientConfigResult.tenantId()))\n .build());\n\n final var example = BlueprintFunctions.getDefinition(GetDefinitionArgs.builder()\n .name(\"exampleManagementGroupBP\")\n .scopeId(root.applyValue(getGroupResult -\u003e getGroupResult.id()))\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\n root:\n fn::invoke:\n Function: azure:management:getGroup\n Arguments:\n name: ${current.tenantId}\n example:\n fn::invoke:\n Function: azure:blueprint:getDefinition\n Arguments:\n name: exampleManagementGroupBP\n scopeId: ${root.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getDefinition.\n", "properties": { @@ -270926,7 +270926,7 @@ } }, "azure:blueprint/getPublishedVersion:getPublishedVersion": { - "description": "Use this data source to access information about an existing Blueprint Published Version\n\n\u003e **NOTE:** Azure Blueprints are in Preview and potentially subject to breaking change without notice.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst test = current.then(current =\u003e azure.blueprint.getPublishedVersion({\n scopeId: current.id,\n blueprintName: \"exampleBluePrint\",\n version: \"dev_v2.3\",\n}));\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\ntest = azure.blueprint.get_published_version(scope_id=current.id,\n blueprint_name=\"exampleBluePrint\",\n version=\"dev_v2.3\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var test = Azure.Blueprint.GetPublishedVersion.Invoke(new()\n {\n ScopeId = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n BlueprintName = \"exampleBluePrint\",\n Version = \"dev_v2.3\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/blueprint\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = blueprint.GetPublishedVersion(ctx, \u0026blueprint.GetPublishedVersionArgs{\n\t\t\tScopeId: current.Id,\n\t\t\tBlueprintName: \"exampleBluePrint\",\n\t\t\tVersion: \"dev_v2.3\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.blueprint.BlueprintFunctions;\nimport com.pulumi.azure.blueprint.inputs.GetPublishedVersionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n final var test = BlueprintFunctions.getPublishedVersion(GetPublishedVersionArgs.builder()\n .scopeId(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .blueprintName(\"exampleBluePrint\")\n .version(\"dev_v2.3\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n test:\n fn::invoke:\n Function: azure:blueprint:getPublishedVersion\n Arguments:\n scopeId: ${current.id}\n blueprintName: exampleBluePrint\n version: dev_v2.3\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access information about an existing Blueprint Published Version\n\n\u003e **NOTE:** Azure Blueprints are in Preview and potentially subject to breaking change without notice.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nconst test = current.then(current =\u003e azure.blueprint.getPublishedVersion({\n scopeId: current.id,\n blueprintName: \"exampleBluePrint\",\n version: \"dev_v2.3\",\n}));\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\ntest = azure.blueprint.get_published_version(scope_id=current.id,\n blueprint_name=\"exampleBluePrint\",\n version=\"dev_v2.3\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n var test = Azure.Blueprint.GetPublishedVersion.Invoke(new()\n {\n ScopeId = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n BlueprintName = \"exampleBluePrint\",\n Version = \"dev_v2.3\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/blueprint\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = blueprint.GetPublishedVersion(ctx, \u0026blueprint.GetPublishedVersionArgs{\n\t\t\tScopeId: current.Id,\n\t\t\tBlueprintName: \"exampleBluePrint\",\n\t\t\tVersion: \"dev_v2.3\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.blueprint.BlueprintFunctions;\nimport com.pulumi.azure.blueprint.inputs.GetPublishedVersionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n final var test = BlueprintFunctions.getPublishedVersion(GetPublishedVersionArgs.builder()\n .scopeId(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .blueprintName(\"exampleBluePrint\")\n .version(\"dev_v2.3\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n test:\n fn::invoke:\n Function: azure:blueprint:getPublishedVersion\n Arguments:\n scopeId: ${current.id}\n blueprintName: exampleBluePrint\n version: dev_v2.3\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getPublishedVersion.\n", "properties": { @@ -274852,7 +274852,7 @@ } }, "azure:core/getClientConfig:getClientConfig": { - "description": "Use this data source to access the configuration of the AzureRM provider.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nexport const accountId = current.then(current =\u003e current.clientId);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\npulumi.export(\"accountId\", current.client_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"accountId\"] = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"accountId\", current.ClientId)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n ctx.export(\"accountId\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()));\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\noutputs:\n accountId: ${current.clientId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access the configuration of the AzureRM provider.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getClientConfig({});\nexport const accountId = current.then(current =\u003e current.clientId);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_client_config()\npulumi.export(\"accountId\", current.client_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetClientConfig.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"accountId\"] = current.Apply(getClientConfigResult =\u003e getClientConfigResult.ClientId),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"accountId\", current.ClientId)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getClientConfig();\n\n ctx.export(\"accountId\", current.applyValue(getClientConfigResult -\u003e getClientConfigResult.clientId()));\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getClientConfig\n Arguments: {}\noutputs:\n accountId: ${current.clientId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "outputs": { "description": "A collection of values returned by getClientConfig.\n", "properties": { @@ -275142,7 +275142,7 @@ } }, "azure:core/getSubscription:getSubscription": { - "description": "Use this data source to access information about an existing Subscription.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nexport const currentSubscriptionDisplayName = current.then(current =\u003e current.displayName);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\npulumi.export(\"currentSubscriptionDisplayName\", current.display_name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"currentSubscriptionDisplayName\"] = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.DisplayName),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"currentSubscriptionDisplayName\", current.DisplayName)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n ctx.export(\"currentSubscriptionDisplayName\", current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.displayName()));\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\noutputs:\n currentSubscriptionDisplayName: ${current.displayName}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access information about an existing Subscription.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst current = azure.core.getSubscription({});\nexport const currentSubscriptionDisplayName = current.then(current =\u003e current.displayName);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\ncurrent = azure.core.get_subscription()\npulumi.export(\"currentSubscriptionDisplayName\", current.display_name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Azure.Core.GetSubscription.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"currentSubscriptionDisplayName\"] = current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.DisplayName),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"currentSubscriptionDisplayName\", current.DisplayName)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = CoreFunctions.getSubscription();\n\n ctx.export(\"currentSubscriptionDisplayName\", current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.displayName()));\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\noutputs:\n currentSubscriptionDisplayName: ${current.displayName}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getSubscription.\n", "properties": { @@ -275249,7 +275249,7 @@ } }, "azure:core/getSubscriptions:getSubscriptions": { - "description": "Use this data source to access information about all the Subscriptions currently available.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst available = azure.core.getSubscriptions({});\nexport const availableSubscriptions = available.then(available =\u003e available.subscriptions);\nexport const firstAvailableSubscriptionDisplayName = available.then(available =\u003e available.subscriptions?.[0]?.displayName);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\navailable = azure.core.get_subscriptions()\npulumi.export(\"availableSubscriptions\", available.subscriptions)\npulumi.export(\"firstAvailableSubscriptionDisplayName\", available.subscriptions[0].display_name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var available = Azure.Core.GetSubscriptions.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"availableSubscriptions\"] = available.Apply(getSubscriptionsResult =\u003e getSubscriptionsResult.Subscriptions),\n [\"firstAvailableSubscriptionDisplayName\"] = available.Apply(getSubscriptionsResult =\u003e getSubscriptionsResult.Subscriptions[0]?.DisplayName),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tavailable, err := core.GetSubscriptions(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"availableSubscriptions\", available.Subscriptions)\n\t\tctx.Export(\"firstAvailableSubscriptionDisplayName\", available.Subscriptions[0].DisplayName)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var available = CoreFunctions.getSubscriptions();\n\n ctx.export(\"availableSubscriptions\", available.applyValue(getSubscriptionsResult -\u003e getSubscriptionsResult.subscriptions()));\n ctx.export(\"firstAvailableSubscriptionDisplayName\", available.applyValue(getSubscriptionsResult -\u003e getSubscriptionsResult.subscriptions()[0].displayName()));\n }\n}\n```\n```yaml\nvariables:\n available:\n fn::invoke:\n Function: azure:core:getSubscriptions\n Arguments: {}\noutputs:\n availableSubscriptions: ${available.subscriptions}\n firstAvailableSubscriptionDisplayName: ${available.subscriptions[0].displayName}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access information about all the Subscriptions currently available.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst available = azure.core.getSubscriptions({});\nexport const availableSubscriptions = available.then(available =\u003e available.subscriptions);\nexport const firstAvailableSubscriptionDisplayName = available.then(available =\u003e available.subscriptions?.[0]?.displayName);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\navailable = azure.core.get_subscriptions()\npulumi.export(\"availableSubscriptions\", available.subscriptions)\npulumi.export(\"firstAvailableSubscriptionDisplayName\", available.subscriptions[0].display_name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var available = Azure.Core.GetSubscriptions.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"availableSubscriptions\"] = available.Apply(getSubscriptionsResult =\u003e getSubscriptionsResult.Subscriptions),\n [\"firstAvailableSubscriptionDisplayName\"] = available.Apply(getSubscriptionsResult =\u003e getSubscriptionsResult.Subscriptions[0]?.DisplayName),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tavailable, err := core.GetSubscriptions(ctx, \u0026core.GetSubscriptionsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"availableSubscriptions\", available.Subscriptions)\n\t\tctx.Export(\"firstAvailableSubscriptionDisplayName\", available.Subscriptions[0].DisplayName)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var available = CoreFunctions.getSubscriptions();\n\n ctx.export(\"availableSubscriptions\", available.applyValue(getSubscriptionsResult -\u003e getSubscriptionsResult.subscriptions()));\n ctx.export(\"firstAvailableSubscriptionDisplayName\", available.applyValue(getSubscriptionsResult -\u003e getSubscriptionsResult.subscriptions()[0].displayName()));\n }\n}\n```\n```yaml\nvariables:\n available:\n fn::invoke:\n Function: azure:core:getSubscriptions\n Arguments: {}\noutputs:\n availableSubscriptions: ${available.subscriptions}\n firstAvailableSubscriptionDisplayName: ${available.subscriptions[0].displayName}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getSubscriptions.\n", "properties": { @@ -287795,7 +287795,7 @@ } }, "azure:network/getNetworkManager:getNetworkManager": { - "description": "Use this data source to access information about a Network Manager.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst example = azure.network.getNetworkManagerOutput({\n name: exampleNetworkManager.name,\n resourceGroupName: exampleNetworkManager.resourceGroupName,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample = azure.network.get_network_manager_output(name=example_network_manager.name,\n resource_group_name=example_network_manager.resource_group_name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var example = Azure.Network.GetNetworkManager.Invoke(new()\n {\n Name = exampleNetworkManager.Name,\n ResourceGroupName = exampleNetworkManager.ResourceGroupName,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = network.LookupNetworkManagerOutput(ctx, network.GetNetworkManagerOutputArgs{\n\t\t\tName: exampleNetworkManager.Name,\n\t\t\tResourceGroupName: exampleNetworkManager.ResourceGroupName,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkFunctions;\nimport com.pulumi.azure.network.inputs.GetNetworkManagerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n final var example = NetworkFunctions.getNetworkManager(GetNetworkManagerArgs.builder()\n .name(exampleNetworkManager.name())\n .resourceGroupName(exampleNetworkManager.resourceGroupName())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:network:getNetworkManager\n Arguments:\n name: ${exampleNetworkManager.name}\n resourceGroupName: ${exampleNetworkManager.resourceGroupName}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access information about a Network Manager.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst example = azure.network.getNetworkManagerOutput({\n name: exampleNetworkManager.name,\n resourceGroupName: exampleNetworkManager.resourceGroupName,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample = azure.network.get_network_manager_output(name=example_network_manager.name,\n resource_group_name=example_network_manager.resource_group_name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var example = Azure.Network.GetNetworkManager.Invoke(new()\n {\n Name = exampleNetworkManager.Name,\n ResourceGroupName = exampleNetworkManager.ResourceGroupName,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = network.LookupNetworkManagerOutput(ctx, network.GetNetworkManagerOutputArgs{\n\t\t\tName: exampleNetworkManager.Name,\n\t\t\tResourceGroupName: exampleNetworkManager.ResourceGroupName,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkFunctions;\nimport com.pulumi.azure.network.inputs.GetNetworkManagerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n final var example = NetworkFunctions.getNetworkManager(GetNetworkManagerArgs.builder()\n .name(exampleNetworkManager.name())\n .resourceGroupName(exampleNetworkManager.resourceGroupName())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:network:getNetworkManager\n Arguments:\n name: ${exampleNetworkManager.name}\n resourceGroupName: ${exampleNetworkManager.resourceGroupName}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getNetworkManager.\n", "properties": { @@ -287957,7 +287957,7 @@ } }, "azure:network/getNetworkManagerNetworkGroup:getNetworkManagerNetworkGroup": { - "description": "Use this data source to access information about a Network Manager Network Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst example = azure.network.getNetworkManagerNetworkGroupOutput({\n name: exampleNetworkManagerNetworkGroup.name,\n networkManagerId: exampleNetworkManager.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\nexample = azure.network.get_network_manager_network_group_output(name=example_network_manager_network_group.name,\n network_manager_id=example_network_manager.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var example = Azure.Network.GetNetworkManagerNetworkGroup.Invoke(new()\n {\n Name = exampleNetworkManagerNetworkGroup.Name,\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = network.LookupNetworkManagerNetworkGroupOutput(ctx, network.GetNetworkManagerNetworkGroupOutputArgs{\n\t\t\tName: exampleNetworkManagerNetworkGroup.Name,\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.NetworkFunctions;\nimport com.pulumi.azure.network.inputs.GetNetworkManagerNetworkGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n final var example = NetworkFunctions.getNetworkManagerNetworkGroup(GetNetworkManagerNetworkGroupArgs.builder()\n .name(exampleNetworkManagerNetworkGroup.name())\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:network:getNetworkManagerNetworkGroup\n Arguments:\n name: ${exampleNetworkManagerNetworkGroup.name}\n networkManagerId: ${exampleNetworkManager.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access information about a Network Manager Network Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst exampleResourceGroup = new azure.core.ResourceGroup(\"example\", {\n name: \"example-resources\",\n location: \"West Europe\",\n});\nconst current = azure.core.getSubscription({});\nconst exampleNetworkManager = new azure.network.NetworkManager(\"example\", {\n name: \"example-network-manager\",\n location: exampleResourceGroup.location,\n resourceGroupName: exampleResourceGroup.name,\n scope: {\n subscriptionIds: [current.then(current =\u003e current.id)],\n },\n scopeAccesses: [\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description: \"example network manager\",\n});\nconst exampleNetworkManagerNetworkGroup = new azure.network.NetworkManagerNetworkGroup(\"example\", {\n name: \"example-group\",\n networkManagerId: exampleNetworkManager.id,\n});\nconst example = azure.network.getNetworkManagerNetworkGroupOutput({\n name: exampleNetworkManagerNetworkGroup.name,\n networkManagerId: exampleNetworkManager.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nexample_resource_group = azure.core.ResourceGroup(\"example\",\n name=\"example-resources\",\n location=\"West Europe\")\ncurrent = azure.core.get_subscription()\nexample_network_manager = azure.network.NetworkManager(\"example\",\n name=\"example-network-manager\",\n location=example_resource_group.location,\n resource_group_name=example_resource_group.name,\n scope={\n \"subscription_ids\": [current.id],\n },\n scope_accesses=[\n \"Connectivity\",\n \"SecurityAdmin\",\n ],\n description=\"example network manager\")\nexample_network_manager_network_group = azure.network.NetworkManagerNetworkGroup(\"example\",\n name=\"example-group\",\n network_manager_id=example_network_manager.id)\nexample = azure.network.get_network_manager_network_group_output(name=example_network_manager_network_group.name,\n network_manager_id=example_network_manager.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleResourceGroup = new Azure.Core.ResourceGroup(\"example\", new()\n {\n Name = \"example-resources\",\n Location = \"West Europe\",\n });\n\n var current = Azure.Core.GetSubscription.Invoke();\n\n var exampleNetworkManager = new Azure.Network.NetworkManager(\"example\", new()\n {\n Name = \"example-network-manager\",\n Location = exampleResourceGroup.Location,\n ResourceGroupName = exampleResourceGroup.Name,\n Scope = new Azure.Network.Inputs.NetworkManagerScopeArgs\n {\n SubscriptionIds = new[]\n {\n current.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n },\n },\n ScopeAccesses = new[]\n {\n \"Connectivity\",\n \"SecurityAdmin\",\n },\n Description = \"example network manager\",\n });\n\n var exampleNetworkManagerNetworkGroup = new Azure.Network.NetworkManagerNetworkGroup(\"example\", new()\n {\n Name = \"example-group\",\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n var example = Azure.Network.GetNetworkManagerNetworkGroup.Invoke(new()\n {\n Name = exampleNetworkManagerNetworkGroup.Name,\n NetworkManagerId = exampleNetworkManager.Id,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/network\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texampleResourceGroup, err := core.NewResourceGroup(ctx, \"example\", \u0026core.ResourceGroupArgs{\n\t\t\tName: pulumi.String(\"example-resources\"),\n\t\t\tLocation: pulumi.String(\"West Europe\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcurrent, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManager, err := network.NewNetworkManager(ctx, \"example\", \u0026network.NetworkManagerArgs{\n\t\t\tName: pulumi.String(\"example-network-manager\"),\n\t\t\tLocation: exampleResourceGroup.Location,\n\t\t\tResourceGroupName: exampleResourceGroup.Name,\n\t\t\tScope: \u0026network.NetworkManagerScopeArgs{\n\t\t\t\tSubscriptionIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(current.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tScopeAccesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Connectivity\"),\n\t\t\t\tpulumi.String(\"SecurityAdmin\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"example network manager\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\texampleNetworkManagerNetworkGroup, err := network.NewNetworkManagerNetworkGroup(ctx, \"example\", \u0026network.NetworkManagerNetworkGroupArgs{\n\t\t\tName: pulumi.String(\"example-group\"),\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = network.LookupNetworkManagerNetworkGroupOutput(ctx, network.GetNetworkManagerNetworkGroupOutputArgs{\n\t\t\tName: exampleNetworkManagerNetworkGroup.Name,\n\t\t\tNetworkManagerId: exampleNetworkManager.ID(),\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.ResourceGroup;\nimport com.pulumi.azure.core.ResourceGroupArgs;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.network.NetworkManager;\nimport com.pulumi.azure.network.NetworkManagerArgs;\nimport com.pulumi.azure.network.inputs.NetworkManagerScopeArgs;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroup;\nimport com.pulumi.azure.network.NetworkManagerNetworkGroupArgs;\nimport com.pulumi.azure.network.NetworkFunctions;\nimport com.pulumi.azure.network.inputs.GetNetworkManagerNetworkGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var exampleResourceGroup = new ResourceGroup(\"exampleResourceGroup\", ResourceGroupArgs.builder()\n .name(\"example-resources\")\n .location(\"West Europe\")\n .build());\n\n final var current = CoreFunctions.getSubscription();\n\n var exampleNetworkManager = new NetworkManager(\"exampleNetworkManager\", NetworkManagerArgs.builder()\n .name(\"example-network-manager\")\n .location(exampleResourceGroup.location())\n .resourceGroupName(exampleResourceGroup.name())\n .scope(NetworkManagerScopeArgs.builder()\n .subscriptionIds(current.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build())\n .scopeAccesses( \n \"Connectivity\",\n \"SecurityAdmin\")\n .description(\"example network manager\")\n .build());\n\n var exampleNetworkManagerNetworkGroup = new NetworkManagerNetworkGroup(\"exampleNetworkManagerNetworkGroup\", NetworkManagerNetworkGroupArgs.builder()\n .name(\"example-group\")\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n final var example = NetworkFunctions.getNetworkManagerNetworkGroup(GetNetworkManagerNetworkGroupArgs.builder()\n .name(exampleNetworkManagerNetworkGroup.name())\n .networkManagerId(exampleNetworkManager.id())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n exampleResourceGroup:\n type: azure:core:ResourceGroup\n name: example\n properties:\n name: example-resources\n location: West Europe\n exampleNetworkManager:\n type: azure:network:NetworkManager\n name: example\n properties:\n name: example-network-manager\n location: ${exampleResourceGroup.location}\n resourceGroupName: ${exampleResourceGroup.name}\n scope:\n subscriptionIds:\n - ${current.id}\n scopeAccesses:\n - Connectivity\n - SecurityAdmin\n description: example network manager\n exampleNetworkManagerNetworkGroup:\n type: azure:network:NetworkManagerNetworkGroup\n name: example\n properties:\n name: example-group\n networkManagerId: ${exampleNetworkManager.id}\nvariables:\n current:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n example:\n fn::invoke:\n Function: azure:network:getNetworkManagerNetworkGroup\n Arguments:\n name: ${exampleNetworkManagerNetworkGroup.name}\n networkManagerId: ${exampleNetworkManager.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getNetworkManagerNetworkGroup.\n", "properties": { @@ -292675,7 +292675,7 @@ }, "azure:role/getRoleDefinition:getRoleDefinition": { "deprecationMessage": "azure.role.getRoleDefinition has been deprecated in favor of azure.authorization.getRoleDefinition", - "description": "Use this data source to access information about an existing Role Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst customRoleDefinition = new azure.authorization.RoleDefinition(\"custom\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"CustomRoleDef\",\n scope: primary.then(primary =\u003e primary.id),\n});\nconst custom = pulumi.all([customRoleDefinition.roleDefinitionId, primary]).apply(([roleDefinitionId, primary]) =\u003e azure.authorization.getRoleDefinitionOutput({\n roleDefinitionId: roleDefinitionId,\n scope: primary.id,\n}));\nconst custom-byname = pulumi.all([customRoleDefinition.name, primary]).apply(([name, primary]) =\u003e azure.authorization.getRoleDefinitionOutput({\n name: name,\n scope: primary.id,\n}));\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Contributor\",\n});\nexport const customRoleDefinitionId = custom.apply(custom =\u003e custom.id);\nexport const contributorRoleDefinitionId = builtin.then(builtin =\u003e builtin.id);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\ncustom_role_definition = azure.authorization.RoleDefinition(\"custom\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"CustomRoleDef\",\n scope=primary.id)\ncustom = custom_role_definition.role_definition_id.apply(lambda role_definition_id: azure.authorization.get_role_definition_output(role_definition_id=role_definition_id,\n scope=primary.id))\ncustom_byname = custom_role_definition.name.apply(lambda name: azure.authorization.get_role_definition_output(name=name,\n scope=primary.id))\nbuiltin = azure.authorization.get_role_definition(name=\"Contributor\")\npulumi.export(\"customRoleDefinitionId\", custom.id)\npulumi.export(\"contributorRoleDefinitionId\", builtin.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var customRoleDefinition = new Azure.Authorization.RoleDefinition(\"custom\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"CustomRoleDef\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var custom = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n RoleDefinitionId = customRoleDefinition.RoleDefinitionId,\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var custom_byname = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = customRoleDefinition.Name,\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Contributor\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"customRoleDefinitionId\"] = custom.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n [\"contributorRoleDefinitionId\"] = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustomRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"custom\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"CustomRoleDef\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustom := customRoleDefinition.RoleDefinitionId.ApplyT(func(roleDefinitionId string) (authorization.GetRoleDefinitionResult, error) {\n\t\t\treturn authorization.GetRoleDefinitionResult(interface{}(authorization.LookupRoleDefinitionOutput(ctx, authorization.GetRoleDefinitionOutputArgs{\n\t\t\t\tRoleDefinitionId: roleDefinitionId,\n\t\t\t\tScope: primary.Id,\n\t\t\t}, nil))), nil\n\t\t}).(authorization.GetRoleDefinitionResultOutput)\n\t\t_ = customRoleDefinition.Name.ApplyT(func(name string) (authorization.GetRoleDefinitionResult, error) {\n\t\t\treturn authorization.GetRoleDefinitionResult(interface{}(authorization.LookupRoleDefinitionOutput(ctx, authorization.GetRoleDefinitionOutputArgs{\n\t\t\t\tName: name,\n\t\t\t\tScope: primary.Id,\n\t\t\t}, nil))), nil\n\t\t}).(authorization.GetRoleDefinitionResultOutput)\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Contributor\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"customRoleDefinitionId\", custom.ApplyT(func(custom authorization.GetRoleDefinitionResult) (*string, error) {\n\t\t\treturn \u0026custom.Id, nil\n\t\t}).(pulumi.StringPtrOutput))\n\t\tctx.Export(\"contributorRoleDefinitionId\", builtin.Id)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var customRoleDefinition = new RoleDefinition(\"customRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"CustomRoleDef\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var custom = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .roleDefinitionId(customRoleDefinition.roleDefinitionId())\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var custom-byname = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(customRoleDefinition.name())\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Contributor\")\n .build());\n\n ctx.export(\"customRoleDefinitionId\", custom.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult).applyValue(custom -\u003e custom.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())));\n ctx.export(\"contributorRoleDefinitionId\", builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()));\n }\n}\n```\n```yaml\nresources:\n customRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: custom\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: CustomRoleDef\n scope: ${primary.id}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n custom:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n roleDefinitionId: ${customRoleDefinition.roleDefinitionId}\n scope: ${primary.id}\n custom-byname:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: ${customRoleDefinition.name}\n scope: ${primary.id}\n builtin:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Contributor\noutputs:\n customRoleDefinitionId: ${custom.id}\n contributorRoleDefinitionId: ${builtin.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Use this data source to access information about an existing Role Definition.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as azure from \"@pulumi/azure\";\n\nconst primary = azure.core.getSubscription({});\nconst customRoleDefinition = new azure.authorization.RoleDefinition(\"custom\", {\n roleDefinitionId: \"00000000-0000-0000-0000-000000000000\",\n name: \"CustomRoleDef\",\n scope: primary.then(primary =\u003e primary.id),\n});\nconst custom = pulumi.all([customRoleDefinition.roleDefinitionId, primary]).apply(([roleDefinitionId, primary]) =\u003e azure.authorization.getRoleDefinitionOutput({\n roleDefinitionId: roleDefinitionId,\n scope: primary.id,\n}));\nconst custom-byname = pulumi.all([customRoleDefinition.name, primary]).apply(([name, primary]) =\u003e azure.authorization.getRoleDefinitionOutput({\n name: name,\n scope: primary.id,\n}));\nconst builtin = azure.authorization.getRoleDefinition({\n name: \"Contributor\",\n});\nexport const customRoleDefinitionId = custom.apply(custom =\u003e custom.id);\nexport const contributorRoleDefinitionId = builtin.then(builtin =\u003e builtin.id);\n```\n```python\nimport pulumi\nimport pulumi_azure as azure\n\nprimary = azure.core.get_subscription()\ncustom_role_definition = azure.authorization.RoleDefinition(\"custom\",\n role_definition_id=\"00000000-0000-0000-0000-000000000000\",\n name=\"CustomRoleDef\",\n scope=primary.id)\ncustom = custom_role_definition.role_definition_id.apply(lambda role_definition_id: azure.authorization.get_role_definition_output(role_definition_id=role_definition_id,\n scope=primary.id))\ncustom_byname = custom_role_definition.name.apply(lambda name: azure.authorization.get_role_definition_output(name=name,\n scope=primary.id))\nbuiltin = azure.authorization.get_role_definition(name=\"Contributor\")\npulumi.export(\"customRoleDefinitionId\", custom.id)\npulumi.export(\"contributorRoleDefinitionId\", builtin.id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Azure = Pulumi.Azure;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var primary = Azure.Core.GetSubscription.Invoke();\n\n var customRoleDefinition = new Azure.Authorization.RoleDefinition(\"custom\", new()\n {\n RoleDefinitionId = \"00000000-0000-0000-0000-000000000000\",\n Name = \"CustomRoleDef\",\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var custom = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n RoleDefinitionId = customRoleDefinition.RoleDefinitionId,\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var custom_byname = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = customRoleDefinition.Name,\n Scope = primary.Apply(getSubscriptionResult =\u003e getSubscriptionResult.Id),\n });\n\n var builtin = Azure.Authorization.GetRoleDefinition.Invoke(new()\n {\n Name = \"Contributor\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"customRoleDefinitionId\"] = custom.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n [\"contributorRoleDefinitionId\"] = builtin.Apply(getRoleDefinitionResult =\u003e getRoleDefinitionResult.Id),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization\"\n\t\"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tprimary, err := core.LookupSubscription(ctx, \u0026core.LookupSubscriptionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustomRoleDefinition, err := authorization.NewRoleDefinition(ctx, \"custom\", \u0026authorization.RoleDefinitionArgs{\n\t\t\tRoleDefinitionId: pulumi.String(\"00000000-0000-0000-0000-000000000000\"),\n\t\t\tName: pulumi.String(\"CustomRoleDef\"),\n\t\t\tScope: pulumi.String(primary.Id),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustom := customRoleDefinition.RoleDefinitionId.ApplyT(func(roleDefinitionId string) (authorization.GetRoleDefinitionResult, error) {\n\t\t\treturn authorization.GetRoleDefinitionResult(interface{}(authorization.LookupRoleDefinitionOutput(ctx, authorization.GetRoleDefinitionOutputArgs{\n\t\t\t\tRoleDefinitionId: roleDefinitionId,\n\t\t\t\tScope: primary.Id,\n\t\t\t}, nil))), nil\n\t\t}).(authorization.GetRoleDefinitionResultOutput)\n\t\t_ = customRoleDefinition.Name.ApplyT(func(name string) (authorization.GetRoleDefinitionResult, error) {\n\t\t\treturn authorization.GetRoleDefinitionResult(interface{}(authorization.LookupRoleDefinitionOutput(ctx, authorization.GetRoleDefinitionOutputArgs{\n\t\t\t\tName: name,\n\t\t\t\tScope: primary.Id,\n\t\t\t}, nil))), nil\n\t\t}).(authorization.GetRoleDefinitionResultOutput)\n\t\tbuiltin, err := authorization.LookupRoleDefinition(ctx, \u0026authorization.LookupRoleDefinitionArgs{\n\t\t\tName: pulumi.StringRef(\"Contributor\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"customRoleDefinitionId\", custom.ApplyT(func(custom authorization.GetRoleDefinitionResult) (*string, error) {\n\t\t\treturn \u0026custom.Id, nil\n\t\t}).(pulumi.StringPtrOutput))\n\t\tctx.Export(\"contributorRoleDefinitionId\", builtin.Id)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.azure.core.CoreFunctions;\nimport com.pulumi.azure.core.inputs.GetSubscriptionArgs;\nimport com.pulumi.azure.authorization.RoleDefinition;\nimport com.pulumi.azure.authorization.RoleDefinitionArgs;\nimport com.pulumi.azure.authorization.AuthorizationFunctions;\nimport com.pulumi.azure.authorization.inputs.GetRoleDefinitionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var primary = CoreFunctions.getSubscription();\n\n var customRoleDefinition = new RoleDefinition(\"customRoleDefinition\", RoleDefinitionArgs.builder()\n .roleDefinitionId(\"00000000-0000-0000-0000-000000000000\")\n .name(\"CustomRoleDef\")\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var custom = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .roleDefinitionId(customRoleDefinition.roleDefinitionId())\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var custom-byname = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(customRoleDefinition.name())\n .scope(primary.applyValue(getSubscriptionResult -\u003e getSubscriptionResult.id()))\n .build());\n\n final var builtin = AuthorizationFunctions.getRoleDefinition(GetRoleDefinitionArgs.builder()\n .name(\"Contributor\")\n .build());\n\n ctx.export(\"customRoleDefinitionId\", custom.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult).applyValue(custom -\u003e custom.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id())));\n ctx.export(\"contributorRoleDefinitionId\", builtin.applyValue(getRoleDefinitionResult -\u003e getRoleDefinitionResult.id()));\n }\n}\n```\n```yaml\nresources:\n customRoleDefinition:\n type: azure:authorization:RoleDefinition\n name: custom\n properties:\n roleDefinitionId: 00000000-0000-0000-0000-000000000000\n name: CustomRoleDef\n scope: ${primary.id}\nvariables:\n primary:\n fn::invoke:\n Function: azure:core:getSubscription\n Arguments: {}\n custom:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n roleDefinitionId: ${customRoleDefinition.roleDefinitionId}\n scope: ${primary.id}\n custom-byname:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: ${customRoleDefinition.name}\n scope: ${primary.id}\n builtin:\n fn::invoke:\n Function: azure:authorization:getRoleDefinition\n Arguments:\n name: Contributor\noutputs:\n customRoleDefinitionId: ${custom.id}\n contributorRoleDefinitionId: ${builtin.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getRoleDefinition.\n", "properties": { diff --git a/provider/go.mod b/provider/go.mod index 7a49c1d04d..bd69fd7b39 100644 --- a/provider/go.mod +++ b/provider/go.mod @@ -11,7 +11,7 @@ require ( github.com/hashicorp/terraform-provider-azurerm v1.44.1-0.20220923005104-eaa801c358ff github.com/pulumi/providertest v0.1.2 github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1 - github.com/pulumi/pulumi/sdk/v3 v3.133.0 + github.com/pulumi/pulumi/sdk/v3 v3.135.1 github.com/stretchr/testify v1.9.0 ) @@ -199,7 +199,7 @@ require ( github.com/pulumi/inflector v0.1.1 // indirect github.com/pulumi/pulumi-java/pkg v0.16.1 // indirect github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8 // indirect - github.com/pulumi/pulumi-yaml v1.10.0 // indirect + github.com/pulumi/pulumi-yaml v1.10.3 // indirect github.com/pulumi/pulumi/pkg/v3 v3.133.0 // indirect github.com/pulumi/schema-tools v0.1.2 // indirect github.com/pulumi/terraform-diff-reader v0.0.2 // indirect @@ -270,3 +270,7 @@ require ( lukechampine.com/frand v1.4.2 // indirect software.sslmate.com/src/go-pkcs12 v0.4.0 // indirect ) + +replace github.com/pulumi/pulumi/pkg/v3 => github.com/pulumi/pulumi/pkg/v3 v3.135.2-0.20241008001446-4b84f92c7cb8 + +replace github.com/pulumi/pulumi/sdk/v3 => github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8 diff --git a/provider/go.sum b/provider/go.sum index 35e25c3fde..2122fbd6e1 100644 --- a/provider/go.sum +++ b/provider/go.sum @@ -1968,12 +1968,12 @@ github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1 h1:Twh0IKS1pGHP6LHDq1oR0vbH github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1/go.mod h1:DvueDDtOIbf7W1Or4oH0o7F990ozp/ROmlm/vgLoe+g= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8 h1:mav2tSitA9BPJPLLahKgepHyYsMzwaTm4cvp0dcTMYw= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8/go.mod h1:qUYk2c9i/yqMGNj9/bQyXpS39BxNDSXYjVN1njnq0zY= -github.com/pulumi/pulumi-yaml v1.10.0 h1:djbgMJCxJBmYMr4kOpAXH5iauxGohYjEuTLfxD3NUUI= -github.com/pulumi/pulumi-yaml v1.10.0/go.mod h1://lTvwHpgJ+WBKeMGiLrd/jinc4dl3eWV5LZ3G8iCfE= -github.com/pulumi/pulumi/pkg/v3 v3.133.0 h1:j1rd7ToLZIQc5H0427ISOXSbOIIemZ6B0MXtRhQ38Yg= -github.com/pulumi/pulumi/pkg/v3 v3.133.0/go.mod h1:JtMAnrsFIccO138WcMfPdhO0PioDukKihnZC0xTRLwo= -github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ= -github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8= +github.com/pulumi/pulumi-yaml v1.10.3 h1:j5cjPiE32ILmjrWnC1cfZ0MWdqCZ8fg9wlaWk7HOtM4= +github.com/pulumi/pulumi-yaml v1.10.3/go.mod h1:MFMQXkaUP5YQUKVJ6Z/aagZDl2f8hdU9oGaJfTcMf1Y= +github.com/pulumi/pulumi/pkg/v3 v3.135.2-0.20241008001446-4b84f92c7cb8 h1:st3jSs0OucRb/Suy9DJY9EhGytx53fBO0eZDf42Vy0o= +github.com/pulumi/pulumi/pkg/v3 v3.135.2-0.20241008001446-4b84f92c7cb8/go.mod h1:WK3L4rXXuIR7ai1jA0ld4E7zfh3Fa/aty98vCDd1a1E= +github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8 h1:Jb8FbLpjvFctCkjBmoKaW4BA3VlmmvhRc3GJsv3n16o= +github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/pulumi/schema-tools v0.1.2 h1:Fd9xvUjgck4NA+7/jSk7InqCUT4Kj940+EcnbQKpfZo= github.com/pulumi/schema-tools v0.1.2/go.mod h1:62lgj52Tzq11eqWTIaKd+EVyYAu5dEcDJxMhTjvMO/k= github.com/pulumi/terraform-diff-reader v0.0.2 h1:kTE4nEXU3/SYXESvAIem+wyHMI3abqkI3OhJ0G04LLI= diff --git a/sdk/go.mod b/sdk/go.mod index 1685cbc599..e1f9f3aafc 100644 --- a/sdk/go.mod +++ b/sdk/go.mod @@ -91,3 +91,7 @@ require ( lukechampine.com/frand v1.4.2 // indirect pgregory.net/rapid v0.6.1 // indirect ) + +replace github.com/pulumi/pulumi/pkg/v3 => github.com/pulumi/pulumi/pkg/v3 v3.135.2-0.20241008001446-4b84f92c7cb8 + +replace github.com/pulumi/pulumi/sdk/v3 => github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8 diff --git a/sdk/go.sum b/sdk/go.sum index c2af39ab45..24fb0cc6f8 100644 --- a/sdk/go.sum +++ b/sdk/go.sum @@ -150,8 +150,8 @@ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435 github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE= github.com/pulumi/esc v0.9.1 h1:HH5eEv8sgyxSpY5a8yePyqFXzA8cvBvapfH8457+mIs= github.com/pulumi/esc v0.9.1/go.mod h1:oEJ6bOsjYlQUpjf70GiX+CXn3VBmpwFDxUTlmtUN84c= -github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ= -github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8= +github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8 h1:Jb8FbLpjvFctCkjBmoKaW4BA3VlmmvhRc3GJsv3n16o= +github.com/pulumi/pulumi/sdk/v3 v3.136.1-0.20241008001446-4b84f92c7cb8/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= diff --git a/sdk/go/azure/advisor/suppression.go b/sdk/go/azure/advisor/suppression.go index 3c84327fb3..c404b169ed 100644 --- a/sdk/go/azure/advisor/suppression.go +++ b/sdk/go/azure/advisor/suppression.go @@ -31,11 +31,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } -// _, err = advisor.GetRecommendations(ctx, nil, nil) +// _, err = advisor.GetRecommendations(ctx, &advisor.GetRecommendationsArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/apimanagement/certificate.go b/sdk/go/azure/apimanagement/certificate.go index 1126eac726..8a56ce6a81 100644 --- a/sdk/go/azure/apimanagement/certificate.go +++ b/sdk/go/azure/apimanagement/certificate.go @@ -88,7 +88,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/appconfiguration/configurationFeature.go b/sdk/go/azure/appconfiguration/configurationFeature.go index b897989c44..7e61704de1 100644 --- a/sdk/go/azure/appconfiguration/configurationFeature.go +++ b/sdk/go/azure/appconfiguration/configurationFeature.go @@ -47,7 +47,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/appconfiguration/configurationKey.go b/sdk/go/azure/appconfiguration/configurationKey.go index 2bdb37a104..924d94b331 100644 --- a/sdk/go/azure/appconfiguration/configurationKey.go +++ b/sdk/go/azure/appconfiguration/configurationKey.go @@ -49,7 +49,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -110,7 +110,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/appconfiguration/configurationStore.go b/sdk/go/azure/appconfiguration/configurationStore.go index 5f2241c5a5..eb1e0772a1 100644 --- a/sdk/go/azure/appconfiguration/configurationStore.go +++ b/sdk/go/azure/appconfiguration/configurationStore.go @@ -80,7 +80,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/appinsights/workbookTemplate.go b/sdk/go/azure/appinsights/workbookTemplate.go index 385b018883..7f770eae29 100644 --- a/sdk/go/azure/appinsights/workbookTemplate.go +++ b/sdk/go/azure/appinsights/workbookTemplate.go @@ -49,7 +49,7 @@ import ( // "name": "text - 2", // }, // }, -// "styleSettings": nil, +// "styleSettings": map[string]interface{}{}, // "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json", // }) // if err != nil { @@ -79,7 +79,7 @@ import ( // "name": "text - 2", // }, // }, -// "styleSettings": nil, +// "styleSettings": map[string]interface{}{}, // "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json", // }, // }, diff --git a/sdk/go/azure/appplatform/springCloudCertificate.go b/sdk/go/azure/appplatform/springCloudCertificate.go index e9ca46f652..714e610c26 100644 --- a/sdk/go/azure/appplatform/springCloudCertificate.go +++ b/sdk/go/azure/appplatform/springCloudCertificate.go @@ -38,7 +38,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/appplatform/springCloudDevToolPortal.go b/sdk/go/azure/appplatform/springCloudDevToolPortal.go index 62e185b066..e02a15d852 100644 --- a/sdk/go/azure/appplatform/springCloudDevToolPortal.go +++ b/sdk/go/azure/appplatform/springCloudDevToolPortal.go @@ -33,7 +33,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/appservice/functionAppActiveSlot.go b/sdk/go/azure/appservice/functionAppActiveSlot.go index f3d003d814..b0e52e82f7 100644 --- a/sdk/go/azure/appservice/functionAppActiveSlot.go +++ b/sdk/go/azure/appservice/functionAppActiveSlot.go @@ -65,7 +65,7 @@ import ( // Location: example.Location, // StorageAccountName: exampleAccount.Name, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsFunctionAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -74,7 +74,7 @@ import ( // Name: pulumi.String("example-windows-function-app-slot"), // FunctionAppId: exampleWindowsFunctionApp.ID(), // StorageAccountName: exampleAccount.Name, -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsFunctionAppSlotSiteConfigArgs{}, // }) // if err != nil { // return err @@ -140,7 +140,7 @@ import ( // Location: example.Location, // ServicePlanId: exampleServicePlan.ID(), // StorageAccountName: exampleAccount.Name, -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxFunctionAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -149,7 +149,7 @@ import ( // Name: pulumi.String("example-linux-function-app-slot"), // FunctionAppId: exampleLinuxFunctionApp.Name, // StorageAccountName: exampleAccount.Name, -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxFunctionAppSlotSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/functionAppHybridConnection.go b/sdk/go/azure/appservice/functionAppHybridConnection.go index 470498be65..2651410e0d 100644 --- a/sdk/go/azure/appservice/functionAppHybridConnection.go +++ b/sdk/go/azure/appservice/functionAppHybridConnection.go @@ -80,7 +80,7 @@ import ( // Location: example.Location, // ResourceGroupName: example.Name, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsWebAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -92,7 +92,7 @@ import ( // ServicePlanId: exampleServicePlan.ID(), // StorageAccountName: exampleAccount.Name, // StorageAccountAccessKey: exampleAccount.PrimaryAccessKey, -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsFunctionAppSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/linuxFunctionApp.go b/sdk/go/azure/appservice/linuxFunctionApp.go index 91125b6e0a..d988a1cd1d 100644 --- a/sdk/go/azure/appservice/linuxFunctionApp.go +++ b/sdk/go/azure/appservice/linuxFunctionApp.go @@ -64,7 +64,7 @@ import ( // StorageAccountName: exampleAccount.Name, // StorageAccountAccessKey: exampleAccount.PrimaryAccessKey, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxFunctionAppSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/linuxFunctionAppSlot.go b/sdk/go/azure/appservice/linuxFunctionAppSlot.go index d500ac59ba..3106d4d971 100644 --- a/sdk/go/azure/appservice/linuxFunctionAppSlot.go +++ b/sdk/go/azure/appservice/linuxFunctionAppSlot.go @@ -63,7 +63,7 @@ import ( // Location: example.Location, // ServicePlanId: exampleServicePlan.ID(), // StorageAccountName: exampleAccount.Name, -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxFunctionAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -72,7 +72,7 @@ import ( // Name: pulumi.String("example-linux-function-app-slot"), // FunctionAppId: exampleLinuxFunctionApp.ID(), // StorageAccountName: exampleAccount.Name, -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxFunctionAppSlotSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/linuxWebApp.go b/sdk/go/azure/appservice/linuxWebApp.go index bdb99f38aa..2bd23b579f 100644 --- a/sdk/go/azure/appservice/linuxWebApp.go +++ b/sdk/go/azure/appservice/linuxWebApp.go @@ -51,7 +51,7 @@ import ( // ResourceGroupName: example.Name, // Location: exampleServicePlan.Location, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxWebAppSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/linuxWebAppSlot.go b/sdk/go/azure/appservice/linuxWebAppSlot.go index 7eae6ab635..debaddaed1 100644 --- a/sdk/go/azure/appservice/linuxWebAppSlot.go +++ b/sdk/go/azure/appservice/linuxWebAppSlot.go @@ -51,7 +51,7 @@ import ( // ResourceGroupName: example.Name, // Location: exampleServicePlan.Location, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxWebAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -59,7 +59,7 @@ import ( // _, err = appservice.NewLinuxWebAppSlot(ctx, "example", &appservice.LinuxWebAppSlotArgs{ // Name: pulumi.String("example-slot"), // AppServiceId: exampleLinuxWebApp.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxWebAppSlotSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/sourceControl.go b/sdk/go/azure/appservice/sourceControl.go index 3cea7cca5d..2949a61c76 100644 --- a/sdk/go/azure/appservice/sourceControl.go +++ b/sdk/go/azure/appservice/sourceControl.go @@ -51,7 +51,7 @@ import ( // ResourceGroupName: example.Name, // Location: exampleServicePlan.Location, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxWebAppSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/sourceControlSlot.go b/sdk/go/azure/appservice/sourceControlSlot.go index 0eae197995..df068d3a06 100644 --- a/sdk/go/azure/appservice/sourceControlSlot.go +++ b/sdk/go/azure/appservice/sourceControlSlot.go @@ -51,7 +51,7 @@ import ( // ResourceGroupName: example.Name, // Location: exampleServicePlan.Location, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxWebAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -59,7 +59,7 @@ import ( // exampleLinuxWebAppSlot, err := appservice.NewLinuxWebAppSlot(ctx, "example", &appservice.LinuxWebAppSlotArgs{ // Name: pulumi.String("example-slot"), // AppServiceId: exampleLinuxWebApp.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxWebAppSlotSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/staticWebAppFunctionAppRegistration.go b/sdk/go/azure/appservice/staticWebAppFunctionAppRegistration.go index 2d9c7f4b9e..ee42921e45 100644 --- a/sdk/go/azure/appservice/staticWebAppFunctionAppRegistration.go +++ b/sdk/go/azure/appservice/staticWebAppFunctionAppRegistration.go @@ -74,7 +74,7 @@ import ( // ServicePlanId: exampleServicePlan.ID(), // StorageAccountName: exampleAccount.Name, // StorageAccountAccessKey: exampleAccount.PrimaryAccessKey, -// SiteConfig: nil, +// SiteConfig: &appservice.LinuxFunctionAppSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/webAppActiveSlot.go b/sdk/go/azure/appservice/webAppActiveSlot.go index 6ea862861d..3e99a47e9f 100644 --- a/sdk/go/azure/appservice/webAppActiveSlot.go +++ b/sdk/go/azure/appservice/webAppActiveSlot.go @@ -53,7 +53,7 @@ import ( // ResourceGroupName: example.Name, // Location: exampleServicePlan.Location, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsWebAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -61,7 +61,7 @@ import ( // exampleWindowsWebAppSlot, err := appservice.NewWindowsWebAppSlot(ctx, "example", &appservice.WindowsWebAppSlotArgs{ // Name: pulumi.String("example-windows-web-app-slot"), // AppServiceId: exampleWindowsWebApp.Name, -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsWebAppSlotSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/webAppHybridConnection.go b/sdk/go/azure/appservice/webAppHybridConnection.go index 137a4b520e..62944b97ca 100644 --- a/sdk/go/azure/appservice/webAppHybridConnection.go +++ b/sdk/go/azure/appservice/webAppHybridConnection.go @@ -69,7 +69,7 @@ import ( // Location: example.Location, // ResourceGroupName: example.Name, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsWebAppSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/windowsFunctionApp.go b/sdk/go/azure/appservice/windowsFunctionApp.go index d7a36532f0..0ae0ae5e34 100644 --- a/sdk/go/azure/appservice/windowsFunctionApp.go +++ b/sdk/go/azure/appservice/windowsFunctionApp.go @@ -64,7 +64,7 @@ import ( // StorageAccountName: exampleAccount.Name, // StorageAccountAccessKey: exampleAccount.PrimaryAccessKey, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsFunctionAppSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/windowsFunctionAppSlot.go b/sdk/go/azure/appservice/windowsFunctionAppSlot.go index b30f85cdff..e34f73811e 100644 --- a/sdk/go/azure/appservice/windowsFunctionAppSlot.go +++ b/sdk/go/azure/appservice/windowsFunctionAppSlot.go @@ -63,7 +63,7 @@ import ( // Location: example.Location, // StorageAccountName: exampleAccount.Name, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsFunctionAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -72,7 +72,7 @@ import ( // Name: pulumi.String("example-slot"), // FunctionAppId: exampleWindowsFunctionApp.ID(), // StorageAccountName: exampleAccount.Name, -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsFunctionAppSlotSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/windowsWebApp.go b/sdk/go/azure/appservice/windowsWebApp.go index 6183d18721..02dd4cb77b 100644 --- a/sdk/go/azure/appservice/windowsWebApp.go +++ b/sdk/go/azure/appservice/windowsWebApp.go @@ -51,7 +51,7 @@ import ( // ResourceGroupName: example.Name, // Location: exampleServicePlan.Location, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsWebAppSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/appservice/windowsWebAppSlot.go b/sdk/go/azure/appservice/windowsWebAppSlot.go index 7fa6a6cb14..7fdcbe4f68 100644 --- a/sdk/go/azure/appservice/windowsWebAppSlot.go +++ b/sdk/go/azure/appservice/windowsWebAppSlot.go @@ -51,7 +51,7 @@ import ( // ResourceGroupName: example.Name, // Location: exampleServicePlan.Location, // ServicePlanId: exampleServicePlan.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsWebAppSiteConfigArgs{}, // }) // if err != nil { // return err @@ -59,7 +59,7 @@ import ( // _, err = appservice.NewWindowsWebAppSlot(ctx, "example", &appservice.WindowsWebAppSlotArgs{ // Name: pulumi.String("example-slot"), // AppServiceId: exampleWindowsWebApp.ID(), -// SiteConfig: nil, +// SiteConfig: &appservice.WindowsWebAppSlotSiteConfigArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/authorization/assignment.go b/sdk/go/azure/authorization/assignment.go index 2e285c97aa..ce774868c8 100644 --- a/sdk/go/azure/authorization/assignment.go +++ b/sdk/go/azure/authorization/assignment.go @@ -31,11 +31,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -68,11 +68,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -125,11 +125,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -183,11 +183,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -249,11 +249,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/authorization/getRoleDefinition.go b/sdk/go/azure/authorization/getRoleDefinition.go index 975a8f66a6..bda0262406 100644 --- a/sdk/go/azure/authorization/getRoleDefinition.go +++ b/sdk/go/azure/authorization/getRoleDefinition.go @@ -28,7 +28,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/authorization/roleDefinition.go b/sdk/go/azure/authorization/roleDefinition.go index a4aa1ca06c..11a1eb952a 100644 --- a/sdk/go/azure/authorization/roleDefinition.go +++ b/sdk/go/azure/authorization/roleDefinition.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/automation/connection.go b/sdk/go/azure/automation/connection.go index de44402c7a..b6a4b1fb0a 100644 --- a/sdk/go/azure/automation/connection.go +++ b/sdk/go/azure/automation/connection.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/automation/connectionCertificate.go b/sdk/go/azure/automation/connectionCertificate.go index 3ebeb09fd4..7dff1cc54b 100644 --- a/sdk/go/azure/automation/connectionCertificate.go +++ b/sdk/go/azure/automation/connectionCertificate.go @@ -37,7 +37,7 @@ import ( // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/automation/connectionClassicCertificate.go b/sdk/go/azure/automation/connectionClassicCertificate.go index b3e1940fc6..cc37720839 100644 --- a/sdk/go/azure/automation/connectionClassicCertificate.go +++ b/sdk/go/azure/automation/connectionClassicCertificate.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/automation/connectionServicePrincipal.go b/sdk/go/azure/automation/connectionServicePrincipal.go index 1455b21212..39f851a5af 100644 --- a/sdk/go/azure/automation/connectionServicePrincipal.go +++ b/sdk/go/azure/automation/connectionServicePrincipal.go @@ -37,7 +37,7 @@ import ( // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/automation/connectionType.go b/sdk/go/azure/automation/connectionType.go index d6715750f1..1195444f72 100644 --- a/sdk/go/azure/automation/connectionType.go +++ b/sdk/go/azure/automation/connectionType.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// _, err = core.GetClientConfig(ctx, nil, nil) +// _, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/blueprint/assignment.go b/sdk/go/azure/blueprint/assignment.go index 6f32c05d58..996f42fbde 100644 --- a/sdk/go/azure/blueprint/assignment.go +++ b/sdk/go/azure/blueprint/assignment.go @@ -34,11 +34,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } -// example, err := core.LookupSubscription(ctx, nil, nil) +// example, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/blueprint/getDefinition.go b/sdk/go/azure/blueprint/getDefinition.go index ea068cb287..6759277cca 100644 --- a/sdk/go/azure/blueprint/getDefinition.go +++ b/sdk/go/azure/blueprint/getDefinition.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/blueprint/getPublishedVersion.go b/sdk/go/azure/blueprint/getPublishedVersion.go index eb1c3878ee..7040595362 100644 --- a/sdk/go/azure/blueprint/getPublishedVersion.go +++ b/sdk/go/azure/blueprint/getPublishedVersion.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelAlexa.go b/sdk/go/azure/bot/channelAlexa.go index a2ddf092d6..67a472662d 100644 --- a/sdk/go/azure/bot/channelAlexa.go +++ b/sdk/go/azure/bot/channelAlexa.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelDirectLine.go b/sdk/go/azure/bot/channelDirectLine.go index 736483a253..a08f898211 100644 --- a/sdk/go/azure/bot/channelDirectLine.go +++ b/sdk/go/azure/bot/channelDirectLine.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelDirectLineSpeech.go b/sdk/go/azure/bot/channelDirectLineSpeech.go index 14a598f107..56f66d01c3 100644 --- a/sdk/go/azure/bot/channelDirectLineSpeech.go +++ b/sdk/go/azure/bot/channelDirectLineSpeech.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelEmail.go b/sdk/go/azure/bot/channelEmail.go index e2c9618d4c..463e7ff9b9 100644 --- a/sdk/go/azure/bot/channelEmail.go +++ b/sdk/go/azure/bot/channelEmail.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelFacebook.go b/sdk/go/azure/bot/channelFacebook.go index 041d52e53a..0b094918c7 100644 --- a/sdk/go/azure/bot/channelFacebook.go +++ b/sdk/go/azure/bot/channelFacebook.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelLine.go b/sdk/go/azure/bot/channelLine.go index 0888407e3d..ad4e43a5d5 100644 --- a/sdk/go/azure/bot/channelLine.go +++ b/sdk/go/azure/bot/channelLine.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelSlack.go b/sdk/go/azure/bot/channelSlack.go index 371b333371..49fd8cc098 100644 --- a/sdk/go/azure/bot/channelSlack.go +++ b/sdk/go/azure/bot/channelSlack.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelSms.go b/sdk/go/azure/bot/channelSms.go index 1bd1eafab6..49e1200e29 100644 --- a/sdk/go/azure/bot/channelSms.go +++ b/sdk/go/azure/bot/channelSms.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelTeams.go b/sdk/go/azure/bot/channelTeams.go index 319a6a2a8d..c6198c91e8 100644 --- a/sdk/go/azure/bot/channelTeams.go +++ b/sdk/go/azure/bot/channelTeams.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelWebChat.go b/sdk/go/azure/bot/channelWebChat.go index ce0c9bd335..3682067d23 100644 --- a/sdk/go/azure/bot/channelWebChat.go +++ b/sdk/go/azure/bot/channelWebChat.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/channelsRegistration.go b/sdk/go/azure/bot/channelsRegistration.go index 705f4075d0..f4793d244e 100644 --- a/sdk/go/azure/bot/channelsRegistration.go +++ b/sdk/go/azure/bot/channelsRegistration.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/connection.go b/sdk/go/azure/bot/connection.go index 280a0afb36..9c6395979b 100644 --- a/sdk/go/azure/bot/connection.go +++ b/sdk/go/azure/bot/connection.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/serviceAzureBot.go b/sdk/go/azure/bot/serviceAzureBot.go index 723eb169da..7508e4ee08 100644 --- a/sdk/go/azure/bot/serviceAzureBot.go +++ b/sdk/go/azure/bot/serviceAzureBot.go @@ -60,7 +60,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/bot/webApp.go b/sdk/go/azure/bot/webApp.go index f76edb5989..96ffb18ecf 100644 --- a/sdk/go/azure/bot/webApp.go +++ b/sdk/go/azure/bot/webApp.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/cdn/frontdoorOrigin.go b/sdk/go/azure/cdn/frontdoorOrigin.go index f8c84e6e2f..2189aec46d 100644 --- a/sdk/go/azure/cdn/frontdoorOrigin.go +++ b/sdk/go/azure/cdn/frontdoorOrigin.go @@ -49,7 +49,7 @@ import ( // exampleFrontdoorOriginGroup, err := cdn.NewFrontdoorOriginGroup(ctx, "example", &cdn.FrontdoorOriginGroupArgs{ // Name: pulumi.String("example-origingroup"), // CdnFrontdoorProfileId: exampleFrontdoorProfile.ID(), -// LoadBalancing: nil, +// LoadBalancing: &cdn.FrontdoorOriginGroupLoadBalancingArgs{}, // }) // if err != nil { // return err @@ -126,7 +126,7 @@ import ( // exampleFrontdoorOriginGroup, err := cdn.NewFrontdoorOriginGroup(ctx, "example", &cdn.FrontdoorOriginGroupArgs{ // Name: pulumi.String("example-origin-group"), // CdnFrontdoorProfileId: exampleFrontdoorProfile.ID(), -// LoadBalancing: nil, +// LoadBalancing: &cdn.FrontdoorOriginGroupLoadBalancingArgs{}, // }) // if err != nil { // return err @@ -174,7 +174,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/cdn/frontdoorSecret.go b/sdk/go/azure/cdn/frontdoorSecret.go index db972b04a2..b503b3359d 100644 --- a/sdk/go/azure/cdn/frontdoorSecret.go +++ b/sdk/go/azure/cdn/frontdoorSecret.go @@ -42,7 +42,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/cognitive/accountCustomerManagedKey.go b/sdk/go/azure/cognitive/accountCustomerManagedKey.go index 3df587d9c4..011d0acf44 100644 --- a/sdk/go/azure/cognitive/accountCustomerManagedKey.go +++ b/sdk/go/azure/cognitive/accountCustomerManagedKey.go @@ -33,7 +33,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/compute/diskEncryptionSet.go b/sdk/go/azure/compute/diskEncryptionSet.go index 6a48c6426a..ff2ad47fca 100644 --- a/sdk/go/azure/compute/diskEncryptionSet.go +++ b/sdk/go/azure/compute/diskEncryptionSet.go @@ -33,7 +33,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -163,7 +163,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/confidentialledger/ledger.go b/sdk/go/azure/confidentialledger/ledger.go index 0c24325afd..0433fc603b 100644 --- a/sdk/go/azure/confidentialledger/ledger.go +++ b/sdk/go/azure/confidentialledger/ledger.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/consumption/budgetSubscription.go b/sdk/go/azure/consumption/budgetSubscription.go index df84c3a64e..d1a23b33d9 100644 --- a/sdk/go/azure/consumption/budgetSubscription.go +++ b/sdk/go/azure/consumption/budgetSubscription.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/containerservice/clusterTrustedAccessRoleBinding.go b/sdk/go/azure/containerservice/clusterTrustedAccessRoleBinding.go index ef54aced1d..4f41b26dc5 100644 --- a/sdk/go/azure/containerservice/clusterTrustedAccessRoleBinding.go +++ b/sdk/go/azure/containerservice/clusterTrustedAccessRoleBinding.go @@ -53,7 +53,7 @@ import ( // if err != nil { // return err // } -// _, err = core.GetClientConfig(ctx, nil, nil) +// _, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/containerservice/registry.go b/sdk/go/azure/containerservice/registry.go index 17f944dbf2..85756d3d6a 100644 --- a/sdk/go/azure/containerservice/registry.go +++ b/sdk/go/azure/containerservice/registry.go @@ -46,12 +46,12 @@ import ( // &containerservice.RegistryGeoreplicationArgs{ // Location: pulumi.String("East US"), // ZoneRedundancyEnabled: pulumi.Bool(true), -// Tags: nil, +// Tags: pulumi.StringMap{}, // }, // &containerservice.RegistryGeoreplicationArgs{ // Location: pulumi.String("North Europe"), // ZoneRedundancyEnabled: pulumi.Bool(true), -// Tags: nil, +// Tags: pulumi.StringMap{}, // }, // }, // }) diff --git a/sdk/go/azure/core/getClientConfig.go b/sdk/go/azure/core/getClientConfig.go index 2e83e50d40..d641297a67 100644 --- a/sdk/go/azure/core/getClientConfig.go +++ b/sdk/go/azure/core/getClientConfig.go @@ -27,7 +27,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/core/getSubscription.go b/sdk/go/azure/core/getSubscription.go index 43a812b845..cbd32b8b3d 100644 --- a/sdk/go/azure/core/getSubscription.go +++ b/sdk/go/azure/core/getSubscription.go @@ -27,7 +27,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/core/getSubscriptions.go b/sdk/go/azure/core/getSubscriptions.go index 52748091c4..9b7efbc7b3 100644 --- a/sdk/go/azure/core/getSubscriptions.go +++ b/sdk/go/azure/core/getSubscriptions.go @@ -27,7 +27,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// available, err := core.GetSubscriptions(ctx, nil, nil) +// available, err := core.GetSubscriptions(ctx, &core.GetSubscriptionsArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/core/subscriptionCostManagementExport.go b/sdk/go/azure/core/subscriptionCostManagementExport.go index c1f117e802..07d4f2aa0d 100644 --- a/sdk/go/azure/core/subscriptionCostManagementExport.go +++ b/sdk/go/azure/core/subscriptionCostManagementExport.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// example, err := core.LookupSubscription(ctx, nil, nil) +// example, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/core/subscriptionPolicyAssignment.go b/sdk/go/azure/core/subscriptionPolicyAssignment.go index 61cf649b3b..8ce2cf01d7 100644 --- a/sdk/go/azure/core/subscriptionPolicyAssignment.go +++ b/sdk/go/azure/core/subscriptionPolicyAssignment.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/core/subscriptionPolicyExemption.go b/sdk/go/azure/core/subscriptionPolicyExemption.go index 9ec41a06f8..3149406448 100644 --- a/sdk/go/azure/core/subscriptionPolicyExemption.go +++ b/sdk/go/azure/core/subscriptionPolicyExemption.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// example, err := core.LookupSubscription(ctx, nil, nil) +// example, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/core/subscriptionPolicyRemediation.go b/sdk/go/azure/core/subscriptionPolicyRemediation.go index 0a8aa9ebd2..50a13b4d7d 100644 --- a/sdk/go/azure/core/subscriptionPolicyRemediation.go +++ b/sdk/go/azure/core/subscriptionPolicyRemediation.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// example, err := core.LookupSubscription(ctx, nil, nil) +// example, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/cosmosdb/sqlRoleAssignment.go b/sdk/go/azure/cosmosdb/sqlRoleAssignment.go index 9c5a140238..04da76e899 100644 --- a/sdk/go/azure/cosmosdb/sqlRoleAssignment.go +++ b/sdk/go/azure/cosmosdb/sqlRoleAssignment.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/cosmosdb/sqlRoleDefinition.go b/sdk/go/azure/cosmosdb/sqlRoleDefinition.go index 9fc707c87f..05e7b93493 100644 --- a/sdk/go/azure/cosmosdb/sqlRoleDefinition.go +++ b/sdk/go/azure/cosmosdb/sqlRoleDefinition.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := core.GetClientConfig(ctx, nil, nil) +// _, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/databricks/workspaceRootDbfsCustomerManagedKey.go b/sdk/go/azure/databricks/workspaceRootDbfsCustomerManagedKey.go index 1c8d76c04d..8b3b0c015a 100644 --- a/sdk/go/azure/databricks/workspaceRootDbfsCustomerManagedKey.go +++ b/sdk/go/azure/databricks/workspaceRootDbfsCustomerManagedKey.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/datadog/monitor.go b/sdk/go/azure/datadog/monitor.go index ab7e001847..9318dfe67e 100644 --- a/sdk/go/azure/datadog/monitor.go +++ b/sdk/go/azure/datadog/monitor.go @@ -83,7 +83,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/datafactory/credentialServicePrincipal.go b/sdk/go/azure/datafactory/credentialServicePrincipal.go index c6cae78317..d74ec624f2 100644 --- a/sdk/go/azure/datafactory/credentialServicePrincipal.go +++ b/sdk/go/azure/datafactory/credentialServicePrincipal.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/datafactory/linkedServiceDataLakeStorageGen2.go b/sdk/go/azure/datafactory/linkedServiceDataLakeStorageGen2.go index 407ba546b2..dd53286fc1 100644 --- a/sdk/go/azure/datafactory/linkedServiceDataLakeStorageGen2.go +++ b/sdk/go/azure/datafactory/linkedServiceDataLakeStorageGen2.go @@ -44,7 +44,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/datafactory/linkedServiceKeyVault.go b/sdk/go/azure/datafactory/linkedServiceKeyVault.go index 14ded39b64..b73fade38c 100644 --- a/sdk/go/azure/datafactory/linkedServiceKeyVault.go +++ b/sdk/go/azure/datafactory/linkedServiceKeyVault.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/datafactory/linkedServiceSnowflake.go b/sdk/go/azure/datafactory/linkedServiceSnowflake.go index cdf0c4e526..b2f9eed23d 100644 --- a/sdk/go/azure/datafactory/linkedServiceSnowflake.go +++ b/sdk/go/azure/datafactory/linkedServiceSnowflake.go @@ -74,7 +74,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/datafactory/linkedServiceSqlServer.go b/sdk/go/azure/datafactory/linkedServiceSqlServer.go index 0e09c4d9c0..059ba412cd 100644 --- a/sdk/go/azure/datafactory/linkedServiceSqlServer.go +++ b/sdk/go/azure/datafactory/linkedServiceSqlServer.go @@ -74,7 +74,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/datafactory/linkedServiceSynapse.go b/sdk/go/azure/datafactory/linkedServiceSynapse.go index 6e0f6919ac..df3de9fdd0 100644 --- a/sdk/go/azure/datafactory/linkedServiceSynapse.go +++ b/sdk/go/azure/datafactory/linkedServiceSynapse.go @@ -74,7 +74,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/dataprotection/backupInstanceKubernetesCluster.go b/sdk/go/azure/dataprotection/backupInstanceKubernetesCluster.go index 486399494b..c6223b7044 100644 --- a/sdk/go/azure/dataprotection/backupInstanceKubernetesCluster.go +++ b/sdk/go/azure/dataprotection/backupInstanceKubernetesCluster.go @@ -32,7 +32,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/dataprotection/backupInstancePostgresql.go b/sdk/go/azure/dataprotection/backupInstancePostgresql.go index 8a8cd0345e..e0f82ab1eb 100644 --- a/sdk/go/azure/dataprotection/backupInstancePostgresql.go +++ b/sdk/go/azure/dataprotection/backupInstancePostgresql.go @@ -36,7 +36,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/devcenter/projectEnvironmentType.go b/sdk/go/azure/devcenter/projectEnvironmentType.go index d53f1a1afd..7fd077be19 100644 --- a/sdk/go/azure/devcenter/projectEnvironmentType.go +++ b/sdk/go/azure/devcenter/projectEnvironmentType.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/devtest/schedule.go b/sdk/go/azure/devtest/schedule.go index 6e540aff82..18722cbc43 100644 --- a/sdk/go/azure/devtest/schedule.go +++ b/sdk/go/azure/devtest/schedule.go @@ -59,7 +59,7 @@ import ( // }, // TimeZoneId: pulumi.String("Pacific Standard Time"), // TaskType: pulumi.String("LabVmsStartupTask"), -// NotificationSettings: nil, +// NotificationSettings: &devtest.ScheduleNotificationSettingsArgs{}, // Tags: pulumi.StringMap{ // "environment": pulumi.String("Production"), // }, diff --git a/sdk/go/azure/elasticsan/volumeGroup.go b/sdk/go/azure/elasticsan/volumeGroup.go index 41c2145b4b..950427cebc 100644 --- a/sdk/go/azure/elasticsan/volumeGroup.go +++ b/sdk/go/azure/elasticsan/volumeGroup.go @@ -51,7 +51,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/eventhub/namespaceCustomerManagedKey.go b/sdk/go/azure/eventhub/namespaceCustomerManagedKey.go index 3968de8835..4bb7d7b5a9 100644 --- a/sdk/go/azure/eventhub/namespaceCustomerManagedKey.go +++ b/sdk/go/azure/eventhub/namespaceCustomerManagedKey.go @@ -63,7 +63,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -204,7 +204,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/healthcare/fhirService.go b/sdk/go/azure/healthcare/fhirService.go index 269f42a571..fac32f9d1f 100644 --- a/sdk/go/azure/healthcare/fhirService.go +++ b/sdk/go/azure/healthcare/fhirService.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/healthcare/medtechServiceFhirDestination.go b/sdk/go/azure/healthcare/medtechServiceFhirDestination.go index 8511c5b93f..78bc3114f5 100644 --- a/sdk/go/azure/healthcare/medtechServiceFhirDestination.go +++ b/sdk/go/azure/healthcare/medtechServiceFhirDestination.go @@ -37,7 +37,7 @@ import ( // if err != nil { // return err // } -// _, err = core.GetClientConfig(ctx, nil, nil) +// _, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/healthcare/service.go b/sdk/go/azure/healthcare/service.go index 2ae20ae376..c7e0945c90 100644 --- a/sdk/go/azure/healthcare/service.go +++ b/sdk/go/azure/healthcare/service.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/accessPolicy.go b/sdk/go/azure/keyvault/accessPolicy.go index 69d9eca808..eccb146ee0 100644 --- a/sdk/go/azure/keyvault/accessPolicy.go +++ b/sdk/go/azure/keyvault/accessPolicy.go @@ -34,7 +34,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/certifiate.go b/sdk/go/azure/keyvault/certifiate.go index e555dd6ae0..18e18df62a 100644 --- a/sdk/go/azure/keyvault/certifiate.go +++ b/sdk/go/azure/keyvault/certifiate.go @@ -34,7 +34,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -141,7 +141,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/certificate.go b/sdk/go/azure/keyvault/certificate.go index a73df3c381..c2bc2be011 100644 --- a/sdk/go/azure/keyvault/certificate.go +++ b/sdk/go/azure/keyvault/certificate.go @@ -34,7 +34,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -141,7 +141,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/certificateContacts.go b/sdk/go/azure/keyvault/certificateContacts.go index b6d09a3352..a45b912e32 100644 --- a/sdk/go/azure/keyvault/certificateContacts.go +++ b/sdk/go/azure/keyvault/certificateContacts.go @@ -34,7 +34,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/certificateIssuer.go b/sdk/go/azure/keyvault/certificateIssuer.go index 045ca01655..6ea7c42fb9 100644 --- a/sdk/go/azure/keyvault/certificateIssuer.go +++ b/sdk/go/azure/keyvault/certificateIssuer.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/key.go b/sdk/go/azure/keyvault/key.go index 6dbb461dbd..b3065341bc 100644 --- a/sdk/go/azure/keyvault/key.go +++ b/sdk/go/azure/keyvault/key.go @@ -35,7 +35,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/keyVault.go b/sdk/go/azure/keyvault/keyVault.go index 612a9ac29b..985223fc91 100644 --- a/sdk/go/azure/keyvault/keyVault.go +++ b/sdk/go/azure/keyvault/keyVault.go @@ -35,7 +35,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/managedHardwareSecurityModule.go b/sdk/go/azure/keyvault/managedHardwareSecurityModule.go index a193fae005..3c55625704 100644 --- a/sdk/go/azure/keyvault/managedHardwareSecurityModule.go +++ b/sdk/go/azure/keyvault/managedHardwareSecurityModule.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/managedStorageAccount.go b/sdk/go/azure/keyvault/managedStorageAccount.go index a7799f647f..675de87397 100644 --- a/sdk/go/azure/keyvault/managedStorageAccount.go +++ b/sdk/go/azure/keyvault/managedStorageAccount.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -116,7 +116,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/managedStorageAccountSasTokenDefinition.go b/sdk/go/azure/keyvault/managedStorageAccountSasTokenDefinition.go index 45a4ebdc67..b0740b85cc 100644 --- a/sdk/go/azure/keyvault/managedStorageAccountSasTokenDefinition.go +++ b/sdk/go/azure/keyvault/managedStorageAccountSasTokenDefinition.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/keyvault/secret.go b/sdk/go/azure/keyvault/secret.go index 478ffdcc4a..09d5e302e8 100644 --- a/sdk/go/azure/keyvault/secret.go +++ b/sdk/go/azure/keyvault/secret.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/kusto/clusterCustomerManagedKey.go b/sdk/go/azure/kusto/clusterCustomerManagedKey.go index d8eae12903..192b0eee1b 100644 --- a/sdk/go/azure/kusto/clusterCustomerManagedKey.go +++ b/sdk/go/azure/kusto/clusterCustomerManagedKey.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/kusto/clusterManagedPrivateEndpoint.go b/sdk/go/azure/kusto/clusterManagedPrivateEndpoint.go index ba094a9e11..6c560a8ab0 100644 --- a/sdk/go/azure/kusto/clusterManagedPrivateEndpoint.go +++ b/sdk/go/azure/kusto/clusterManagedPrivateEndpoint.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := core.GetClientConfig(ctx, nil, nil) +// _, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/kusto/clusterPrincipalAssignment.go b/sdk/go/azure/kusto/clusterPrincipalAssignment.go index 150190894e..388b53eda4 100644 --- a/sdk/go/azure/kusto/clusterPrincipalAssignment.go +++ b/sdk/go/azure/kusto/clusterPrincipalAssignment.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/kusto/databasePrincipalAssignment.go b/sdk/go/azure/kusto/databasePrincipalAssignment.go index 4e5f980a00..f4e27318d8 100644 --- a/sdk/go/azure/kusto/databasePrincipalAssignment.go +++ b/sdk/go/azure/kusto/databasePrincipalAssignment.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/lighthouse/assignment.go b/sdk/go/azure/lighthouse/assignment.go index 651651b30d..d439daea49 100644 --- a/sdk/go/azure/lighthouse/assignment.go +++ b/sdk/go/azure/lighthouse/assignment.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/loganalytics/clusterCustomerManagedKey.go b/sdk/go/azure/loganalytics/clusterCustomerManagedKey.go index 64b159e5e3..b8d5c74703 100644 --- a/sdk/go/azure/loganalytics/clusterCustomerManagedKey.go +++ b/sdk/go/azure/loganalytics/clusterCustomerManagedKey.go @@ -37,7 +37,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/machinelearning/computeCluster.go b/sdk/go/azure/machinelearning/computeCluster.go index 278b799261..03013585b9 100644 --- a/sdk/go/azure/machinelearning/computeCluster.go +++ b/sdk/go/azure/machinelearning/computeCluster.go @@ -34,7 +34,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/machinelearning/computeInstance.go b/sdk/go/azure/machinelearning/computeInstance.go index d734ce4056..dfe02bc9da 100644 --- a/sdk/go/azure/machinelearning/computeInstance.go +++ b/sdk/go/azure/machinelearning/computeInstance.go @@ -34,7 +34,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/machinelearning/datastoreBlobstorage.go b/sdk/go/azure/machinelearning/datastoreBlobstorage.go index 2e32646210..52d9bf18f8 100644 --- a/sdk/go/azure/machinelearning/datastoreBlobstorage.go +++ b/sdk/go/azure/machinelearning/datastoreBlobstorage.go @@ -34,7 +34,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/machinelearning/datastoreDatalakeGen2.go b/sdk/go/azure/machinelearning/datastoreDatalakeGen2.go index 83c8bb6613..fd74446642 100644 --- a/sdk/go/azure/machinelearning/datastoreDatalakeGen2.go +++ b/sdk/go/azure/machinelearning/datastoreDatalakeGen2.go @@ -32,7 +32,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/machinelearning/inferenceCluster.go b/sdk/go/azure/machinelearning/inferenceCluster.go index 1e9196d0c8..b1d38340b6 100644 --- a/sdk/go/azure/machinelearning/inferenceCluster.go +++ b/sdk/go/azure/machinelearning/inferenceCluster.go @@ -36,7 +36,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/machinelearning/synapseSpark.go b/sdk/go/azure/machinelearning/synapseSpark.go index accb0a4a0a..f6a25412d8 100644 --- a/sdk/go/azure/machinelearning/synapseSpark.go +++ b/sdk/go/azure/machinelearning/synapseSpark.go @@ -33,7 +33,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/machinelearning/workspace.go b/sdk/go/azure/machinelearning/workspace.go index 28f77dee69..854c07fc89 100644 --- a/sdk/go/azure/machinelearning/workspace.go +++ b/sdk/go/azure/machinelearning/workspace.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -110,7 +110,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -232,7 +232,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/managedapplication/application.go b/sdk/go/azure/managedapplication/application.go index 9a42cc6490..112e09d954 100644 --- a/sdk/go/azure/managedapplication/application.go +++ b/sdk/go/azure/managedapplication/application.go @@ -33,7 +33,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/managedapplication/definition.go b/sdk/go/azure/managedapplication/definition.go index c4d978450e..6a9ed89236 100644 --- a/sdk/go/azure/managedapplication/definition.go +++ b/sdk/go/azure/managedapplication/definition.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/management/group.go b/sdk/go/azure/management/group.go index 2bd3dd0d99..c9d4479a8d 100644 --- a/sdk/go/azure/management/group.go +++ b/sdk/go/azure/management/group.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/management/lock.go b/sdk/go/azure/management/lock.go index 261d295cc5..6c55984f9c 100644 --- a/sdk/go/azure/management/lock.go +++ b/sdk/go/azure/management/lock.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/management/privateLinkAssociation.go b/sdk/go/azure/management/privateLinkAssociation.go index 0c425b764d..6e4285de5a 100644 --- a/sdk/go/azure/management/privateLinkAssociation.go +++ b/sdk/go/azure/management/privateLinkAssociation.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/managementgroups/managementGroup.go b/sdk/go/azure/managementgroups/managementGroup.go index b1f43fa04f..f4f1ac44ba 100644 --- a/sdk/go/azure/managementgroups/managementGroup.go +++ b/sdk/go/azure/managementgroups/managementGroup.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/managementresource/manangementLock.go b/sdk/go/azure/managementresource/manangementLock.go index 716460bf6c..f0d74b9b06 100644 --- a/sdk/go/azure/managementresource/manangementLock.go +++ b/sdk/go/azure/managementresource/manangementLock.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/monitoring/actionGroup.go b/sdk/go/azure/monitoring/actionGroup.go index e8f6b8d765..6e6c2f6072 100644 --- a/sdk/go/azure/monitoring/actionGroup.go +++ b/sdk/go/azure/monitoring/actionGroup.go @@ -39,7 +39,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/monitoring/diagnosticSetting.go b/sdk/go/azure/monitoring/diagnosticSetting.go index 990fab81c4..a34289084b 100644 --- a/sdk/go/azure/monitoring/diagnosticSetting.go +++ b/sdk/go/azure/monitoring/diagnosticSetting.go @@ -48,7 +48,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/mssql/managedInstanceActiveDirectoryAdministrator.go b/sdk/go/azure/mssql/managedInstanceActiveDirectoryAdministrator.go index a8c5a70fc1..d675c18b07 100644 --- a/sdk/go/azure/mssql/managedInstanceActiveDirectoryAdministrator.go +++ b/sdk/go/azure/mssql/managedInstanceActiveDirectoryAdministrator.go @@ -38,7 +38,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/mssql/managedInstanceTransparentDataEncryption.go b/sdk/go/azure/mssql/managedInstanceTransparentDataEncryption.go index 30cd92427b..eb526130ac 100644 --- a/sdk/go/azure/mssql/managedInstanceTransparentDataEncryption.go +++ b/sdk/go/azure/mssql/managedInstanceTransparentDataEncryption.go @@ -125,7 +125,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/mssql/server.go b/sdk/go/azure/mssql/server.go index 38c4686e1c..0d4703e281 100644 --- a/sdk/go/azure/mssql/server.go +++ b/sdk/go/azure/mssql/server.go @@ -78,7 +78,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/mssql/serverTransparentDataEncryption.go b/sdk/go/azure/mssql/serverTransparentDataEncryption.go index 6ea5b070d3..c57403dcb7 100644 --- a/sdk/go/azure/mssql/serverTransparentDataEncryption.go +++ b/sdk/go/azure/mssql/serverTransparentDataEncryption.go @@ -91,7 +91,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/netapp/account.go b/sdk/go/azure/netapp/account.go index 49e4da7ed1..6042c13aca 100644 --- a/sdk/go/azure/netapp/account.go +++ b/sdk/go/azure/netapp/account.go @@ -39,7 +39,7 @@ import ( // if err != nil { // return err // } -// _, err = core.GetClientConfig(ctx, nil, nil) +// _, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/netapp/accountEncryption.go b/sdk/go/azure/netapp/accountEncryption.go index 6701d4eaf9..3432c705c8 100644 --- a/sdk/go/azure/netapp/accountEncryption.go +++ b/sdk/go/azure/netapp/accountEncryption.go @@ -40,7 +40,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/getNetworkManager.go b/sdk/go/azure/network/getNetworkManager.go index 46f0919f15..2af124f9a6 100644 --- a/sdk/go/azure/network/getNetworkManager.go +++ b/sdk/go/azure/network/getNetworkManager.go @@ -35,7 +35,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/getNetworkManagerNetworkGroup.go b/sdk/go/azure/network/getNetworkManagerNetworkGroup.go index 591f2ea44d..5e9a77310c 100644 --- a/sdk/go/azure/network/getNetworkManagerNetworkGroup.go +++ b/sdk/go/azure/network/getNetworkManagerNetworkGroup.go @@ -35,7 +35,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManager.go b/sdk/go/azure/network/networkManager.go index 0d564276f7..42831d72ea 100644 --- a/sdk/go/azure/network/networkManager.go +++ b/sdk/go/azure/network/networkManager.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerAdminRule.go b/sdk/go/azure/network/networkManagerAdminRule.go index e150001d40..b0cc4a83c7 100644 --- a/sdk/go/azure/network/networkManagerAdminRule.go +++ b/sdk/go/azure/network/networkManagerAdminRule.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerAdminRuleCollection.go b/sdk/go/azure/network/networkManagerAdminRuleCollection.go index 05abe9d007..a7d4ec9317 100644 --- a/sdk/go/azure/network/networkManagerAdminRuleCollection.go +++ b/sdk/go/azure/network/networkManagerAdminRuleCollection.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerConnectivityConfiguration.go b/sdk/go/azure/network/networkManagerConnectivityConfiguration.go index 1c30f6683b..dc2f47fe5a 100644 --- a/sdk/go/azure/network/networkManagerConnectivityConfiguration.go +++ b/sdk/go/azure/network/networkManagerConnectivityConfiguration.go @@ -38,7 +38,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerDeployment.go b/sdk/go/azure/network/networkManagerDeployment.go index d7a9273ede..2371661c72 100644 --- a/sdk/go/azure/network/networkManagerDeployment.go +++ b/sdk/go/azure/network/networkManagerDeployment.go @@ -38,7 +38,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } @@ -137,7 +137,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerManagementGroupConnection.go b/sdk/go/azure/network/networkManagerManagementGroupConnection.go index 7ea9f4efd7..04d941df22 100644 --- a/sdk/go/azure/network/networkManagerManagementGroupConnection.go +++ b/sdk/go/azure/network/networkManagerManagementGroupConnection.go @@ -48,11 +48,11 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// currentGetClientConfig, err := core.GetClientConfig(ctx, nil, nil) +// currentGetClientConfig, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerNetworkGroup.go b/sdk/go/azure/network/networkManagerNetworkGroup.go index 9e2ba4e0d8..5ad3252150 100644 --- a/sdk/go/azure/network/networkManagerNetworkGroup.go +++ b/sdk/go/azure/network/networkManagerNetworkGroup.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerScopeConnection.go b/sdk/go/azure/network/networkManagerScopeConnection.go index 99fb7ec3dc..023413e51a 100644 --- a/sdk/go/azure/network/networkManagerScopeConnection.go +++ b/sdk/go/azure/network/networkManagerScopeConnection.go @@ -36,11 +36,11 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } -// currentGetSubscription, err := core.LookupSubscription(ctx, nil, nil) +// currentGetSubscription, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerSecurityAdminConfiguration.go b/sdk/go/azure/network/networkManagerSecurityAdminConfiguration.go index bebb763728..524fb32629 100644 --- a/sdk/go/azure/network/networkManagerSecurityAdminConfiguration.go +++ b/sdk/go/azure/network/networkManagerSecurityAdminConfiguration.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerStaticMember.go b/sdk/go/azure/network/networkManagerStaticMember.go index ede7c51f8e..f50b964c57 100644 --- a/sdk/go/azure/network/networkManagerStaticMember.go +++ b/sdk/go/azure/network/networkManagerStaticMember.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/network/networkManagerSubscriptionConnection.go b/sdk/go/azure/network/networkManagerSubscriptionConnection.go index ca6591af2a..f5058b8411 100644 --- a/sdk/go/azure/network/networkManagerSubscriptionConnection.go +++ b/sdk/go/azure/network/networkManagerSubscriptionConnection.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.LookupSubscription(ctx, nil, nil) +// current, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/newrelic/monitor.go b/sdk/go/azure/newrelic/monitor.go index 50b04ffdef..1a4fcdf57b 100644 --- a/sdk/go/azure/newrelic/monitor.go +++ b/sdk/go/azure/newrelic/monitor.go @@ -83,7 +83,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/nginx/certificate.go b/sdk/go/azure/nginx/certificate.go index 4f2e6141c8..db7e9e174e 100644 --- a/sdk/go/azure/nginx/certificate.go +++ b/sdk/go/azure/nginx/certificate.go @@ -106,7 +106,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/pim/activeRoleAssignment.go b/sdk/go/azure/pim/activeRoleAssignment.go index 5e597540ff..75ad1e18a2 100644 --- a/sdk/go/azure/pim/activeRoleAssignment.go +++ b/sdk/go/azure/pim/activeRoleAssignment.go @@ -35,11 +35,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -96,7 +96,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/pim/eligibleRoleAssignment.go b/sdk/go/azure/pim/eligibleRoleAssignment.go index c0a6b94164..5eb7285059 100644 --- a/sdk/go/azure/pim/eligibleRoleAssignment.go +++ b/sdk/go/azure/pim/eligibleRoleAssignment.go @@ -35,11 +35,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -96,7 +96,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/postgresql/activeDirectoryAdministrator.go b/sdk/go/azure/postgresql/activeDirectoryAdministrator.go index aeb5f83b8f..12cf04ac5a 100644 --- a/sdk/go/azure/postgresql/activeDirectoryAdministrator.go +++ b/sdk/go/azure/postgresql/activeDirectoryAdministrator.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/postgresql/flexibleServerActiveDirectoryAdministrator.go b/sdk/go/azure/postgresql/flexibleServerActiveDirectoryAdministrator.go index 95cb59394c..f6585b4133 100644 --- a/sdk/go/azure/postgresql/flexibleServerActiveDirectoryAdministrator.go +++ b/sdk/go/azure/postgresql/flexibleServerActiveDirectoryAdministrator.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/postgresql/serverKey.go b/sdk/go/azure/postgresql/serverKey.go index ef38d96c11..ae47de0883 100644 --- a/sdk/go/azure/postgresql/serverKey.go +++ b/sdk/go/azure/postgresql/serverKey.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/redhatopenshift/cluster.go b/sdk/go/azure/redhatopenshift/cluster.go index a7297cca1e..b912c75391 100644 --- a/sdk/go/azure/redhatopenshift/cluster.go +++ b/sdk/go/azure/redhatopenshift/cluster.go @@ -34,11 +34,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := core.GetClientConfig(ctx, nil, nil) +// _, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } -// _, err = azuread.GetClientConfig(ctx, nil, nil) +// _, err = azuread.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/redis/cache.go b/sdk/go/azure/redis/cache.go index 99310c3378..9b473c7e8c 100644 --- a/sdk/go/azure/redis/cache.go +++ b/sdk/go/azure/redis/cache.go @@ -50,7 +50,7 @@ import ( // SkuName: pulumi.String("Standard"), // NonSslPortEnabled: pulumi.Bool(false), // MinimumTlsVersion: pulumi.String("1.2"), -// RedisConfiguration: nil, +// RedisConfiguration: &redis.CacheRedisConfigurationArgs{}, // }) // if err != nil { // return err diff --git a/sdk/go/azure/role/assignment.go b/sdk/go/azure/role/assignment.go index 356fc860aa..262e8dfaf0 100644 --- a/sdk/go/azure/role/assignment.go +++ b/sdk/go/azure/role/assignment.go @@ -31,11 +31,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -68,11 +68,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -125,11 +125,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -183,11 +183,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } @@ -249,11 +249,11 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } -// example, err := core.GetClientConfig(ctx, nil, nil) +// example, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/role/definition.go b/sdk/go/azure/role/definition.go index f3109bcb78..a813bdca51 100644 --- a/sdk/go/azure/role/definition.go +++ b/sdk/go/azure/role/definition.go @@ -29,7 +29,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/role/getRoleDefinition.go b/sdk/go/azure/role/getRoleDefinition.go index d9657b47a1..674eebb145 100644 --- a/sdk/go/azure/role/getRoleDefinition.go +++ b/sdk/go/azure/role/getRoleDefinition.go @@ -28,7 +28,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// primary, err := core.LookupSubscription(ctx, nil, nil) +// primary, err := core.LookupSubscription(ctx, &core.LookupSubscriptionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/securitycenter/automation.go b/sdk/go/azure/securitycenter/automation.go index 59db6c4fee..613482b5fc 100644 --- a/sdk/go/azure/securitycenter/automation.go +++ b/sdk/go/azure/securitycenter/automation.go @@ -32,7 +32,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/signalr/serviceCustomCertificate.go b/sdk/go/azure/signalr/serviceCustomCertificate.go index 135fe26c1e..90514c2f66 100644 --- a/sdk/go/azure/signalr/serviceCustomCertificate.go +++ b/sdk/go/azure/signalr/serviceCustomCertificate.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/signalr/serviceCustomDomain.go b/sdk/go/azure/signalr/serviceCustomDomain.go index 9df6585cf8..63e12b72ab 100644 --- a/sdk/go/azure/signalr/serviceCustomDomain.go +++ b/sdk/go/azure/signalr/serviceCustomDomain.go @@ -31,7 +31,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/signalr/sharedPrivateLinkResource.go b/sdk/go/azure/signalr/sharedPrivateLinkResource.go index 06798a7680..e410bc0230 100644 --- a/sdk/go/azure/signalr/sharedPrivateLinkResource.go +++ b/sdk/go/azure/signalr/sharedPrivateLinkResource.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/siterecovery/replicationRecoveryPlan.go b/sdk/go/azure/siterecovery/replicationRecoveryPlan.go index c2ac3bd494..e3e5efcced 100644 --- a/sdk/go/azure/siterecovery/replicationRecoveryPlan.go +++ b/sdk/go/azure/siterecovery/replicationRecoveryPlan.go @@ -290,8 +290,8 @@ import ( // RecoveryVaultId: vault.ID(), // SourceRecoveryFabricId: primaryFabric.ID(), // TargetRecoveryFabricId: secondaryFabric.ID(), -// ShutdownRecoveryGroup: nil, -// FailoverRecoveryGroup: nil, +// ShutdownRecoveryGroup: &siterecovery.ReplicationRecoveryPlanShutdownRecoveryGroupArgs{}, +// FailoverRecoveryGroup: &siterecovery.ReplicationRecoveryPlanFailoverRecoveryGroupArgs{}, // BootRecoveryGroups: siterecovery.ReplicationRecoveryPlanBootRecoveryGroupArray{ // &siterecovery.ReplicationRecoveryPlanBootRecoveryGroupArgs{ // ReplicatedProtectedItems: pulumi.StringArray{ diff --git a/sdk/go/azure/stack/hciCluster.go b/sdk/go/azure/stack/hciCluster.go index ae0ffd1ac4..f95e4ca39f 100644 --- a/sdk/go/azure/stack/hciCluster.go +++ b/sdk/go/azure/stack/hciCluster.go @@ -36,7 +36,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/storage/customerManagedKey.go b/sdk/go/azure/storage/customerManagedKey.go index ef0f41a800..caa94a8b0a 100644 --- a/sdk/go/azure/storage/customerManagedKey.go +++ b/sdk/go/azure/storage/customerManagedKey.go @@ -32,7 +32,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/synapse/roleAssignment.go b/sdk/go/azure/synapse/roleAssignment.go index 27c79e1080..0fcb944495 100644 --- a/sdk/go/azure/synapse/roleAssignment.go +++ b/sdk/go/azure/synapse/roleAssignment.go @@ -79,7 +79,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/synapse/workspace.go b/sdk/go/azure/synapse/workspace.go index 748d92980d..b8bd63df3c 100644 --- a/sdk/go/azure/synapse/workspace.go +++ b/sdk/go/azure/synapse/workspace.go @@ -96,7 +96,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/synapse/workspaceAadAdmin.go b/sdk/go/azure/synapse/workspaceAadAdmin.go index 1935090bea..1ad237987c 100644 --- a/sdk/go/azure/synapse/workspaceAadAdmin.go +++ b/sdk/go/azure/synapse/workspaceAadAdmin.go @@ -57,7 +57,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/synapse/workspaceKey.go b/sdk/go/azure/synapse/workspaceKey.go index 83d641a37c..4d3037cd56 100644 --- a/sdk/go/azure/synapse/workspaceKey.go +++ b/sdk/go/azure/synapse/workspaceKey.go @@ -59,7 +59,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/synapse/workspaceSqlAadAdmin.go b/sdk/go/azure/synapse/workspaceSqlAadAdmin.go index 6bd8f9ebd7..239ee7da28 100644 --- a/sdk/go/azure/synapse/workspaceSqlAadAdmin.go +++ b/sdk/go/azure/synapse/workspaceSqlAadAdmin.go @@ -57,7 +57,7 @@ import ( // if err != nil { // return err // } -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/voice/servicesCommunicationsGateway.go b/sdk/go/azure/voice/servicesCommunicationsGateway.go index 6e29df3368..5ade89d7a3 100644 --- a/sdk/go/azure/voice/servicesCommunicationsGateway.go +++ b/sdk/go/azure/voice/servicesCommunicationsGateway.go @@ -42,7 +42,7 @@ import ( // if err != nil { // return err // } -// tmpJSON0, err := json.Marshal(nil) +// tmpJSON0, err := json.Marshal(map[string]interface{}{}) // if err != nil { // return err // } diff --git a/sdk/go/azure/webpubsub/customCertificate.go b/sdk/go/azure/webpubsub/customCertificate.go index 3e35a8514f..06139bd302 100644 --- a/sdk/go/azure/webpubsub/customCertificate.go +++ b/sdk/go/azure/webpubsub/customCertificate.go @@ -32,7 +32,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/azure/webpubsub/sharedPrivateLinkResource.go b/sdk/go/azure/webpubsub/sharedPrivateLinkResource.go index b3e070de9d..3383d15a3e 100644 --- a/sdk/go/azure/webpubsub/sharedPrivateLinkResource.go +++ b/sdk/go/azure/webpubsub/sharedPrivateLinkResource.go @@ -30,7 +30,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// current, err := core.GetClientConfig(ctx, nil, nil) +// current, err := core.GetClientConfig(ctx, map[string]interface{}{}, nil) // if err != nil { // return err // } diff --git a/sdk/nodejs/package.json b/sdk/nodejs/package.json index 690ac11ee8..87f0bdcab4 100644 --- a/sdk/nodejs/package.json +++ b/sdk/nodejs/package.json @@ -17,7 +17,7 @@ "@azure/functions": "=1.2.2", "@azure/identity": "^4.0.0", "@azure/ms-rest-azure-js": "^2.0.1", - "@pulumi/pulumi": "^3.42.0", + "@pulumi/pulumi": "^3.136.0", "azure-functions-ts-essentials": "^1.3.2", "moment": "2.29.4", "node-fetch": "^2.3.0" diff --git a/sdk/python/pulumi_azure/_utilities.py b/sdk/python/pulumi_azure/_utilities.py index d14b49ace3..3ce408d5ff 100644 --- a/sdk/python/pulumi_azure/_utilities.py +++ b/sdk/python/pulumi_azure/_utilities.py @@ -264,7 +264,7 @@ def call_plain( output = pulumi.runtime.call(tok, props, res, typ) # Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency. - result, known, secret, _ = _sync_await(asyncio.ensure_future(_await_output(output))) + result, known, secret, _ = _sync_await(asyncio.create_task(_await_output(output))) problem = None if not known: diff --git a/sdk/python/pulumi_azure/aadb2c/get_directory.py b/sdk/python/pulumi_azure/aadb2c/get_directory.py index 366b84db3a..70fa196570 100644 --- a/sdk/python/pulumi_azure/aadb2c/get_directory.py +++ b/sdk/python/pulumi_azure/aadb2c/get_directory.py @@ -176,9 +176,6 @@ def get_directory(domain_name: Optional[str] = None, sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags'), tenant_id=pulumi.get(__ret__, 'tenant_id')) - - -@_utilities.lift_output_func(get_directory) def get_directory_output(domain_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDirectoryResult]: @@ -200,4 +197,18 @@ def get_directory_output(domain_name: Optional[pulumi.Input[str]] = None, :param str domain_name: Domain name of the B2C tenant, including the `.onmicrosoft.com` suffix. :param str resource_group_name: The name of the Resource Group where the AAD B2C Directory exists. """ - ... + __args__ = dict() + __args__['domainName'] = domain_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:aadb2c/getDirectory:getDirectory', __args__, opts=opts, typ=GetDirectoryResult) + return __ret__.apply(lambda __response__: GetDirectoryResult( + billing_type=pulumi.get(__response__, 'billing_type'), + data_residency_location=pulumi.get(__response__, 'data_residency_location'), + domain_name=pulumi.get(__response__, 'domain_name'), + effective_start_date=pulumi.get(__response__, 'effective_start_date'), + id=pulumi.get(__response__, 'id'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'), + tenant_id=pulumi.get(__response__, 'tenant_id'))) diff --git a/sdk/python/pulumi_azure/advisor/get_recommendations.py b/sdk/python/pulumi_azure/advisor/get_recommendations.py index 0c8eecf561..8265040394 100644 --- a/sdk/python/pulumi_azure/advisor/get_recommendations.py +++ b/sdk/python/pulumi_azure/advisor/get_recommendations.py @@ -115,9 +115,6 @@ def get_recommendations(filter_by_categories: Optional[Sequence[str]] = None, filter_by_resource_groups=pulumi.get(__ret__, 'filter_by_resource_groups'), id=pulumi.get(__ret__, 'id'), recommendations=pulumi.get(__ret__, 'recommendations')) - - -@_utilities.lift_output_func(get_recommendations) def get_recommendations_output(filter_by_categories: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, filter_by_resource_groups: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRecommendationsResult]: @@ -142,4 +139,13 @@ def get_recommendations_output(filter_by_categories: Optional[pulumi.Input[Optio :param Sequence[str] filter_by_categories: Specifies a list of categories in which the Advisor Recommendations will be listed. Possible values are `HighAvailability`, `Security`, `Performance`, `Cost` and `OperationalExcellence`. :param Sequence[str] filter_by_resource_groups: Specifies a list of resource groups about which the Advisor Recommendations will be listed. """ - ... + __args__ = dict() + __args__['filterByCategories'] = filter_by_categories + __args__['filterByResourceGroups'] = filter_by_resource_groups + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:advisor/getRecommendations:getRecommendations', __args__, opts=opts, typ=GetRecommendationsResult) + return __ret__.apply(lambda __response__: GetRecommendationsResult( + filter_by_categories=pulumi.get(__response__, 'filter_by_categories'), + filter_by_resource_groups=pulumi.get(__response__, 'filter_by_resource_groups'), + id=pulumi.get(__response__, 'id'), + recommendations=pulumi.get(__response__, 'recommendations'))) diff --git a/sdk/python/pulumi_azure/apimanagement/get_api.py b/sdk/python/pulumi_azure/apimanagement/get_api.py index b8d5f64bd5..4c510faf73 100644 --- a/sdk/python/pulumi_azure/apimanagement/get_api.py +++ b/sdk/python/pulumi_azure/apimanagement/get_api.py @@ -283,9 +283,6 @@ def get_api(api_management_name: Optional[str] = None, subscription_required=pulumi.get(__ret__, 'subscription_required'), version=pulumi.get(__ret__, 'version'), version_set_id=pulumi.get(__ret__, 'version_set_id')) - - -@_utilities.lift_output_func(get_api) def get_api_output(api_management_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -313,4 +310,28 @@ def get_api_output(api_management_name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group in which the API Management Service exists. :param str revision: The Revision of the API Management API. """ - ... + __args__ = dict() + __args__['apiManagementName'] = api_management_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['revision'] = revision + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:apimanagement/getApi:getApi', __args__, opts=opts, typ=GetApiResult) + return __ret__.apply(lambda __response__: GetApiResult( + api_management_name=pulumi.get(__response__, 'api_management_name'), + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + is_current=pulumi.get(__response__, 'is_current'), + is_online=pulumi.get(__response__, 'is_online'), + name=pulumi.get(__response__, 'name'), + path=pulumi.get(__response__, 'path'), + protocols=pulumi.get(__response__, 'protocols'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + revision=pulumi.get(__response__, 'revision'), + service_url=pulumi.get(__response__, 'service_url'), + soap_pass_through=pulumi.get(__response__, 'soap_pass_through'), + subscription_key_parameter_names=pulumi.get(__response__, 'subscription_key_parameter_names'), + subscription_required=pulumi.get(__response__, 'subscription_required'), + version=pulumi.get(__response__, 'version'), + version_set_id=pulumi.get(__response__, 'version_set_id'))) diff --git a/sdk/python/pulumi_azure/apimanagement/get_api_version_set.py b/sdk/python/pulumi_azure/apimanagement/get_api_version_set.py index 3d74f9a3d8..7027ff3892 100644 --- a/sdk/python/pulumi_azure/apimanagement/get_api_version_set.py +++ b/sdk/python/pulumi_azure/apimanagement/get_api_version_set.py @@ -174,9 +174,6 @@ def get_api_version_set(api_management_name: Optional[str] = None, version_header_name=pulumi.get(__ret__, 'version_header_name'), version_query_name=pulumi.get(__ret__, 'version_query_name'), versioning_scheme=pulumi.get(__ret__, 'versioning_scheme')) - - -@_utilities.lift_output_func(get_api_version_set) def get_api_version_set_output(api_management_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -201,4 +198,19 @@ def get_api_version_set_output(api_management_name: Optional[pulumi.Input[str]] :param str name: The name of the API Version Set. :param str resource_group_name: The name of the Resource Group in which the parent API Management Service exists. """ - ... + __args__ = dict() + __args__['apiManagementName'] = api_management_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:apimanagement/getApiVersionSet:getApiVersionSet', __args__, opts=opts, typ=GetApiVersionSetResult) + return __ret__.apply(lambda __response__: GetApiVersionSetResult( + api_management_name=pulumi.get(__response__, 'api_management_name'), + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + version_header_name=pulumi.get(__response__, 'version_header_name'), + version_query_name=pulumi.get(__response__, 'version_query_name'), + versioning_scheme=pulumi.get(__response__, 'versioning_scheme'))) diff --git a/sdk/python/pulumi_azure/apimanagement/get_gateway.py b/sdk/python/pulumi_azure/apimanagement/get_gateway.py index d6f8172930..d486ef21db 100644 --- a/sdk/python/pulumi_azure/apimanagement/get_gateway.py +++ b/sdk/python/pulumi_azure/apimanagement/get_gateway.py @@ -129,9 +129,6 @@ def get_gateway(api_management_id: Optional[str] = None, id=pulumi.get(__ret__, 'id'), location_datas=pulumi.get(__ret__, 'location_datas'), name=pulumi.get(__ret__, 'name')) - - -@_utilities.lift_output_func(get_gateway) def get_gateway_output(api_management_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGatewayResult]: @@ -154,4 +151,14 @@ def get_gateway_output(api_management_id: Optional[pulumi.Input[str]] = None, :param str api_management_id: The ID of the API Management Service in which the Gateway exists. :param str name: The name of the API Management Gateway. """ - ... + __args__ = dict() + __args__['apiManagementId'] = api_management_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:apimanagement/getGateway:getGateway', __args__, opts=opts, typ=GetGatewayResult) + return __ret__.apply(lambda __response__: GetGatewayResult( + api_management_id=pulumi.get(__response__, 'api_management_id'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + location_datas=pulumi.get(__response__, 'location_datas'), + name=pulumi.get(__response__, 'name'))) diff --git a/sdk/python/pulumi_azure/apimanagement/get_gateway_host_name_configuration.py b/sdk/python/pulumi_azure/apimanagement/get_gateway_host_name_configuration.py index 104af7f4b5..cc7786f6bd 100644 --- a/sdk/python/pulumi_azure/apimanagement/get_gateway_host_name_configuration.py +++ b/sdk/python/pulumi_azure/apimanagement/get_gateway_host_name_configuration.py @@ -195,9 +195,6 @@ def get_gateway_host_name_configuration(api_management_id: Optional[str] = None, request_client_certificate_enabled=pulumi.get(__ret__, 'request_client_certificate_enabled'), tls10_enabled=pulumi.get(__ret__, 'tls10_enabled'), tls11_enabled=pulumi.get(__ret__, 'tls11_enabled')) - - -@_utilities.lift_output_func(get_gateway_host_name_configuration) def get_gateway_host_name_configuration_output(api_management_id: Optional[pulumi.Input[str]] = None, gateway_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, @@ -227,4 +224,20 @@ def get_gateway_host_name_configuration_output(api_management_id: Optional[pulum * :param str name: The name of the API Management Gateway Host Name Configuration. """ - ... + __args__ = dict() + __args__['apiManagementId'] = api_management_id + __args__['gatewayName'] = gateway_name + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:apimanagement/getGatewayHostNameConfiguration:getGatewayHostNameConfiguration', __args__, opts=opts, typ=GetGatewayHostNameConfigurationResult) + return __ret__.apply(lambda __response__: GetGatewayHostNameConfigurationResult( + api_management_id=pulumi.get(__response__, 'api_management_id'), + certificate_id=pulumi.get(__response__, 'certificate_id'), + gateway_name=pulumi.get(__response__, 'gateway_name'), + host_name=pulumi.get(__response__, 'host_name'), + http2_enabled=pulumi.get(__response__, 'http2_enabled'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + request_client_certificate_enabled=pulumi.get(__response__, 'request_client_certificate_enabled'), + tls10_enabled=pulumi.get(__response__, 'tls10_enabled'), + tls11_enabled=pulumi.get(__response__, 'tls11_enabled'))) diff --git a/sdk/python/pulumi_azure/apimanagement/get_group.py b/sdk/python/pulumi_azure/apimanagement/get_group.py index 31d1e628e1..abaa79d800 100644 --- a/sdk/python/pulumi_azure/apimanagement/get_group.py +++ b/sdk/python/pulumi_azure/apimanagement/get_group.py @@ -164,9 +164,6 @@ def get_group(api_management_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_group) def get_group_output(api_management_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -191,4 +188,18 @@ def get_group_output(api_management_name: Optional[pulumi.Input[str]] = None, :param str name: The Name of the API Management Group. :param str resource_group_name: The Name of the Resource Group in which the API Management Service exists. """ - ... + __args__ = dict() + __args__['apiManagementName'] = api_management_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:apimanagement/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult) + return __ret__.apply(lambda __response__: GetGroupResult( + api_management_name=pulumi.get(__response__, 'api_management_name'), + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + external_id=pulumi.get(__response__, 'external_id'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_azure/apimanagement/get_product.py b/sdk/python/pulumi_azure/apimanagement/get_product.py index 6e13392da9..0311c4f8cc 100644 --- a/sdk/python/pulumi_azure/apimanagement/get_product.py +++ b/sdk/python/pulumi_azure/apimanagement/get_product.py @@ -203,9 +203,6 @@ def get_product(api_management_name: Optional[str] = None, subscription_required=pulumi.get(__ret__, 'subscription_required'), subscriptions_limit=pulumi.get(__ret__, 'subscriptions_limit'), terms=pulumi.get(__ret__, 'terms')) - - -@_utilities.lift_output_func(get_product) def get_product_output(api_management_name: Optional[pulumi.Input[str]] = None, product_id: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -230,4 +227,21 @@ def get_product_output(api_management_name: Optional[pulumi.Input[str]] = None, :param str product_id: The Identifier for the API Management Product. :param str resource_group_name: The Name of the Resource Group in which the API Management Service exists. """ - ... + __args__ = dict() + __args__['apiManagementName'] = api_management_name + __args__['productId'] = product_id + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:apimanagement/getProduct:getProduct', __args__, opts=opts, typ=GetProductResult) + return __ret__.apply(lambda __response__: GetProductResult( + api_management_name=pulumi.get(__response__, 'api_management_name'), + approval_required=pulumi.get(__response__, 'approval_required'), + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + product_id=pulumi.get(__response__, 'product_id'), + published=pulumi.get(__response__, 'published'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + subscription_required=pulumi.get(__response__, 'subscription_required'), + subscriptions_limit=pulumi.get(__response__, 'subscriptions_limit'), + terms=pulumi.get(__response__, 'terms'))) diff --git a/sdk/python/pulumi_azure/apimanagement/get_service.py b/sdk/python/pulumi_azure/apimanagement/get_service.py index 88bdc48bd6..0cad438ff8 100644 --- a/sdk/python/pulumi_azure/apimanagement/get_service.py +++ b/sdk/python/pulumi_azure/apimanagement/get_service.py @@ -349,9 +349,6 @@ def get_service(name: Optional[str] = None, sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags'), tenant_accesses=pulumi.get(__ret__, 'tenant_accesses')) - - -@_utilities.lift_output_func(get_service) def get_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -375,4 +372,32 @@ def get_service_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group in which the API Management Service exists. :param Mapping[str, str] tags: A mapping of tags assigned to the resource. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:apimanagement/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + additional_locations=pulumi.get(__response__, 'additional_locations'), + developer_portal_url=pulumi.get(__response__, 'developer_portal_url'), + gateway_regional_url=pulumi.get(__response__, 'gateway_regional_url'), + gateway_url=pulumi.get(__response__, 'gateway_url'), + hostname_configurations=pulumi.get(__response__, 'hostname_configurations'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + management_api_url=pulumi.get(__response__, 'management_api_url'), + name=pulumi.get(__response__, 'name'), + notification_sender_email=pulumi.get(__response__, 'notification_sender_email'), + portal_url=pulumi.get(__response__, 'portal_url'), + private_ip_addresses=pulumi.get(__response__, 'private_ip_addresses'), + public_ip_address_id=pulumi.get(__response__, 'public_ip_address_id'), + public_ip_addresses=pulumi.get(__response__, 'public_ip_addresses'), + publisher_email=pulumi.get(__response__, 'publisher_email'), + publisher_name=pulumi.get(__response__, 'publisher_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + scm_url=pulumi.get(__response__, 'scm_url'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'), + tenant_accesses=pulumi.get(__response__, 'tenant_accesses'))) diff --git a/sdk/python/pulumi_azure/apimanagement/get_user.py b/sdk/python/pulumi_azure/apimanagement/get_user.py index 20719198d5..b10472f829 100644 --- a/sdk/python/pulumi_azure/apimanagement/get_user.py +++ b/sdk/python/pulumi_azure/apimanagement/get_user.py @@ -165,9 +165,6 @@ def get_user(api_management_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), state=pulumi.get(__ret__, 'state'), user_id=pulumi.get(__ret__, 'user_id')) - - -@_utilities.lift_output_func(get_user) def get_user_output(api_management_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, user_id: Optional[pulumi.Input[str]] = None, @@ -180,4 +177,19 @@ def get_user_output(api_management_name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group in which the API Management Service exists. :param str user_id: The Identifier for the User. """ - ... + __args__ = dict() + __args__['apiManagementName'] = api_management_name + __args__['resourceGroupName'] = resource_group_name + __args__['userId'] = user_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:apimanagement/getUser:getUser', __args__, opts=opts, typ=GetUserResult) + return __ret__.apply(lambda __response__: GetUserResult( + api_management_name=pulumi.get(__response__, 'api_management_name'), + email=pulumi.get(__response__, 'email'), + first_name=pulumi.get(__response__, 'first_name'), + id=pulumi.get(__response__, 'id'), + last_name=pulumi.get(__response__, 'last_name'), + note=pulumi.get(__response__, 'note'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + state=pulumi.get(__response__, 'state'), + user_id=pulumi.get(__response__, 'user_id'))) diff --git a/sdk/python/pulumi_azure/appconfiguration/get_configuration_key.py b/sdk/python/pulumi_azure/appconfiguration/get_configuration_key.py index 27c27786f0..dab6a52271 100644 --- a/sdk/python/pulumi_azure/appconfiguration/get_configuration_key.py +++ b/sdk/python/pulumi_azure/appconfiguration/get_configuration_key.py @@ -205,9 +205,6 @@ def get_configuration_key(configuration_store_id: Optional[str] = None, type=pulumi.get(__ret__, 'type'), value=pulumi.get(__ret__, 'value'), vault_key_reference=pulumi.get(__ret__, 'vault_key_reference')) - - -@_utilities.lift_output_func(get_configuration_key) def get_configuration_key_output(configuration_store_id: Optional[pulumi.Input[str]] = None, key: Optional[pulumi.Input[str]] = None, label: Optional[pulumi.Input[Optional[str]]] = None, @@ -234,4 +231,21 @@ def get_configuration_key_output(configuration_store_id: Optional[pulumi.Input[s :param str key: The name of the App Configuration Key. :param str label: The label of the App Configuration Key. """ - ... + __args__ = dict() + __args__['configurationStoreId'] = configuration_store_id + __args__['key'] = key + __args__['label'] = label + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appconfiguration/getConfigurationKey:getConfigurationKey', __args__, opts=opts, typ=GetConfigurationKeyResult) + return __ret__.apply(lambda __response__: GetConfigurationKeyResult( + configuration_store_id=pulumi.get(__response__, 'configuration_store_id'), + content_type=pulumi.get(__response__, 'content_type'), + etag=pulumi.get(__response__, 'etag'), + id=pulumi.get(__response__, 'id'), + key=pulumi.get(__response__, 'key'), + label=pulumi.get(__response__, 'label'), + locked=pulumi.get(__response__, 'locked'), + tags=pulumi.get(__response__, 'tags'), + type=pulumi.get(__response__, 'type'), + value=pulumi.get(__response__, 'value'), + vault_key_reference=pulumi.get(__response__, 'vault_key_reference'))) diff --git a/sdk/python/pulumi_azure/appconfiguration/get_configuration_keys.py b/sdk/python/pulumi_azure/appconfiguration/get_configuration_keys.py index afb5194db6..0d16046932 100644 --- a/sdk/python/pulumi_azure/appconfiguration/get_configuration_keys.py +++ b/sdk/python/pulumi_azure/appconfiguration/get_configuration_keys.py @@ -132,9 +132,6 @@ def get_configuration_keys(configuration_store_id: Optional[str] = None, items=pulumi.get(__ret__, 'items'), key=pulumi.get(__ret__, 'key'), label=pulumi.get(__ret__, 'label')) - - -@_utilities.lift_output_func(get_configuration_keys) def get_configuration_keys_output(configuration_store_id: Optional[pulumi.Input[str]] = None, key: Optional[pulumi.Input[Optional[str]]] = None, label: Optional[pulumi.Input[Optional[str]]] = None, @@ -159,4 +156,15 @@ def get_configuration_keys_output(configuration_store_id: Optional[pulumi.Input[ :param str key: The name of the App Configuration Keys to look up. :param str label: The label of the App Configuration Keys tp look up. """ - ... + __args__ = dict() + __args__['configurationStoreId'] = configuration_store_id + __args__['key'] = key + __args__['label'] = label + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appconfiguration/getConfigurationKeys:getConfigurationKeys', __args__, opts=opts, typ=GetConfigurationKeysResult) + return __ret__.apply(lambda __response__: GetConfigurationKeysResult( + configuration_store_id=pulumi.get(__response__, 'configuration_store_id'), + id=pulumi.get(__response__, 'id'), + items=pulumi.get(__response__, 'items'), + key=pulumi.get(__response__, 'key'), + label=pulumi.get(__response__, 'label'))) diff --git a/sdk/python/pulumi_azure/appconfiguration/get_configuration_store.py b/sdk/python/pulumi_azure/appconfiguration/get_configuration_store.py index 085e89e399..ce4557b06b 100644 --- a/sdk/python/pulumi_azure/appconfiguration/get_configuration_store.py +++ b/sdk/python/pulumi_azure/appconfiguration/get_configuration_store.py @@ -304,9 +304,6 @@ def get_configuration_store(name: Optional[str] = None, sku=pulumi.get(__ret__, 'sku'), soft_delete_retention_days=pulumi.get(__ret__, 'soft_delete_retention_days'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_configuration_store) def get_configuration_store_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetConfigurationStoreResult]: @@ -328,4 +325,28 @@ def get_configuration_store_output(name: Optional[pulumi.Input[str]] = None, :param str name: The Name of this App Configuration. :param str resource_group_name: The name of the Resource Group where the App Configuration exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appconfiguration/getConfigurationStore:getConfigurationStore', __args__, opts=opts, typ=GetConfigurationStoreResult) + return __ret__.apply(lambda __response__: GetConfigurationStoreResult( + encryptions=pulumi.get(__response__, 'encryptions'), + endpoint=pulumi.get(__response__, 'endpoint'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + local_auth_enabled=pulumi.get(__response__, 'local_auth_enabled'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + primary_read_keys=pulumi.get(__response__, 'primary_read_keys'), + primary_write_keys=pulumi.get(__response__, 'primary_write_keys'), + public_network_access=pulumi.get(__response__, 'public_network_access'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + purge_protection_enabled=pulumi.get(__response__, 'purge_protection_enabled'), + replicas=pulumi.get(__response__, 'replicas'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_read_keys=pulumi.get(__response__, 'secondary_read_keys'), + secondary_write_keys=pulumi.get(__response__, 'secondary_write_keys'), + sku=pulumi.get(__response__, 'sku'), + soft_delete_retention_days=pulumi.get(__response__, 'soft_delete_retention_days'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/appinsights/get_insights.py b/sdk/python/pulumi_azure/appinsights/get_insights.py index 517dcd6211..4d895f436e 100644 --- a/sdk/python/pulumi_azure/appinsights/get_insights.py +++ b/sdk/python/pulumi_azure/appinsights/get_insights.py @@ -202,9 +202,6 @@ def get_insights(name: Optional[str] = None, retention_in_days=pulumi.get(__ret__, 'retention_in_days'), tags=pulumi.get(__ret__, 'tags'), workspace_id=pulumi.get(__ret__, 'workspace_id')) - - -@_utilities.lift_output_func(get_insights) def get_insights_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetInsightsResult]: @@ -226,4 +223,20 @@ def get_insights_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Application Insights component. :param str resource_group_name: Specifies the name of the resource group the Application Insights component is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appinsights/getInsights:getInsights', __args__, opts=opts, typ=GetInsightsResult) + return __ret__.apply(lambda __response__: GetInsightsResult( + app_id=pulumi.get(__response__, 'app_id'), + application_type=pulumi.get(__response__, 'application_type'), + connection_string=pulumi.get(__response__, 'connection_string'), + id=pulumi.get(__response__, 'id'), + instrumentation_key=pulumi.get(__response__, 'instrumentation_key'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + retention_in_days=pulumi.get(__response__, 'retention_in_days'), + tags=pulumi.get(__response__, 'tags'), + workspace_id=pulumi.get(__response__, 'workspace_id'))) diff --git a/sdk/python/pulumi_azure/appplatform/get_spring_cloud_app.py b/sdk/python/pulumi_azure/appplatform/get_spring_cloud_app.py index 15092bda58..80504ab9eb 100644 --- a/sdk/python/pulumi_azure/appplatform/get_spring_cloud_app.py +++ b/sdk/python/pulumi_azure/appplatform/get_spring_cloud_app.py @@ -204,9 +204,6 @@ def get_spring_cloud_app(name: Optional[str] = None, service_name=pulumi.get(__ret__, 'service_name'), tls_enabled=pulumi.get(__ret__, 'tls_enabled'), url=pulumi.get(__ret__, 'url')) - - -@_utilities.lift_output_func(get_spring_cloud_app) def get_spring_cloud_app_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, service_name: Optional[pulumi.Input[str]] = None, @@ -231,4 +228,21 @@ def get_spring_cloud_app_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group where the Spring Cloud Application exists. :param str service_name: The name of the Spring Cloud Service. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['serviceName'] = service_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appplatform/getSpringCloudApp:getSpringCloudApp', __args__, opts=opts, typ=GetSpringCloudAppResult) + return __ret__.apply(lambda __response__: GetSpringCloudAppResult( + fqdn=pulumi.get(__response__, 'fqdn'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + is_public=pulumi.get(__response__, 'is_public'), + name=pulumi.get(__response__, 'name'), + persistent_disks=pulumi.get(__response__, 'persistent_disks'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_name=pulumi.get(__response__, 'service_name'), + tls_enabled=pulumi.get(__response__, 'tls_enabled'), + url=pulumi.get(__response__, 'url'))) diff --git a/sdk/python/pulumi_azure/appplatform/get_spring_cloud_service.py b/sdk/python/pulumi_azure/appplatform/get_spring_cloud_service.py index 6ccaeb24a6..2224728ccd 100644 --- a/sdk/python/pulumi_azure/appplatform/get_spring_cloud_service.py +++ b/sdk/python/pulumi_azure/appplatform/get_spring_cloud_service.py @@ -167,9 +167,6 @@ def get_spring_cloud_service(name: Optional[str] = None, required_network_traffic_rules=pulumi.get(__ret__, 'required_network_traffic_rules'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_spring_cloud_service) def get_spring_cloud_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSpringCloudServiceResult]: @@ -191,4 +188,17 @@ def get_spring_cloud_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies The name of the Spring Cloud Service resource. :param str resource_group_name: Specifies the name of the Resource Group where the Spring Cloud Service exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appplatform/getSpringCloudService:getSpringCloudService', __args__, opts=opts, typ=GetSpringCloudServiceResult) + return __ret__.apply(lambda __response__: GetSpringCloudServiceResult( + config_server_git_settings=pulumi.get(__response__, 'config_server_git_settings'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + outbound_public_ip_addresses=pulumi.get(__response__, 'outbound_public_ip_addresses'), + required_network_traffic_rules=pulumi.get(__response__, 'required_network_traffic_rules'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/appservice/get_app_service.py b/sdk/python/pulumi_azure/appservice/get_app_service.py index 450e547dad..0d171098cb 100644 --- a/sdk/python/pulumi_azure/appservice/get_app_service.py +++ b/sdk/python/pulumi_azure/appservice/get_app_service.py @@ -335,9 +335,6 @@ def get_app_service(name: Optional[str] = None, site_credentials=pulumi.get(__ret__, 'site_credentials'), source_controls=pulumi.get(__ret__, 'source_controls'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_app_service) def get_app_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAppServiceResult]: @@ -361,4 +358,30 @@ def get_app_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the App Service. :param str resource_group_name: The Name of the Resource Group where the App Service exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getAppService:getAppService', __args__, opts=opts, typ=GetAppServiceResult) + return __ret__.apply(lambda __response__: GetAppServiceResult( + app_service_plan_id=pulumi.get(__response__, 'app_service_plan_id'), + app_settings=pulumi.get(__response__, 'app_settings'), + client_affinity_enabled=pulumi.get(__response__, 'client_affinity_enabled'), + client_cert_enabled=pulumi.get(__response__, 'client_cert_enabled'), + connection_strings=pulumi.get(__response__, 'connection_strings'), + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + default_site_hostname=pulumi.get(__response__, 'default_site_hostname'), + enabled=pulumi.get(__response__, 'enabled'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + outbound_ip_address_lists=pulumi.get(__response__, 'outbound_ip_address_lists'), + outbound_ip_addresses=pulumi.get(__response__, 'outbound_ip_addresses'), + possible_outbound_ip_address_lists=pulumi.get(__response__, 'possible_outbound_ip_address_lists'), + possible_outbound_ip_addresses=pulumi.get(__response__, 'possible_outbound_ip_addresses'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + site_configs=pulumi.get(__response__, 'site_configs'), + site_credentials=pulumi.get(__response__, 'site_credentials'), + source_controls=pulumi.get(__response__, 'source_controls'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/appservice/get_app_service_plan.py b/sdk/python/pulumi_azure/appservice/get_app_service_plan.py index 5faf620559..eb48e57499 100644 --- a/sdk/python/pulumi_azure/appservice/get_app_service_plan.py +++ b/sdk/python/pulumi_azure/appservice/get_app_service_plan.py @@ -244,9 +244,6 @@ def get_app_service_plan(name: Optional[str] = None, sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags'), zone_redundant=pulumi.get(__ret__, 'zone_redundant')) - - -@_utilities.lift_output_func(get_app_service_plan) def get_app_service_plan_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAppServicePlanResult]: @@ -270,4 +267,23 @@ def get_app_service_plan_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the App Service Plan. :param str resource_group_name: The Name of the Resource Group where the App Service Plan exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getAppServicePlan:getAppServicePlan', __args__, opts=opts, typ=GetAppServicePlanResult) + return __ret__.apply(lambda __response__: GetAppServicePlanResult( + app_service_environment_id=pulumi.get(__response__, 'app_service_environment_id'), + id=pulumi.get(__response__, 'id'), + is_xenon=pulumi.get(__response__, 'is_xenon'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + maximum_elastic_worker_count=pulumi.get(__response__, 'maximum_elastic_worker_count'), + maximum_number_of_workers=pulumi.get(__response__, 'maximum_number_of_workers'), + name=pulumi.get(__response__, 'name'), + per_site_scaling=pulumi.get(__response__, 'per_site_scaling'), + reserved=pulumi.get(__response__, 'reserved'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + zone_redundant=pulumi.get(__response__, 'zone_redundant'))) diff --git a/sdk/python/pulumi_azure/appservice/get_certificate.py b/sdk/python/pulumi_azure/appservice/get_certificate.py index eb92456282..2dd359fd8d 100644 --- a/sdk/python/pulumi_azure/appservice/get_certificate.py +++ b/sdk/python/pulumi_azure/appservice/get_certificate.py @@ -211,9 +211,6 @@ def get_certificate(name: Optional[str] = None, subject_name=pulumi.get(__ret__, 'subject_name'), tags=pulumi.get(__ret__, 'tags'), thumbprint=pulumi.get(__ret__, 'thumbprint')) - - -@_utilities.lift_output_func(get_certificate) def get_certificate_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -236,4 +233,22 @@ def get_certificate_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the certificate. :param str resource_group_name: The name of the resource group in which to create the certificate. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getCertificate:getCertificate', __args__, opts=opts, typ=GetCertificateResult) + return __ret__.apply(lambda __response__: GetCertificateResult( + expiration_date=pulumi.get(__response__, 'expiration_date'), + friendly_name=pulumi.get(__response__, 'friendly_name'), + host_names=pulumi.get(__response__, 'host_names'), + id=pulumi.get(__response__, 'id'), + issue_date=pulumi.get(__response__, 'issue_date'), + issuer=pulumi.get(__response__, 'issuer'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + subject_name=pulumi.get(__response__, 'subject_name'), + tags=pulumi.get(__response__, 'tags'), + thumbprint=pulumi.get(__response__, 'thumbprint'))) diff --git a/sdk/python/pulumi_azure/appservice/get_certificate_order.py b/sdk/python/pulumi_azure/appservice/get_certificate_order.py index 6684f8bd64..7d1e152ad6 100644 --- a/sdk/python/pulumi_azure/appservice/get_certificate_order.py +++ b/sdk/python/pulumi_azure/appservice/get_certificate_order.py @@ -320,9 +320,6 @@ def get_certificate_order(name: Optional[str] = None, status=pulumi.get(__ret__, 'status'), tags=pulumi.get(__ret__, 'tags'), validity_in_years=pulumi.get(__ret__, 'validity_in_years')) - - -@_utilities.lift_output_func(get_certificate_order) def get_certificate_order_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetCertificateOrderResult]: @@ -344,4 +341,29 @@ def get_certificate_order_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the App Service. :param str resource_group_name: The Name of the Resource Group where the App Service exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getCertificateOrder:getCertificateOrder', __args__, opts=opts, typ=GetCertificateOrderResult) + return __ret__.apply(lambda __response__: GetCertificateOrderResult( + app_service_certificate_not_renewable_reasons=pulumi.get(__response__, 'app_service_certificate_not_renewable_reasons'), + auto_renew=pulumi.get(__response__, 'auto_renew'), + certificates=pulumi.get(__response__, 'certificates'), + csr=pulumi.get(__response__, 'csr'), + distinguished_name=pulumi.get(__response__, 'distinguished_name'), + domain_verification_token=pulumi.get(__response__, 'domain_verification_token'), + expiration_time=pulumi.get(__response__, 'expiration_time'), + id=pulumi.get(__response__, 'id'), + intermediate_thumbprint=pulumi.get(__response__, 'intermediate_thumbprint'), + is_private_key_external=pulumi.get(__response__, 'is_private_key_external'), + key_size=pulumi.get(__response__, 'key_size'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + product_type=pulumi.get(__response__, 'product_type'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + root_thumbprint=pulumi.get(__response__, 'root_thumbprint'), + signed_certificate_thumbprint=pulumi.get(__response__, 'signed_certificate_thumbprint'), + status=pulumi.get(__response__, 'status'), + tags=pulumi.get(__response__, 'tags'), + validity_in_years=pulumi.get(__response__, 'validity_in_years'))) diff --git a/sdk/python/pulumi_azure/appservice/get_environment_v3.py b/sdk/python/pulumi_azure/appservice/get_environment_v3.py index e640f9a6f6..9987b1efc5 100644 --- a/sdk/python/pulumi_azure/appservice/get_environment_v3.py +++ b/sdk/python/pulumi_azure/appservice/get_environment_v3.py @@ -317,9 +317,6 @@ def get_environment_v3(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), windows_outbound_ip_addresses=pulumi.get(__ret__, 'windows_outbound_ip_addresses'), zone_redundant=pulumi.get(__ret__, 'zone_redundant')) - - -@_utilities.lift_output_func(get_environment_v3) def get_environment_v3_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEnvironmentV3Result]: @@ -341,4 +338,29 @@ def get_environment_v3_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this v3 App Service Environment. :param str resource_group_name: The name of the Resource Group where the v3 App Service Environment exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getEnvironmentV3:getEnvironmentV3', __args__, opts=opts, typ=GetEnvironmentV3Result) + return __ret__.apply(lambda __response__: GetEnvironmentV3Result( + allow_new_private_endpoint_connections=pulumi.get(__response__, 'allow_new_private_endpoint_connections'), + cluster_settings=pulumi.get(__response__, 'cluster_settings'), + dedicated_host_count=pulumi.get(__response__, 'dedicated_host_count'), + dns_suffix=pulumi.get(__response__, 'dns_suffix'), + external_inbound_ip_addresses=pulumi.get(__response__, 'external_inbound_ip_addresses'), + id=pulumi.get(__response__, 'id'), + inbound_network_dependencies=pulumi.get(__response__, 'inbound_network_dependencies'), + internal_inbound_ip_addresses=pulumi.get(__response__, 'internal_inbound_ip_addresses'), + internal_load_balancing_mode=pulumi.get(__response__, 'internal_load_balancing_mode'), + ip_ssl_address_count=pulumi.get(__response__, 'ip_ssl_address_count'), + linux_outbound_ip_addresses=pulumi.get(__response__, 'linux_outbound_ip_addresses'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + pricing_tier=pulumi.get(__response__, 'pricing_tier'), + remote_debugging_enabled=pulumi.get(__response__, 'remote_debugging_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + subnet_id=pulumi.get(__response__, 'subnet_id'), + tags=pulumi.get(__response__, 'tags'), + windows_outbound_ip_addresses=pulumi.get(__response__, 'windows_outbound_ip_addresses'), + zone_redundant=pulumi.get(__response__, 'zone_redundant'))) diff --git a/sdk/python/pulumi_azure/appservice/get_function_app.py b/sdk/python/pulumi_azure/appservice/get_function_app.py index 67529610d8..e27a8d59ca 100644 --- a/sdk/python/pulumi_azure/appservice/get_function_app.py +++ b/sdk/python/pulumi_azure/appservice/get_function_app.py @@ -304,9 +304,6 @@ def get_function_app(name: Optional[str] = None, site_credentials=pulumi.get(__ret__, 'site_credentials'), source_controls=pulumi.get(__ret__, 'source_controls'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_function_app) def get_function_app_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -330,4 +327,29 @@ def get_function_app_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Function App resource. :param str resource_group_name: The name of the Resource Group where the Function App exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getFunctionApp:getFunctionApp', __args__, opts=opts, typ=GetFunctionAppResult) + return __ret__.apply(lambda __response__: GetFunctionAppResult( + app_service_plan_id=pulumi.get(__response__, 'app_service_plan_id'), + app_settings=pulumi.get(__response__, 'app_settings'), + client_cert_mode=pulumi.get(__response__, 'client_cert_mode'), + connection_strings=pulumi.get(__response__, 'connection_strings'), + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + default_hostname=pulumi.get(__response__, 'default_hostname'), + enabled=pulumi.get(__response__, 'enabled'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + os_type=pulumi.get(__response__, 'os_type'), + outbound_ip_addresses=pulumi.get(__response__, 'outbound_ip_addresses'), + possible_outbound_ip_addresses=pulumi.get(__response__, 'possible_outbound_ip_addresses'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + site_configs=pulumi.get(__response__, 'site_configs'), + site_credentials=pulumi.get(__response__, 'site_credentials'), + source_controls=pulumi.get(__response__, 'source_controls'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/appservice/get_function_app_host_keys.py b/sdk/python/pulumi_azure/appservice/get_function_app_host_keys.py index 90d9c56d99..9648963766 100644 --- a/sdk/python/pulumi_azure/appservice/get_function_app_host_keys.py +++ b/sdk/python/pulumi_azure/appservice/get_function_app_host_keys.py @@ -198,9 +198,6 @@ def get_function_app_host_keys(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), signalr_extension_key=pulumi.get(__ret__, 'signalr_extension_key'), webpubsub_extension_key=pulumi.get(__ret__, 'webpubsub_extension_key')) - - -@_utilities.lift_output_func(get_function_app_host_keys) def get_function_app_host_keys_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetFunctionAppHostKeysResult]: @@ -221,4 +218,20 @@ def get_function_app_host_keys_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Function App. :param str resource_group_name: The name of the Resource Group where the Function App exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getFunctionAppHostKeys:getFunctionAppHostKeys', __args__, opts=opts, typ=GetFunctionAppHostKeysResult) + return __ret__.apply(lambda __response__: GetFunctionAppHostKeysResult( + blobs_extension_key=pulumi.get(__response__, 'blobs_extension_key'), + default_function_key=pulumi.get(__response__, 'default_function_key'), + durabletask_extension_key=pulumi.get(__response__, 'durabletask_extension_key'), + event_grid_extension_config_key=pulumi.get(__response__, 'event_grid_extension_config_key'), + event_grid_extension_key=pulumi.get(__response__, 'event_grid_extension_key'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + primary_key=pulumi.get(__response__, 'primary_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + signalr_extension_key=pulumi.get(__response__, 'signalr_extension_key'), + webpubsub_extension_key=pulumi.get(__response__, 'webpubsub_extension_key'))) diff --git a/sdk/python/pulumi_azure/appservice/get_linux_function_app.py b/sdk/python/pulumi_azure/appservice/get_linux_function_app.py index 56f6a4e5d3..c7901dfa32 100644 --- a/sdk/python/pulumi_azure/appservice/get_linux_function_app.py +++ b/sdk/python/pulumi_azure/appservice/get_linux_function_app.py @@ -609,9 +609,6 @@ def get_linux_function_app(name: Optional[str] = None, usage=pulumi.get(__ret__, 'usage'), virtual_network_subnet_id=pulumi.get(__ret__, 'virtual_network_subnet_id'), webdeploy_publish_basic_authentication_enabled=pulumi.get(__ret__, 'webdeploy_publish_basic_authentication_enabled')) - - -@_utilities.lift_output_func(get_linux_function_app) def get_linux_function_app_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLinuxFunctionAppResult]: @@ -633,4 +630,51 @@ def get_linux_function_app_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name which should be used for this Linux Function App. :param str resource_group_name: The name of the Resource Group where the Linux Function App should exist. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getLinuxFunctionApp:getLinuxFunctionApp', __args__, opts=opts, typ=GetLinuxFunctionAppResult) + return __ret__.apply(lambda __response__: GetLinuxFunctionAppResult( + app_settings=pulumi.get(__response__, 'app_settings'), + auth_settings=pulumi.get(__response__, 'auth_settings'), + auth_settings_v2s=pulumi.get(__response__, 'auth_settings_v2s'), + availability=pulumi.get(__response__, 'availability'), + backups=pulumi.get(__response__, 'backups'), + builtin_logging_enabled=pulumi.get(__response__, 'builtin_logging_enabled'), + client_certificate_enabled=pulumi.get(__response__, 'client_certificate_enabled'), + client_certificate_exclusion_paths=pulumi.get(__response__, 'client_certificate_exclusion_paths'), + client_certificate_mode=pulumi.get(__response__, 'client_certificate_mode'), + connection_strings=pulumi.get(__response__, 'connection_strings'), + content_share_force_disabled=pulumi.get(__response__, 'content_share_force_disabled'), + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + daily_memory_time_quota=pulumi.get(__response__, 'daily_memory_time_quota'), + default_hostname=pulumi.get(__response__, 'default_hostname'), + enabled=pulumi.get(__response__, 'enabled'), + ftp_publish_basic_authentication_enabled=pulumi.get(__response__, 'ftp_publish_basic_authentication_enabled'), + functions_extension_version=pulumi.get(__response__, 'functions_extension_version'), + hosting_environment_id=pulumi.get(__response__, 'hosting_environment_id'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + outbound_ip_address_lists=pulumi.get(__response__, 'outbound_ip_address_lists'), + outbound_ip_addresses=pulumi.get(__response__, 'outbound_ip_addresses'), + possible_outbound_ip_address_lists=pulumi.get(__response__, 'possible_outbound_ip_address_lists'), + possible_outbound_ip_addresses=pulumi.get(__response__, 'possible_outbound_ip_addresses'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_plan_id=pulumi.get(__response__, 'service_plan_id'), + site_configs=pulumi.get(__response__, 'site_configs'), + site_credentials=pulumi.get(__response__, 'site_credentials'), + sticky_settings=pulumi.get(__response__, 'sticky_settings'), + storage_account_access_key=pulumi.get(__response__, 'storage_account_access_key'), + storage_account_name=pulumi.get(__response__, 'storage_account_name'), + storage_key_vault_secret_id=pulumi.get(__response__, 'storage_key_vault_secret_id'), + storage_uses_managed_identity=pulumi.get(__response__, 'storage_uses_managed_identity'), + tags=pulumi.get(__response__, 'tags'), + usage=pulumi.get(__response__, 'usage'), + virtual_network_subnet_id=pulumi.get(__response__, 'virtual_network_subnet_id'), + webdeploy_publish_basic_authentication_enabled=pulumi.get(__response__, 'webdeploy_publish_basic_authentication_enabled'))) diff --git a/sdk/python/pulumi_azure/appservice/get_linux_web_app.py b/sdk/python/pulumi_azure/appservice/get_linux_web_app.py index 4f5e3a4d08..91eef8837a 100644 --- a/sdk/python/pulumi_azure/appservice/get_linux_web_app.py +++ b/sdk/python/pulumi_azure/appservice/get_linux_web_app.py @@ -567,9 +567,6 @@ def get_linux_web_app(name: Optional[str] = None, usage=pulumi.get(__ret__, 'usage'), virtual_network_subnet_id=pulumi.get(__ret__, 'virtual_network_subnet_id'), webdeploy_publish_basic_authentication_enabled=pulumi.get(__ret__, 'webdeploy_publish_basic_authentication_enabled')) - - -@_utilities.lift_output_func(get_linux_web_app) def get_linux_web_app_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLinuxWebAppResult]: @@ -591,4 +588,48 @@ def get_linux_web_app_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Linux Web App. :param str resource_group_name: The name of the Resource Group where the Linux Web App exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getLinuxWebApp:getLinuxWebApp', __args__, opts=opts, typ=GetLinuxWebAppResult) + return __ret__.apply(lambda __response__: GetLinuxWebAppResult( + app_metadata=pulumi.get(__response__, 'app_metadata'), + app_settings=pulumi.get(__response__, 'app_settings'), + auth_settings=pulumi.get(__response__, 'auth_settings'), + auth_settings_v2s=pulumi.get(__response__, 'auth_settings_v2s'), + availability=pulumi.get(__response__, 'availability'), + backups=pulumi.get(__response__, 'backups'), + client_affinity_enabled=pulumi.get(__response__, 'client_affinity_enabled'), + client_certificate_enabled=pulumi.get(__response__, 'client_certificate_enabled'), + client_certificate_exclusion_paths=pulumi.get(__response__, 'client_certificate_exclusion_paths'), + client_certificate_mode=pulumi.get(__response__, 'client_certificate_mode'), + connection_strings=pulumi.get(__response__, 'connection_strings'), + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + default_hostname=pulumi.get(__response__, 'default_hostname'), + enabled=pulumi.get(__response__, 'enabled'), + ftp_publish_basic_authentication_enabled=pulumi.get(__response__, 'ftp_publish_basic_authentication_enabled'), + hosting_environment_id=pulumi.get(__response__, 'hosting_environment_id'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + key_vault_reference_identity_id=pulumi.get(__response__, 'key_vault_reference_identity_id'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + logs=pulumi.get(__response__, 'logs'), + name=pulumi.get(__response__, 'name'), + outbound_ip_address_lists=pulumi.get(__response__, 'outbound_ip_address_lists'), + outbound_ip_addresses=pulumi.get(__response__, 'outbound_ip_addresses'), + possible_outbound_ip_address_lists=pulumi.get(__response__, 'possible_outbound_ip_address_lists'), + possible_outbound_ip_addresses=pulumi.get(__response__, 'possible_outbound_ip_addresses'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_plan_id=pulumi.get(__response__, 'service_plan_id'), + site_configs=pulumi.get(__response__, 'site_configs'), + site_credentials=pulumi.get(__response__, 'site_credentials'), + sticky_settings=pulumi.get(__response__, 'sticky_settings'), + storage_accounts=pulumi.get(__response__, 'storage_accounts'), + tags=pulumi.get(__response__, 'tags'), + usage=pulumi.get(__response__, 'usage'), + virtual_network_subnet_id=pulumi.get(__response__, 'virtual_network_subnet_id'), + webdeploy_publish_basic_authentication_enabled=pulumi.get(__response__, 'webdeploy_publish_basic_authentication_enabled'))) diff --git a/sdk/python/pulumi_azure/appservice/get_service_plan.py b/sdk/python/pulumi_azure/appservice/get_service_plan.py index b72138ba85..8dca849fcb 100644 --- a/sdk/python/pulumi_azure/appservice/get_service_plan.py +++ b/sdk/python/pulumi_azure/appservice/get_service_plan.py @@ -241,9 +241,6 @@ def get_service_plan(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), worker_count=pulumi.get(__ret__, 'worker_count'), zone_balancing_enabled=pulumi.get(__ret__, 'zone_balancing_enabled')) - - -@_utilities.lift_output_func(get_service_plan) def get_service_plan_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServicePlanResult]: @@ -265,4 +262,23 @@ def get_service_plan_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Service Plan. :param str resource_group_name: The name of the Resource Group where the Service Plan exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getServicePlan:getServicePlan', __args__, opts=opts, typ=GetServicePlanResult) + return __ret__.apply(lambda __response__: GetServicePlanResult( + app_service_environment_id=pulumi.get(__response__, 'app_service_environment_id'), + id=pulumi.get(__response__, 'id'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + maximum_elastic_worker_count=pulumi.get(__response__, 'maximum_elastic_worker_count'), + name=pulumi.get(__response__, 'name'), + os_type=pulumi.get(__response__, 'os_type'), + per_site_scaling_enabled=pulumi.get(__response__, 'per_site_scaling_enabled'), + reserved=pulumi.get(__response__, 'reserved'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'), + worker_count=pulumi.get(__response__, 'worker_count'), + zone_balancing_enabled=pulumi.get(__response__, 'zone_balancing_enabled'))) diff --git a/sdk/python/pulumi_azure/appservice/get_source_control_token.py b/sdk/python/pulumi_azure/appservice/get_source_control_token.py index 5dbce54ea2..8ff738896e 100644 --- a/sdk/python/pulumi_azure/appservice/get_source_control_token.py +++ b/sdk/python/pulumi_azure/appservice/get_source_control_token.py @@ -105,9 +105,6 @@ def get_source_control_token(type: Optional[str] = None, token=pulumi.get(__ret__, 'token'), token_secret=pulumi.get(__ret__, 'token_secret'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_source_control_token) def get_source_control_token_output(type: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSourceControlTokenResult]: """ @@ -124,4 +121,12 @@ def get_source_control_token_output(type: Optional[pulumi.Input[str]] = None, :param str type: The Token type. Possible values include `Bitbucket`, `Dropbox`, `Github`, and `OneDrive`. """ - ... + __args__ = dict() + __args__['type'] = type + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getSourceControlToken:getSourceControlToken', __args__, opts=opts, typ=GetSourceControlTokenResult) + return __ret__.apply(lambda __response__: GetSourceControlTokenResult( + id=pulumi.get(__response__, 'id'), + token=pulumi.get(__response__, 'token'), + token_secret=pulumi.get(__response__, 'token_secret'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_azure/appservice/get_static_web_app.py b/sdk/python/pulumi_azure/appservice/get_static_web_app.py index 5762b8607f..f883443295 100644 --- a/sdk/python/pulumi_azure/appservice/get_static_web_app.py +++ b/sdk/python/pulumi_azure/appservice/get_static_web_app.py @@ -218,9 +218,6 @@ def get_static_web_app(name: Optional[str] = None, sku_size=pulumi.get(__ret__, 'sku_size'), sku_tier=pulumi.get(__ret__, 'sku_tier'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_static_web_app) def get_static_web_app_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticWebAppResult]: @@ -241,4 +238,24 @@ def get_static_web_app_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Static Web App. :param str resource_group_name: The name of the Resource Group where the Static Web App exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getStaticWebApp:getStaticWebApp', __args__, opts=opts, typ=GetStaticWebAppResult) + return __ret__.apply(lambda __response__: GetStaticWebAppResult( + api_key=pulumi.get(__response__, 'api_key'), + app_settings=pulumi.get(__response__, 'app_settings'), + basic_auths=pulumi.get(__response__, 'basic_auths'), + configuration_file_changes_enabled=pulumi.get(__response__, 'configuration_file_changes_enabled'), + default_host_name=pulumi.get(__response__, 'default_host_name'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + preview_environments_enabled=pulumi.get(__response__, 'preview_environments_enabled'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_size=pulumi.get(__response__, 'sku_size'), + sku_tier=pulumi.get(__response__, 'sku_tier'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/appservice/get_windows_function_app.py b/sdk/python/pulumi_azure/appservice/get_windows_function_app.py index 65560ef40d..29da26587c 100644 --- a/sdk/python/pulumi_azure/appservice/get_windows_function_app.py +++ b/sdk/python/pulumi_azure/appservice/get_windows_function_app.py @@ -583,9 +583,6 @@ def get_windows_function_app(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), virtual_network_subnet_id=pulumi.get(__ret__, 'virtual_network_subnet_id'), webdeploy_publish_basic_authentication_enabled=pulumi.get(__ret__, 'webdeploy_publish_basic_authentication_enabled')) - - -@_utilities.lift_output_func(get_windows_function_app) def get_windows_function_app_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWindowsFunctionAppResult]: @@ -607,4 +604,49 @@ def get_windows_function_app_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Windows Function App. :param str resource_group_name: The name of the Resource Group where the Windows Function App exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getWindowsFunctionApp:getWindowsFunctionApp', __args__, opts=opts, typ=GetWindowsFunctionAppResult) + return __ret__.apply(lambda __response__: GetWindowsFunctionAppResult( + app_settings=pulumi.get(__response__, 'app_settings'), + auth_settings=pulumi.get(__response__, 'auth_settings'), + auth_settings_v2s=pulumi.get(__response__, 'auth_settings_v2s'), + backups=pulumi.get(__response__, 'backups'), + builtin_logging_enabled=pulumi.get(__response__, 'builtin_logging_enabled'), + client_certificate_enabled=pulumi.get(__response__, 'client_certificate_enabled'), + client_certificate_exclusion_paths=pulumi.get(__response__, 'client_certificate_exclusion_paths'), + client_certificate_mode=pulumi.get(__response__, 'client_certificate_mode'), + connection_strings=pulumi.get(__response__, 'connection_strings'), + content_share_force_disabled=pulumi.get(__response__, 'content_share_force_disabled'), + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + daily_memory_time_quota=pulumi.get(__response__, 'daily_memory_time_quota'), + default_hostname=pulumi.get(__response__, 'default_hostname'), + enabled=pulumi.get(__response__, 'enabled'), + ftp_publish_basic_authentication_enabled=pulumi.get(__response__, 'ftp_publish_basic_authentication_enabled'), + functions_extension_version=pulumi.get(__response__, 'functions_extension_version'), + hosting_environment_id=pulumi.get(__response__, 'hosting_environment_id'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + outbound_ip_address_lists=pulumi.get(__response__, 'outbound_ip_address_lists'), + outbound_ip_addresses=pulumi.get(__response__, 'outbound_ip_addresses'), + possible_outbound_ip_address_lists=pulumi.get(__response__, 'possible_outbound_ip_address_lists'), + possible_outbound_ip_addresses=pulumi.get(__response__, 'possible_outbound_ip_addresses'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_plan_id=pulumi.get(__response__, 'service_plan_id'), + site_configs=pulumi.get(__response__, 'site_configs'), + site_credentials=pulumi.get(__response__, 'site_credentials'), + sticky_settings=pulumi.get(__response__, 'sticky_settings'), + storage_account_access_key=pulumi.get(__response__, 'storage_account_access_key'), + storage_account_name=pulumi.get(__response__, 'storage_account_name'), + storage_key_vault_secret_id=pulumi.get(__response__, 'storage_key_vault_secret_id'), + storage_uses_managed_identity=pulumi.get(__response__, 'storage_uses_managed_identity'), + tags=pulumi.get(__response__, 'tags'), + virtual_network_subnet_id=pulumi.get(__response__, 'virtual_network_subnet_id'), + webdeploy_publish_basic_authentication_enabled=pulumi.get(__response__, 'webdeploy_publish_basic_authentication_enabled'))) diff --git a/sdk/python/pulumi_azure/appservice/get_windows_web_app.py b/sdk/python/pulumi_azure/appservice/get_windows_web_app.py index 707c9f82da..1a62f34842 100644 --- a/sdk/python/pulumi_azure/appservice/get_windows_web_app.py +++ b/sdk/python/pulumi_azure/appservice/get_windows_web_app.py @@ -518,9 +518,6 @@ def get_windows_web_app(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), virtual_network_subnet_id=pulumi.get(__ret__, 'virtual_network_subnet_id'), webdeploy_publish_basic_authentication_enabled=pulumi.get(__ret__, 'webdeploy_publish_basic_authentication_enabled')) - - -@_utilities.lift_output_func(get_windows_web_app) def get_windows_web_app_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWindowsWebAppResult]: @@ -542,4 +539,44 @@ def get_windows_web_app_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Windows Web App. :param str resource_group_name: The name of the Resource Group where the Windows Web App exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:appservice/getWindowsWebApp:getWindowsWebApp', __args__, opts=opts, typ=GetWindowsWebAppResult) + return __ret__.apply(lambda __response__: GetWindowsWebAppResult( + app_settings=pulumi.get(__response__, 'app_settings'), + auth_settings=pulumi.get(__response__, 'auth_settings'), + auth_settings_v2s=pulumi.get(__response__, 'auth_settings_v2s'), + backups=pulumi.get(__response__, 'backups'), + client_affinity_enabled=pulumi.get(__response__, 'client_affinity_enabled'), + client_certificate_enabled=pulumi.get(__response__, 'client_certificate_enabled'), + client_certificate_exclusion_paths=pulumi.get(__response__, 'client_certificate_exclusion_paths'), + client_certificate_mode=pulumi.get(__response__, 'client_certificate_mode'), + connection_strings=pulumi.get(__response__, 'connection_strings'), + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + default_hostname=pulumi.get(__response__, 'default_hostname'), + enabled=pulumi.get(__response__, 'enabled'), + ftp_publish_basic_authentication_enabled=pulumi.get(__response__, 'ftp_publish_basic_authentication_enabled'), + hosting_environment_id=pulumi.get(__response__, 'hosting_environment_id'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + logs=pulumi.get(__response__, 'logs'), + name=pulumi.get(__response__, 'name'), + outbound_ip_address_lists=pulumi.get(__response__, 'outbound_ip_address_lists'), + outbound_ip_addresses=pulumi.get(__response__, 'outbound_ip_addresses'), + possible_outbound_ip_address_lists=pulumi.get(__response__, 'possible_outbound_ip_address_lists'), + possible_outbound_ip_addresses=pulumi.get(__response__, 'possible_outbound_ip_addresses'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_plan_id=pulumi.get(__response__, 'service_plan_id'), + site_configs=pulumi.get(__response__, 'site_configs'), + site_credentials=pulumi.get(__response__, 'site_credentials'), + sticky_settings=pulumi.get(__response__, 'sticky_settings'), + storage_accounts=pulumi.get(__response__, 'storage_accounts'), + tags=pulumi.get(__response__, 'tags'), + virtual_network_subnet_id=pulumi.get(__response__, 'virtual_network_subnet_id'), + webdeploy_publish_basic_authentication_enabled=pulumi.get(__response__, 'webdeploy_publish_basic_authentication_enabled'))) diff --git a/sdk/python/pulumi_azure/arc/get_resource_bridge_appliance.py b/sdk/python/pulumi_azure/arc/get_resource_bridge_appliance.py index 382b94a39f..fc6d5abdd7 100644 --- a/sdk/python/pulumi_azure/arc/get_resource_bridge_appliance.py +++ b/sdk/python/pulumi_azure/arc/get_resource_bridge_appliance.py @@ -177,9 +177,6 @@ def get_resource_bridge_appliance(name: Optional[str] = None, public_key_base64=pulumi.get(__ret__, 'public_key_base64'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_resource_bridge_appliance) def get_resource_bridge_appliance_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResourceBridgeApplianceResult]: @@ -201,4 +198,18 @@ def get_resource_bridge_appliance_output(name: Optional[pulumi.Input[str]] = Non :param str name: The name of this Arc Resource Bridge Appliance. :param str resource_group_name: The name of the Resource Group where the Arc Resource Bridge Appliance exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:arc/getResourceBridgeAppliance:getResourceBridgeAppliance', __args__, opts=opts, typ=GetResourceBridgeApplianceResult) + return __ret__.apply(lambda __response__: GetResourceBridgeApplianceResult( + distro=pulumi.get(__response__, 'distro'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + infrastructure_provider=pulumi.get(__response__, 'infrastructure_provider'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + public_key_base64=pulumi.get(__response__, 'public_key_base64'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/arcmachine/get.py b/sdk/python/pulumi_azure/arcmachine/get.py index 027840771e..84059a9a21 100644 --- a/sdk/python/pulumi_azure/arcmachine/get.py +++ b/sdk/python/pulumi_azure/arcmachine/get.py @@ -453,9 +453,6 @@ def get(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), vm_id=pulumi.get(__ret__, 'vm_id'), vm_uuid=pulumi.get(__ret__, 'vm_uuid')) - - -@_utilities.lift_output_func(get) def get_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResult]: @@ -477,4 +474,39 @@ def get_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Azure Arc machine. :param str resource_group_name: The name of the Resource Group where the Hybrid Compute exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:arcmachine/get:get', __args__, opts=opts, typ=GetResult) + return __ret__.apply(lambda __response__: GetResult( + active_directory_fqdn=pulumi.get(__response__, 'active_directory_fqdn'), + agent_version=pulumi.get(__response__, 'agent_version'), + agents=pulumi.get(__response__, 'agents'), + client_public_key=pulumi.get(__response__, 'client_public_key'), + cloud_metadatas=pulumi.get(__response__, 'cloud_metadatas'), + detected_properties=pulumi.get(__response__, 'detected_properties'), + display_name=pulumi.get(__response__, 'display_name'), + dns_fqdn=pulumi.get(__response__, 'dns_fqdn'), + domain_name=pulumi.get(__response__, 'domain_name'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + last_status_change_time=pulumi.get(__response__, 'last_status_change_time'), + location=pulumi.get(__response__, 'location'), + location_datas=pulumi.get(__response__, 'location_datas'), + machine_fqdn=pulumi.get(__response__, 'machine_fqdn'), + mssql_discovered=pulumi.get(__response__, 'mssql_discovered'), + name=pulumi.get(__response__, 'name'), + os_name=pulumi.get(__response__, 'os_name'), + os_profiles=pulumi.get(__response__, 'os_profiles'), + os_sku=pulumi.get(__response__, 'os_sku'), + os_type=pulumi.get(__response__, 'os_type'), + os_version=pulumi.get(__response__, 'os_version'), + parent_cluster_resource_id=pulumi.get(__response__, 'parent_cluster_resource_id'), + private_link_scope_resource_id=pulumi.get(__response__, 'private_link_scope_resource_id'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_statuses=pulumi.get(__response__, 'service_statuses'), + status=pulumi.get(__response__, 'status'), + tags=pulumi.get(__response__, 'tags'), + vm_id=pulumi.get(__response__, 'vm_id'), + vm_uuid=pulumi.get(__response__, 'vm_uuid'))) diff --git a/sdk/python/pulumi_azure/attestation/get_provider.py b/sdk/python/pulumi_azure/attestation/get_provider.py index afecaff169..1ba88bf832 100644 --- a/sdk/python/pulumi_azure/attestation/get_provider.py +++ b/sdk/python/pulumi_azure/attestation/get_provider.py @@ -139,9 +139,6 @@ def get_provider(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), trust_model=pulumi.get(__ret__, 'trust_model')) - - -@_utilities.lift_output_func(get_provider) def get_provider_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetProviderResult]: @@ -152,4 +149,16 @@ def get_provider_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Attestation Provider. :param str resource_group_name: The name of the Resource Group where the Attestation Provider exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:attestation/getProvider:getProvider', __args__, opts=opts, typ=GetProviderResult) + return __ret__.apply(lambda __response__: GetProviderResult( + attestation_uri=pulumi.get(__response__, 'attestation_uri'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + trust_model=pulumi.get(__response__, 'trust_model'))) diff --git a/sdk/python/pulumi_azure/authorization/get_role_definition.py b/sdk/python/pulumi_azure/authorization/get_role_definition.py index 4aed787f4c..9aa98fb1b9 100644 --- a/sdk/python/pulumi_azure/authorization/get_role_definition.py +++ b/sdk/python/pulumi_azure/authorization/get_role_definition.py @@ -177,9 +177,6 @@ def get_role_definition(name: Optional[str] = None, role_definition_id=pulumi.get(__ret__, 'role_definition_id'), scope=pulumi.get(__ret__, 'scope'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_role_definition) def get_role_definition_output(name: Optional[pulumi.Input[Optional[str]]] = None, role_definition_id: Optional[pulumi.Input[Optional[str]]] = None, scope: Optional[pulumi.Input[Optional[str]]] = None, @@ -216,4 +213,18 @@ def get_role_definition_output(name: Optional[pulumi.Input[Optional[str]]] = Non > **Note:** One of `name` or `role_definition_id` must be specified. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['roleDefinitionId'] = role_definition_id + __args__['scope'] = scope + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:authorization/getRoleDefinition:getRoleDefinition', __args__, opts=opts, typ=GetRoleDefinitionResult) + return __ret__.apply(lambda __response__: GetRoleDefinitionResult( + assignable_scopes=pulumi.get(__response__, 'assignable_scopes'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + permissions=pulumi.get(__response__, 'permissions'), + role_definition_id=pulumi.get(__response__, 'role_definition_id'), + scope=pulumi.get(__response__, 'scope'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_azure/authorization/get_user_assigned_identity.py b/sdk/python/pulumi_azure/authorization/get_user_assigned_identity.py index 2528da46e3..6ebe14e7ce 100644 --- a/sdk/python/pulumi_azure/authorization/get_user_assigned_identity.py +++ b/sdk/python/pulumi_azure/authorization/get_user_assigned_identity.py @@ -167,9 +167,6 @@ def get_user_assigned_identity(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), tenant_id=pulumi.get(__ret__, 'tenant_id')) - - -@_utilities.lift_output_func(get_user_assigned_identity) def get_user_assigned_identity_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetUserAssignedIdentityResult]: @@ -195,4 +192,17 @@ def get_user_assigned_identity_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the User Assigned Identity. :param str resource_group_name: The name of the Resource Group in which the User Assigned Identity exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:authorization/getUserAssignedIdentity:getUserAssignedIdentity', __args__, opts=opts, typ=GetUserAssignedIdentityResult) + return __ret__.apply(lambda __response__: GetUserAssignedIdentityResult( + client_id=pulumi.get(__response__, 'client_id'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + principal_id=pulumi.get(__response__, 'principal_id'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + tenant_id=pulumi.get(__response__, 'tenant_id'))) diff --git a/sdk/python/pulumi_azure/automation/get_account.py b/sdk/python/pulumi_azure/automation/get_account.py index 2302067658..0f38067d5b 100644 --- a/sdk/python/pulumi_azure/automation/get_account.py +++ b/sdk/python/pulumi_azure/automation/get_account.py @@ -174,9 +174,6 @@ def get_account(name: Optional[str] = None, private_endpoint_connections=pulumi.get(__ret__, 'private_endpoint_connections'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), secondary_key=pulumi.get(__ret__, 'secondary_key')) - - -@_utilities.lift_output_func(get_account) def get_account_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccountResult]: @@ -198,4 +195,18 @@ def get_account_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Automation Account. :param str resource_group_name: Specifies the name of the Resource Group where the Automation Account exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:automation/getAccount:getAccount', __args__, opts=opts, typ=GetAccountResult) + return __ret__.apply(lambda __response__: GetAccountResult( + endpoint=pulumi.get(__response__, 'endpoint'), + hybrid_service_url=pulumi.get(__response__, 'hybrid_service_url'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + name=pulumi.get(__response__, 'name'), + primary_key=pulumi.get(__response__, 'primary_key'), + private_endpoint_connections=pulumi.get(__response__, 'private_endpoint_connections'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_key=pulumi.get(__response__, 'secondary_key'))) diff --git a/sdk/python/pulumi_azure/automation/get_bool_variable.py b/sdk/python/pulumi_azure/automation/get_bool_variable.py index b1d1045e83..1757f77aca 100644 --- a/sdk/python/pulumi_azure/automation/get_bool_variable.py +++ b/sdk/python/pulumi_azure/automation/get_bool_variable.py @@ -151,9 +151,6 @@ def get_bool_variable(automation_account_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), value=pulumi.get(__ret__, 'value')) - - -@_utilities.lift_output_func(get_bool_variable) def get_bool_variable_output(automation_account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -178,4 +175,17 @@ def get_bool_variable_output(automation_account_name: Optional[pulumi.Input[str] :param str name: The name of the Automation Variable. :param str resource_group_name: The Name of the Resource Group where the automation account exists. """ - ... + __args__ = dict() + __args__['automationAccountName'] = automation_account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:automation/getBoolVariable:getBoolVariable', __args__, opts=opts, typ=GetBoolVariableResult) + return __ret__.apply(lambda __response__: GetBoolVariableResult( + automation_account_name=pulumi.get(__response__, 'automation_account_name'), + description=pulumi.get(__response__, 'description'), + encrypted=pulumi.get(__response__, 'encrypted'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + value=pulumi.get(__response__, 'value'))) diff --git a/sdk/python/pulumi_azure/automation/get_date_time_variable.py b/sdk/python/pulumi_azure/automation/get_date_time_variable.py index c86b46160e..f0173a2a75 100644 --- a/sdk/python/pulumi_azure/automation/get_date_time_variable.py +++ b/sdk/python/pulumi_azure/automation/get_date_time_variable.py @@ -151,9 +151,6 @@ def get_date_time_variable(automation_account_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), value=pulumi.get(__ret__, 'value')) - - -@_utilities.lift_output_func(get_date_time_variable) def get_date_time_variable_output(automation_account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -178,4 +175,17 @@ def get_date_time_variable_output(automation_account_name: Optional[pulumi.Input :param str name: The name of the Automation Variable. :param str resource_group_name: The Name of the Resource Group where the automation account exists. """ - ... + __args__ = dict() + __args__['automationAccountName'] = automation_account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:automation/getDateTimeVariable:getDateTimeVariable', __args__, opts=opts, typ=GetDateTimeVariableResult) + return __ret__.apply(lambda __response__: GetDateTimeVariableResult( + automation_account_name=pulumi.get(__response__, 'automation_account_name'), + description=pulumi.get(__response__, 'description'), + encrypted=pulumi.get(__response__, 'encrypted'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + value=pulumi.get(__response__, 'value'))) diff --git a/sdk/python/pulumi_azure/automation/get_int_variable.py b/sdk/python/pulumi_azure/automation/get_int_variable.py index 250601ec24..a2bb23cfe5 100644 --- a/sdk/python/pulumi_azure/automation/get_int_variable.py +++ b/sdk/python/pulumi_azure/automation/get_int_variable.py @@ -151,9 +151,6 @@ def get_int_variable(automation_account_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), value=pulumi.get(__ret__, 'value')) - - -@_utilities.lift_output_func(get_int_variable) def get_int_variable_output(automation_account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -178,4 +175,17 @@ def get_int_variable_output(automation_account_name: Optional[pulumi.Input[str]] :param str name: The name of the Automation Variable. :param str resource_group_name: The Name of the Resource Group where the automation account exists. """ - ... + __args__ = dict() + __args__['automationAccountName'] = automation_account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:automation/getIntVariable:getIntVariable', __args__, opts=opts, typ=GetIntVariableResult) + return __ret__.apply(lambda __response__: GetIntVariableResult( + automation_account_name=pulumi.get(__response__, 'automation_account_name'), + description=pulumi.get(__response__, 'description'), + encrypted=pulumi.get(__response__, 'encrypted'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + value=pulumi.get(__response__, 'value'))) diff --git a/sdk/python/pulumi_azure/automation/get_runbook.py b/sdk/python/pulumi_azure/automation/get_runbook.py index c25c2e28f6..2a3c6dde4b 100644 --- a/sdk/python/pulumi_azure/automation/get_runbook.py +++ b/sdk/python/pulumi_azure/automation/get_runbook.py @@ -216,9 +216,6 @@ def get_runbook(automation_account_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), runbook_type=pulumi.get(__ret__, 'runbook_type'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_runbook) def get_runbook_output(automation_account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -243,4 +240,22 @@ def get_runbook_output(automation_account_name: Optional[pulumi.Input[str]] = No :param str name: The name of the Automation Runbook. :param str resource_group_name: The name of the Resource Group where the Automation exists. """ - ... + __args__ = dict() + __args__['automationAccountName'] = automation_account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:automation/getRunbook:getRunbook', __args__, opts=opts, typ=GetRunbookResult) + return __ret__.apply(lambda __response__: GetRunbookResult( + automation_account_name=pulumi.get(__response__, 'automation_account_name'), + content=pulumi.get(__response__, 'content'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + log_activity_trace_level=pulumi.get(__response__, 'log_activity_trace_level'), + log_progress=pulumi.get(__response__, 'log_progress'), + log_verbose=pulumi.get(__response__, 'log_verbose'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + runbook_type=pulumi.get(__response__, 'runbook_type'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/automation/get_string_variable.py b/sdk/python/pulumi_azure/automation/get_string_variable.py index 2ca1c7e886..68c8449d0b 100644 --- a/sdk/python/pulumi_azure/automation/get_string_variable.py +++ b/sdk/python/pulumi_azure/automation/get_string_variable.py @@ -151,9 +151,6 @@ def get_string_variable(automation_account_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), value=pulumi.get(__ret__, 'value')) - - -@_utilities.lift_output_func(get_string_variable) def get_string_variable_output(automation_account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -178,4 +175,17 @@ def get_string_variable_output(automation_account_name: Optional[pulumi.Input[st :param str name: The name of the Automation Variable. :param str resource_group_name: The Name of the Resource Group where the automation account exists. """ - ... + __args__ = dict() + __args__['automationAccountName'] = automation_account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:automation/getStringVariable:getStringVariable', __args__, opts=opts, typ=GetStringVariableResult) + return __ret__.apply(lambda __response__: GetStringVariableResult( + automation_account_name=pulumi.get(__response__, 'automation_account_name'), + description=pulumi.get(__response__, 'description'), + encrypted=pulumi.get(__response__, 'encrypted'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + value=pulumi.get(__response__, 'value'))) diff --git a/sdk/python/pulumi_azure/automation/get_variable_object.py b/sdk/python/pulumi_azure/automation/get_variable_object.py index 1210964599..c47a341562 100644 --- a/sdk/python/pulumi_azure/automation/get_variable_object.py +++ b/sdk/python/pulumi_azure/automation/get_variable_object.py @@ -139,9 +139,6 @@ def get_variable_object(automation_account_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), value=pulumi.get(__ret__, 'value')) - - -@_utilities.lift_output_func(get_variable_object) def get_variable_object_output(automation_account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -154,4 +151,17 @@ def get_variable_object_output(automation_account_name: Optional[pulumi.Input[st :param str name: The name of the Automation Variable. :param str resource_group_name: The Name of the Resource Group where the automation account exists. """ - ... + __args__ = dict() + __args__['automationAccountName'] = automation_account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:automation/getVariableObject:getVariableObject', __args__, opts=opts, typ=GetVariableObjectResult) + return __ret__.apply(lambda __response__: GetVariableObjectResult( + automation_account_name=pulumi.get(__response__, 'automation_account_name'), + description=pulumi.get(__response__, 'description'), + encrypted=pulumi.get(__response__, 'encrypted'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + value=pulumi.get(__response__, 'value'))) diff --git a/sdk/python/pulumi_azure/automation/get_variables.py b/sdk/python/pulumi_azure/automation/get_variables.py index e0696ac29a..e15cfa29d1 100644 --- a/sdk/python/pulumi_azure/automation/get_variables.py +++ b/sdk/python/pulumi_azure/automation/get_variables.py @@ -175,9 +175,6 @@ def get_variables(automation_account_id: Optional[str] = None, nulls=pulumi.get(__ret__, 'nulls'), objects=pulumi.get(__ret__, 'objects'), strings=pulumi.get(__ret__, 'strings')) - - -@_utilities.lift_output_func(get_variables) def get_variables_output(automation_account_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVariablesResult]: """ @@ -198,4 +195,17 @@ def get_variables_output(automation_account_id: Optional[pulumi.Input[str]] = No :param str automation_account_id: The resource ID of the automation account. """ - ... + __args__ = dict() + __args__['automationAccountId'] = automation_account_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:automation/getVariables:getVariables', __args__, opts=opts, typ=GetVariablesResult) + return __ret__.apply(lambda __response__: GetVariablesResult( + automation_account_id=pulumi.get(__response__, 'automation_account_id'), + bools=pulumi.get(__response__, 'bools'), + datetimes=pulumi.get(__response__, 'datetimes'), + encrypteds=pulumi.get(__response__, 'encrypteds'), + id=pulumi.get(__response__, 'id'), + ints=pulumi.get(__response__, 'ints'), + nulls=pulumi.get(__response__, 'nulls'), + objects=pulumi.get(__response__, 'objects'), + strings=pulumi.get(__response__, 'strings'))) diff --git a/sdk/python/pulumi_azure/avs/get_private_cloud.py b/sdk/python/pulumi_azure/avs/get_private_cloud.py index f86e41d677..e48fe89322 100644 --- a/sdk/python/pulumi_azure/avs/get_private_cloud.py +++ b/sdk/python/pulumi_azure/avs/get_private_cloud.py @@ -296,9 +296,6 @@ def get_private_cloud(name: Optional[str] = None, vcenter_certificate_thumbprint=pulumi.get(__ret__, 'vcenter_certificate_thumbprint'), vcsa_endpoint=pulumi.get(__ret__, 'vcsa_endpoint'), vmotion_subnet_cidr=pulumi.get(__ret__, 'vmotion_subnet_cidr')) - - -@_utilities.lift_output_func(get_private_cloud) def get_private_cloud_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPrivateCloudResult]: @@ -322,4 +319,27 @@ def get_private_cloud_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Azure VMware Solution Private Cloud. :param str resource_group_name: The name of the Resource Group where the Azure VMware Solution Private Cloud exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:avs/getPrivateCloud:getPrivateCloud', __args__, opts=opts, typ=GetPrivateCloudResult) + return __ret__.apply(lambda __response__: GetPrivateCloudResult( + circuits=pulumi.get(__response__, 'circuits'), + hcx_cloud_manager_endpoint=pulumi.get(__response__, 'hcx_cloud_manager_endpoint'), + id=pulumi.get(__response__, 'id'), + internet_connection_enabled=pulumi.get(__response__, 'internet_connection_enabled'), + location=pulumi.get(__response__, 'location'), + management_clusters=pulumi.get(__response__, 'management_clusters'), + management_subnet_cidr=pulumi.get(__response__, 'management_subnet_cidr'), + name=pulumi.get(__response__, 'name'), + network_subnet_cidr=pulumi.get(__response__, 'network_subnet_cidr'), + nsxt_certificate_thumbprint=pulumi.get(__response__, 'nsxt_certificate_thumbprint'), + nsxt_manager_endpoint=pulumi.get(__response__, 'nsxt_manager_endpoint'), + provisioning_subnet_cidr=pulumi.get(__response__, 'provisioning_subnet_cidr'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'), + vcenter_certificate_thumbprint=pulumi.get(__response__, 'vcenter_certificate_thumbprint'), + vcsa_endpoint=pulumi.get(__response__, 'vcsa_endpoint'), + vmotion_subnet_cidr=pulumi.get(__response__, 'vmotion_subnet_cidr'))) diff --git a/sdk/python/pulumi_azure/backup/get_policy_fileshare.py b/sdk/python/pulumi_azure/backup/get_policy_fileshare.py index 7a1c9b6ddb..e91adc3e4f 100644 --- a/sdk/python/pulumi_azure/backup/get_policy_fileshare.py +++ b/sdk/python/pulumi_azure/backup/get_policy_fileshare.py @@ -111,9 +111,6 @@ def get_policy_fileshare(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), recovery_vault_name=pulumi.get(__ret__, 'recovery_vault_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_policy_fileshare) def get_policy_fileshare_output(name: Optional[pulumi.Input[str]] = None, recovery_vault_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -137,4 +134,14 @@ def get_policy_fileshare_output(name: Optional[pulumi.Input[str]] = None, :param str recovery_vault_name: Specifies the name of the Recovery Services Vault. :param str resource_group_name: The name of the resource group in which the File Share Backup Policy resides. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['recoveryVaultName'] = recovery_vault_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:backup/getPolicyFileshare:getPolicyFileshare', __args__, opts=opts, typ=GetPolicyFileshareResult) + return __ret__.apply(lambda __response__: GetPolicyFileshareResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + recovery_vault_name=pulumi.get(__response__, 'recovery_vault_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/backup/get_policy_vm.py b/sdk/python/pulumi_azure/backup/get_policy_vm.py index f727ab65e7..b931affe40 100644 --- a/sdk/python/pulumi_azure/backup/get_policy_vm.py +++ b/sdk/python/pulumi_azure/backup/get_policy_vm.py @@ -111,9 +111,6 @@ def get_policy_vm(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), recovery_vault_name=pulumi.get(__ret__, 'recovery_vault_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_policy_vm) def get_policy_vm_output(name: Optional[pulumi.Input[str]] = None, recovery_vault_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -137,4 +134,14 @@ def get_policy_vm_output(name: Optional[pulumi.Input[str]] = None, :param str recovery_vault_name: Specifies the name of the Recovery Services Vault. :param str resource_group_name: The name of the resource group in which the VM Backup Policy resides. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['recoveryVaultName'] = recovery_vault_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:backup/getPolicyVM:getPolicyVM', __args__, opts=opts, typ=GetPolicyVMResult) + return __ret__.apply(lambda __response__: GetPolicyVMResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + recovery_vault_name=pulumi.get(__response__, 'recovery_vault_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/batch/get_account.py b/sdk/python/pulumi_azure/batch/get_account.py index 61c76b2a50..d3ca6936b7 100644 --- a/sdk/python/pulumi_azure/batch/get_account.py +++ b/sdk/python/pulumi_azure/batch/get_account.py @@ -219,9 +219,6 @@ def get_account(name: Optional[str] = None, secondary_access_key=pulumi.get(__ret__, 'secondary_access_key'), storage_account_id=pulumi.get(__ret__, 'storage_account_id'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_account) def get_account_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccountResult]: @@ -243,4 +240,21 @@ def get_account_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Batch account. :param str resource_group_name: The Name of the Resource Group where this Batch account exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:batch/getAccount:getAccount', __args__, opts=opts, typ=GetAccountResult) + return __ret__.apply(lambda __response__: GetAccountResult( + account_endpoint=pulumi.get(__response__, 'account_endpoint'), + encryptions=pulumi.get(__response__, 'encryptions'), + id=pulumi.get(__response__, 'id'), + key_vault_references=pulumi.get(__response__, 'key_vault_references'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + pool_allocation_mode=pulumi.get(__response__, 'pool_allocation_mode'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + storage_account_id=pulumi.get(__response__, 'storage_account_id'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/batch/get_application.py b/sdk/python/pulumi_azure/batch/get_application.py index 148d65c8be..71202efca7 100644 --- a/sdk/python/pulumi_azure/batch/get_application.py +++ b/sdk/python/pulumi_azure/batch/get_application.py @@ -154,9 +154,6 @@ def get_application(account_name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_application) def get_application_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -181,4 +178,17 @@ def get_application_output(account_name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Application. :param str resource_group_name: The name of the Resource Group where this Batch account exists. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:batch/getApplication:getApplication', __args__, opts=opts, typ=GetApplicationResult) + return __ret__.apply(lambda __response__: GetApplicationResult( + account_name=pulumi.get(__response__, 'account_name'), + allow_updates=pulumi.get(__response__, 'allow_updates'), + default_version=pulumi.get(__response__, 'default_version'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/batch/get_certificate.py b/sdk/python/pulumi_azure/batch/get_certificate.py index 73f16175b5..54d452ca5d 100644 --- a/sdk/python/pulumi_azure/batch/get_certificate.py +++ b/sdk/python/pulumi_azure/batch/get_certificate.py @@ -164,9 +164,6 @@ def get_certificate(account_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), thumbprint=pulumi.get(__ret__, 'thumbprint'), thumbprint_algorithm=pulumi.get(__ret__, 'thumbprint_algorithm')) - - -@_utilities.lift_output_func(get_certificate) def get_certificate_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -191,4 +188,18 @@ def get_certificate_output(account_name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Batch certificate. :param str resource_group_name: The Name of the Resource Group where this Batch account exists. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:batch/getCertificate:getCertificate', __args__, opts=opts, typ=GetCertificateResult) + return __ret__.apply(lambda __response__: GetCertificateResult( + account_name=pulumi.get(__response__, 'account_name'), + format=pulumi.get(__response__, 'format'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + public_data=pulumi.get(__response__, 'public_data'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + thumbprint=pulumi.get(__response__, 'thumbprint'), + thumbprint_algorithm=pulumi.get(__response__, 'thumbprint_algorithm'))) diff --git a/sdk/python/pulumi_azure/batch/get_pool.py b/sdk/python/pulumi_azure/batch/get_pool.py index 664ffc13e0..52f47da3b9 100644 --- a/sdk/python/pulumi_azure/batch/get_pool.py +++ b/sdk/python/pulumi_azure/batch/get_pool.py @@ -407,9 +407,6 @@ def get_pool(account_name: Optional[str] = None, user_accounts=pulumi.get(__ret__, 'user_accounts'), vm_size=pulumi.get(__ret__, 'vm_size'), windows=pulumi.get(__ret__, 'windows')) - - -@_utilities.lift_output_func(get_pool) def get_pool_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -432,4 +429,37 @@ def get_pool_output(account_name: Optional[pulumi.Input[str]] = None, :param str account_name: The Azure Storage Account name. :param str name: The name of the user account. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:batch/getPool:getPool', __args__, opts=opts, typ=GetPoolResult) + return __ret__.apply(lambda __response__: GetPoolResult( + account_name=pulumi.get(__response__, 'account_name'), + auto_scales=pulumi.get(__response__, 'auto_scales'), + certificates=pulumi.get(__response__, 'certificates'), + container_configurations=pulumi.get(__response__, 'container_configurations'), + data_disks=pulumi.get(__response__, 'data_disks'), + disk_encryptions=pulumi.get(__response__, 'disk_encryptions'), + display_name=pulumi.get(__response__, 'display_name'), + extensions=pulumi.get(__response__, 'extensions'), + fixed_scales=pulumi.get(__response__, 'fixed_scales'), + id=pulumi.get(__response__, 'id'), + inter_node_communication=pulumi.get(__response__, 'inter_node_communication'), + license_type=pulumi.get(__response__, 'license_type'), + max_tasks_per_node=pulumi.get(__response__, 'max_tasks_per_node'), + metadata=pulumi.get(__response__, 'metadata'), + mounts=pulumi.get(__response__, 'mounts'), + name=pulumi.get(__response__, 'name'), + network_configurations=pulumi.get(__response__, 'network_configurations'), + node_agent_sku_id=pulumi.get(__response__, 'node_agent_sku_id'), + node_placements=pulumi.get(__response__, 'node_placements'), + os_disk_placement=pulumi.get(__response__, 'os_disk_placement'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + start_tasks=pulumi.get(__response__, 'start_tasks'), + storage_image_references=pulumi.get(__response__, 'storage_image_references'), + task_scheduling_policies=pulumi.get(__response__, 'task_scheduling_policies'), + user_accounts=pulumi.get(__response__, 'user_accounts'), + vm_size=pulumi.get(__response__, 'vm_size'), + windows=pulumi.get(__response__, 'windows'))) diff --git a/sdk/python/pulumi_azure/billing/get_enrollment_account_scope.py b/sdk/python/pulumi_azure/billing/get_enrollment_account_scope.py index 86a0767746..0784b390fa 100644 --- a/sdk/python/pulumi_azure/billing/get_enrollment_account_scope.py +++ b/sdk/python/pulumi_azure/billing/get_enrollment_account_scope.py @@ -98,9 +98,6 @@ def get_enrollment_account_scope(billing_account_name: Optional[str] = None, billing_account_name=pulumi.get(__ret__, 'billing_account_name'), enrollment_account_name=pulumi.get(__ret__, 'enrollment_account_name'), id=pulumi.get(__ret__, 'id')) - - -@_utilities.lift_output_func(get_enrollment_account_scope) def get_enrollment_account_scope_output(billing_account_name: Optional[pulumi.Input[str]] = None, enrollment_account_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEnrollmentAccountScopeResult]: @@ -122,4 +119,12 @@ def get_enrollment_account_scope_output(billing_account_name: Optional[pulumi.In :param str billing_account_name: The Billing Account Name of the Enterprise Account. :param str enrollment_account_name: The Enrollment Account Name in the above Enterprise Account. """ - ... + __args__ = dict() + __args__['billingAccountName'] = billing_account_name + __args__['enrollmentAccountName'] = enrollment_account_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:billing/getEnrollmentAccountScope:getEnrollmentAccountScope', __args__, opts=opts, typ=GetEnrollmentAccountScopeResult) + return __ret__.apply(lambda __response__: GetEnrollmentAccountScopeResult( + billing_account_name=pulumi.get(__response__, 'billing_account_name'), + enrollment_account_name=pulumi.get(__response__, 'enrollment_account_name'), + id=pulumi.get(__response__, 'id'))) diff --git a/sdk/python/pulumi_azure/billing/get_mca_account_scope.py b/sdk/python/pulumi_azure/billing/get_mca_account_scope.py index d4fc944902..e1118a659c 100644 --- a/sdk/python/pulumi_azure/billing/get_mca_account_scope.py +++ b/sdk/python/pulumi_azure/billing/get_mca_account_scope.py @@ -112,9 +112,6 @@ def get_mca_account_scope(billing_account_name: Optional[str] = None, billing_profile_name=pulumi.get(__ret__, 'billing_profile_name'), id=pulumi.get(__ret__, 'id'), invoice_section_name=pulumi.get(__ret__, 'invoice_section_name')) - - -@_utilities.lift_output_func(get_mca_account_scope) def get_mca_account_scope_output(billing_account_name: Optional[pulumi.Input[str]] = None, billing_profile_name: Optional[pulumi.Input[str]] = None, invoice_section_name: Optional[pulumi.Input[str]] = None, @@ -139,4 +136,14 @@ def get_mca_account_scope_output(billing_account_name: Optional[pulumi.Input[str :param str billing_profile_name: The Billing Profile Name in the above Billing Account. :param str invoice_section_name: The Invoice Section Name in the above Billing Profile. """ - ... + __args__ = dict() + __args__['billingAccountName'] = billing_account_name + __args__['billingProfileName'] = billing_profile_name + __args__['invoiceSectionName'] = invoice_section_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:billing/getMcaAccountScope:getMcaAccountScope', __args__, opts=opts, typ=GetMcaAccountScopeResult) + return __ret__.apply(lambda __response__: GetMcaAccountScopeResult( + billing_account_name=pulumi.get(__response__, 'billing_account_name'), + billing_profile_name=pulumi.get(__response__, 'billing_profile_name'), + id=pulumi.get(__response__, 'id'), + invoice_section_name=pulumi.get(__response__, 'invoice_section_name'))) diff --git a/sdk/python/pulumi_azure/billing/get_mpa_account_scope.py b/sdk/python/pulumi_azure/billing/get_mpa_account_scope.py index e70f56f1b9..5c79c397e2 100644 --- a/sdk/python/pulumi_azure/billing/get_mpa_account_scope.py +++ b/sdk/python/pulumi_azure/billing/get_mpa_account_scope.py @@ -98,9 +98,6 @@ def get_mpa_account_scope(billing_account_name: Optional[str] = None, billing_account_name=pulumi.get(__ret__, 'billing_account_name'), customer_name=pulumi.get(__ret__, 'customer_name'), id=pulumi.get(__ret__, 'id')) - - -@_utilities.lift_output_func(get_mpa_account_scope) def get_mpa_account_scope_output(billing_account_name: Optional[pulumi.Input[str]] = None, customer_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetMpaAccountScopeResult]: @@ -122,4 +119,12 @@ def get_mpa_account_scope_output(billing_account_name: Optional[pulumi.Input[str :param str billing_account_name: The Billing Account Name of the MPA account. :param str customer_name: The Customer Name in the above Billing Account. """ - ... + __args__ = dict() + __args__['billingAccountName'] = billing_account_name + __args__['customerName'] = customer_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:billing/getMpaAccountScope:getMpaAccountScope', __args__, opts=opts, typ=GetMpaAccountScopeResult) + return __ret__.apply(lambda __response__: GetMpaAccountScopeResult( + billing_account_name=pulumi.get(__response__, 'billing_account_name'), + customer_name=pulumi.get(__response__, 'customer_name'), + id=pulumi.get(__response__, 'id'))) diff --git a/sdk/python/pulumi_azure/blueprint/get_definition.py b/sdk/python/pulumi_azure/blueprint/get_definition.py index 73965b45e9..386397f4a9 100644 --- a/sdk/python/pulumi_azure/blueprint/get_definition.py +++ b/sdk/python/pulumi_azure/blueprint/get_definition.py @@ -179,9 +179,6 @@ def get_definition(name: Optional[str] = None, target_scope=pulumi.get(__ret__, 'target_scope'), time_created=pulumi.get(__ret__, 'time_created'), versions=pulumi.get(__ret__, 'versions')) - - -@_utilities.lift_output_func(get_definition) def get_definition_output(name: Optional[pulumi.Input[str]] = None, scope_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDefinitionResult]: @@ -206,4 +203,18 @@ def get_definition_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Blueprint. :param str scope_id: The ID of the Subscription or Management Group, as the scope at which the blueprint definition is stored. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['scopeId'] = scope_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:blueprint/getDefinition:getDefinition', __args__, opts=opts, typ=GetDefinitionResult) + return __ret__.apply(lambda __response__: GetDefinitionResult( + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + last_modified=pulumi.get(__response__, 'last_modified'), + name=pulumi.get(__response__, 'name'), + scope_id=pulumi.get(__response__, 'scope_id'), + target_scope=pulumi.get(__response__, 'target_scope'), + time_created=pulumi.get(__response__, 'time_created'), + versions=pulumi.get(__response__, 'versions'))) diff --git a/sdk/python/pulumi_azure/blueprint/get_published_version.py b/sdk/python/pulumi_azure/blueprint/get_published_version.py index 97a7870945..020debd582 100644 --- a/sdk/python/pulumi_azure/blueprint/get_published_version.py +++ b/sdk/python/pulumi_azure/blueprint/get_published_version.py @@ -186,9 +186,6 @@ def get_published_version(blueprint_name: Optional[str] = None, time_created=pulumi.get(__ret__, 'time_created'), type=pulumi.get(__ret__, 'type'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_published_version) def get_published_version_output(blueprint_name: Optional[pulumi.Input[str]] = None, scope_id: Optional[pulumi.Input[str]] = None, version: Optional[pulumi.Input[str]] = None, @@ -215,4 +212,20 @@ def get_published_version_output(blueprint_name: Optional[pulumi.Input[str]] = N :param str scope_id: The ID of the Management Group / Subscription where this Blueprint Definition is stored. :param str version: The Version name of the Published Version of the Blueprint Definition """ - ... + __args__ = dict() + __args__['blueprintName'] = blueprint_name + __args__['scopeId'] = scope_id + __args__['version'] = version + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:blueprint/getPublishedVersion:getPublishedVersion', __args__, opts=opts, typ=GetPublishedVersionResult) + return __ret__.apply(lambda __response__: GetPublishedVersionResult( + blueprint_name=pulumi.get(__response__, 'blueprint_name'), + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + last_modified=pulumi.get(__response__, 'last_modified'), + scope_id=pulumi.get(__response__, 'scope_id'), + target_scope=pulumi.get(__response__, 'target_scope'), + time_created=pulumi.get(__response__, 'time_created'), + type=pulumi.get(__response__, 'type'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_azure/cdn/get_frontdoor_custom_domain.py b/sdk/python/pulumi_azure/cdn/get_frontdoor_custom_domain.py index 43aa3a33e5..ab06209da9 100644 --- a/sdk/python/pulumi_azure/cdn/get_frontdoor_custom_domain.py +++ b/sdk/python/pulumi_azure/cdn/get_frontdoor_custom_domain.py @@ -187,9 +187,6 @@ def get_frontdoor_custom_domain(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tls=pulumi.get(__ret__, 'tls'), validation_token=pulumi.get(__ret__, 'validation_token')) - - -@_utilities.lift_output_func(get_frontdoor_custom_domain) def get_frontdoor_custom_domain_output(name: Optional[pulumi.Input[str]] = None, profile_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -213,4 +210,20 @@ def get_frontdoor_custom_domain_output(name: Optional[pulumi.Input[str]] = None, :param str profile_name: The name of the Front Door Profile which the Front Door Custom Domain is bound to. :param str resource_group_name: The name of the Resource Group where the Front Door Profile exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['profileName'] = profile_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cdn/getFrontdoorCustomDomain:getFrontdoorCustomDomain', __args__, opts=opts, typ=GetFrontdoorCustomDomainResult) + return __ret__.apply(lambda __response__: GetFrontdoorCustomDomainResult( + cdn_frontdoor_profile_id=pulumi.get(__response__, 'cdn_frontdoor_profile_id'), + dns_zone_id=pulumi.get(__response__, 'dns_zone_id'), + expiration_date=pulumi.get(__response__, 'expiration_date'), + host_name=pulumi.get(__response__, 'host_name'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + profile_name=pulumi.get(__response__, 'profile_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tls=pulumi.get(__response__, 'tls'), + validation_token=pulumi.get(__response__, 'validation_token'))) diff --git a/sdk/python/pulumi_azure/cdn/get_frontdoor_endpoint.py b/sdk/python/pulumi_azure/cdn/get_frontdoor_endpoint.py index 59e7e7211c..2c41b5fb19 100644 --- a/sdk/python/pulumi_azure/cdn/get_frontdoor_endpoint.py +++ b/sdk/python/pulumi_azure/cdn/get_frontdoor_endpoint.py @@ -150,9 +150,6 @@ def get_frontdoor_endpoint(name: Optional[str] = None, profile_name=pulumi.get(__ret__, 'profile_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_frontdoor_endpoint) def get_frontdoor_endpoint_output(name: Optional[pulumi.Input[str]] = None, profile_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -176,4 +173,17 @@ def get_frontdoor_endpoint_output(name: Optional[pulumi.Input[str]] = None, :param str profile_name: The name of the Front Door Profile within which Front Door Endpoint exists. :param str resource_group_name: The name of the Resource Group where the Front Door Profile exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['profileName'] = profile_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cdn/getFrontdoorEndpoint:getFrontdoorEndpoint', __args__, opts=opts, typ=GetFrontdoorEndpointResult) + return __ret__.apply(lambda __response__: GetFrontdoorEndpointResult( + enabled=pulumi.get(__response__, 'enabled'), + host_name=pulumi.get(__response__, 'host_name'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + profile_name=pulumi.get(__response__, 'profile_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/cdn/get_frontdoor_firewall_policy.py b/sdk/python/pulumi_azure/cdn/get_frontdoor_firewall_policy.py index 57b4301a9a..eddcef5418 100644 --- a/sdk/python/pulumi_azure/cdn/get_frontdoor_firewall_policy.py +++ b/sdk/python/pulumi_azure/cdn/get_frontdoor_firewall_policy.py @@ -162,9 +162,6 @@ def get_frontdoor_firewall_policy(name: Optional[str] = None, redirect_url=pulumi.get(__ret__, 'redirect_url'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku_name=pulumi.get(__ret__, 'sku_name')) - - -@_utilities.lift_output_func(get_frontdoor_firewall_policy) def get_frontdoor_firewall_policy_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetFrontdoorFirewallPolicyResult]: @@ -185,4 +182,17 @@ def get_frontdoor_firewall_policy_output(name: Optional[pulumi.Input[str]] = Non :param str name: The name of the Front Door Firewall Policy. :param str resource_group_name: The name of the resource group. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cdn/getFrontdoorFirewallPolicy:getFrontdoorFirewallPolicy', __args__, opts=opts, typ=GetFrontdoorFirewallPolicyResult) + return __ret__.apply(lambda __response__: GetFrontdoorFirewallPolicyResult( + enabled=pulumi.get(__response__, 'enabled'), + frontend_endpoint_ids=pulumi.get(__response__, 'frontend_endpoint_ids'), + id=pulumi.get(__response__, 'id'), + mode=pulumi.get(__response__, 'mode'), + name=pulumi.get(__response__, 'name'), + redirect_url=pulumi.get(__response__, 'redirect_url'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'))) diff --git a/sdk/python/pulumi_azure/cdn/get_frontdoor_origin_group.py b/sdk/python/pulumi_azure/cdn/get_frontdoor_origin_group.py index f356126d95..4cbffefb5f 100644 --- a/sdk/python/pulumi_azure/cdn/get_frontdoor_origin_group.py +++ b/sdk/python/pulumi_azure/cdn/get_frontdoor_origin_group.py @@ -174,9 +174,6 @@ def get_frontdoor_origin_group(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), restore_traffic_time_to_healed_or_new_endpoint_in_minutes=pulumi.get(__ret__, 'restore_traffic_time_to_healed_or_new_endpoint_in_minutes'), session_affinity_enabled=pulumi.get(__ret__, 'session_affinity_enabled')) - - -@_utilities.lift_output_func(get_frontdoor_origin_group) def get_frontdoor_origin_group_output(name: Optional[pulumi.Input[str]] = None, profile_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -200,4 +197,19 @@ def get_frontdoor_origin_group_output(name: Optional[pulumi.Input[str]] = None, :param str profile_name: The name of the Front Door Profile within which Front Door Origin Group exists. :param str resource_group_name: The name of the Resource Group where the Front Door Profile exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['profileName'] = profile_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cdn/getFrontdoorOriginGroup:getFrontdoorOriginGroup', __args__, opts=opts, typ=GetFrontdoorOriginGroupResult) + return __ret__.apply(lambda __response__: GetFrontdoorOriginGroupResult( + cdn_frontdoor_profile_id=pulumi.get(__response__, 'cdn_frontdoor_profile_id'), + health_probes=pulumi.get(__response__, 'health_probes'), + id=pulumi.get(__response__, 'id'), + load_balancings=pulumi.get(__response__, 'load_balancings'), + name=pulumi.get(__response__, 'name'), + profile_name=pulumi.get(__response__, 'profile_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + restore_traffic_time_to_healed_or_new_endpoint_in_minutes=pulumi.get(__response__, 'restore_traffic_time_to_healed_or_new_endpoint_in_minutes'), + session_affinity_enabled=pulumi.get(__response__, 'session_affinity_enabled'))) diff --git a/sdk/python/pulumi_azure/cdn/get_frontdoor_profile.py b/sdk/python/pulumi_azure/cdn/get_frontdoor_profile.py index 7693fb806b..c4a082fec8 100644 --- a/sdk/python/pulumi_azure/cdn/get_frontdoor_profile.py +++ b/sdk/python/pulumi_azure/cdn/get_frontdoor_profile.py @@ -149,9 +149,6 @@ def get_frontdoor_profile(name: Optional[str] = None, response_timeout_seconds=pulumi.get(__ret__, 'response_timeout_seconds'), sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_frontdoor_profile) def get_frontdoor_profile_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetFrontdoorProfileResult]: @@ -172,4 +169,16 @@ def get_frontdoor_profile_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Front Door Profile. :param str resource_group_name: The name of the Resource Group where this Front Door Profile exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cdn/getFrontdoorProfile:getFrontdoorProfile', __args__, opts=opts, typ=GetFrontdoorProfileResult) + return __ret__.apply(lambda __response__: GetFrontdoorProfileResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + resource_guid=pulumi.get(__response__, 'resource_guid'), + response_timeout_seconds=pulumi.get(__response__, 'response_timeout_seconds'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/cdn/get_frontdoor_rule_set.py b/sdk/python/pulumi_azure/cdn/get_frontdoor_rule_set.py index 27e66e36c3..7d766ff77f 100644 --- a/sdk/python/pulumi_azure/cdn/get_frontdoor_rule_set.py +++ b/sdk/python/pulumi_azure/cdn/get_frontdoor_rule_set.py @@ -124,9 +124,6 @@ def get_frontdoor_rule_set(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), profile_name=pulumi.get(__ret__, 'profile_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_frontdoor_rule_set) def get_frontdoor_rule_set_output(name: Optional[pulumi.Input[str]] = None, profile_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -150,4 +147,15 @@ def get_frontdoor_rule_set_output(name: Optional[pulumi.Input[str]] = None, :param str profile_name: Specifies the name of the Front Door Profile where this Front Door Rule Set exists. :param str resource_group_name: Specifies the name of the Resource Group where the Front Door Profile exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['profileName'] = profile_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cdn/getFrontdoorRuleSet:getFrontdoorRuleSet', __args__, opts=opts, typ=GetFrontdoorRuleSetResult) + return __ret__.apply(lambda __response__: GetFrontdoorRuleSetResult( + cdn_frontdoor_profile_id=pulumi.get(__response__, 'cdn_frontdoor_profile_id'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + profile_name=pulumi.get(__response__, 'profile_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/cdn/get_frontdoor_secret.py b/sdk/python/pulumi_azure/cdn/get_frontdoor_secret.py index 4750238929..522261007a 100644 --- a/sdk/python/pulumi_azure/cdn/get_frontdoor_secret.py +++ b/sdk/python/pulumi_azure/cdn/get_frontdoor_secret.py @@ -138,9 +138,6 @@ def get_frontdoor_secret(name: Optional[str] = None, profile_name=pulumi.get(__ret__, 'profile_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), secrets=pulumi.get(__ret__, 'secrets')) - - -@_utilities.lift_output_func(get_frontdoor_secret) def get_frontdoor_secret_output(name: Optional[pulumi.Input[str]] = None, profile_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -164,4 +161,16 @@ def get_frontdoor_secret_output(name: Optional[pulumi.Input[str]] = None, :param str profile_name: The name of the Front Door Profile within which the Front Door Secret exists. :param str resource_group_name: The name of the Resource Group where the Front Door Profile exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['profileName'] = profile_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cdn/getFrontdoorSecret:getFrontdoorSecret', __args__, opts=opts, typ=GetFrontdoorSecretResult) + return __ret__.apply(lambda __response__: GetFrontdoorSecretResult( + cdn_frontdoor_profile_id=pulumi.get(__response__, 'cdn_frontdoor_profile_id'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + profile_name=pulumi.get(__response__, 'profile_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secrets=pulumi.get(__response__, 'secrets'))) diff --git a/sdk/python/pulumi_azure/cdn/get_profile.py b/sdk/python/pulumi_azure/cdn/get_profile.py index 41b7d07b0a..e4ec50b52a 100644 --- a/sdk/python/pulumi_azure/cdn/get_profile.py +++ b/sdk/python/pulumi_azure/cdn/get_profile.py @@ -137,9 +137,6 @@ def get_profile(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_profile) def get_profile_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetProfileResult]: @@ -161,4 +158,15 @@ def get_profile_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the CDN Profile. :param str resource_group_name: The name of the resource group in which the CDN Profile exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cdn/getProfile:getProfile', __args__, opts=opts, typ=GetProfileResult) + return __ret__.apply(lambda __response__: GetProfileResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/cognitive/get_account.py b/sdk/python/pulumi_azure/cognitive/get_account.py index a7984d1894..0a7ee61bf8 100644 --- a/sdk/python/pulumi_azure/cognitive/get_account.py +++ b/sdk/python/pulumi_azure/cognitive/get_account.py @@ -219,9 +219,6 @@ def get_account(name: Optional[str] = None, secondary_access_key=pulumi.get(__ret__, 'secondary_access_key'), sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_account) def get_account_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -245,4 +242,22 @@ def get_account_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the name of the resource group where the Cognitive Services Account resides. :param Mapping[str, str] tags: A mapping of tags to assigned to the resource. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cognitive/getAccount:getAccount', __args__, opts=opts, typ=GetAccountResult) + return __ret__.apply(lambda __response__: GetAccountResult( + endpoint=pulumi.get(__response__, 'endpoint'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + qna_runtime_endpoint=pulumi.get(__response__, 'qna_runtime_endpoint'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/communication/get_service.py b/sdk/python/pulumi_azure/communication/get_service.py index dd9d82594a..03774c0bff 100644 --- a/sdk/python/pulumi_azure/communication/get_service.py +++ b/sdk/python/pulumi_azure/communication/get_service.py @@ -178,9 +178,6 @@ def get_service(name: Optional[str] = None, secondary_connection_string=pulumi.get(__ret__, 'secondary_connection_string'), secondary_key=pulumi.get(__ret__, 'secondary_key'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_service) def get_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceResult]: @@ -204,4 +201,18 @@ def get_service_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group where the Communication Service exists. * """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:communication/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + data_location=pulumi.get(__response__, 'data_location'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_key=pulumi.get(__response__, 'primary_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_key=pulumi.get(__response__, 'secondary_key'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/compute/get_availability_set.py b/sdk/python/pulumi_azure/compute/get_availability_set.py index 682e73638d..c2fdb923cf 100644 --- a/sdk/python/pulumi_azure/compute/get_availability_set.py +++ b/sdk/python/pulumi_azure/compute/get_availability_set.py @@ -163,9 +163,6 @@ def get_availability_set(name: Optional[str] = None, platform_update_domain_count=pulumi.get(__ret__, 'platform_update_domain_count'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_availability_set) def get_availability_set_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAvailabilitySetResult]: @@ -187,4 +184,17 @@ def get_availability_set_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Availability Set. :param str resource_group_name: The name of the resource group in which the Availability Set exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getAvailabilitySet:getAvailabilitySet', __args__, opts=opts, typ=GetAvailabilitySetResult) + return __ret__.apply(lambda __response__: GetAvailabilitySetResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + managed=pulumi.get(__response__, 'managed'), + name=pulumi.get(__response__, 'name'), + platform_fault_domain_count=pulumi.get(__response__, 'platform_fault_domain_count'), + platform_update_domain_count=pulumi.get(__response__, 'platform_update_domain_count'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/compute/get_bastion_host.py b/sdk/python/pulumi_azure/compute/get_bastion_host.py index 4cabc8554b..194fb10144 100644 --- a/sdk/python/pulumi_azure/compute/get_bastion_host.py +++ b/sdk/python/pulumi_azure/compute/get_bastion_host.py @@ -245,9 +245,6 @@ def get_bastion_host(name: Optional[str] = None, sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags'), tunneling_enabled=pulumi.get(__ret__, 'tunneling_enabled')) - - -@_utilities.lift_output_func(get_bastion_host) def get_bastion_host_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBastionHostResult]: @@ -269,4 +266,23 @@ def get_bastion_host_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Bastion Host. :param str resource_group_name: The name of the Resource Group where the Bastion Host exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getBastionHost:getBastionHost', __args__, opts=opts, typ=GetBastionHostResult) + return __ret__.apply(lambda __response__: GetBastionHostResult( + copy_paste_enabled=pulumi.get(__response__, 'copy_paste_enabled'), + dns_name=pulumi.get(__response__, 'dns_name'), + file_copy_enabled=pulumi.get(__response__, 'file_copy_enabled'), + id=pulumi.get(__response__, 'id'), + ip_configurations=pulumi.get(__response__, 'ip_configurations'), + ip_connect_enabled=pulumi.get(__response__, 'ip_connect_enabled'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + scale_units=pulumi.get(__response__, 'scale_units'), + shareable_link_enabled=pulumi.get(__response__, 'shareable_link_enabled'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + tunneling_enabled=pulumi.get(__response__, 'tunneling_enabled'))) diff --git a/sdk/python/pulumi_azure/compute/get_confidential_ledger.py b/sdk/python/pulumi_azure/compute/get_confidential_ledger.py index 8a78a6e068..23949d112f 100644 --- a/sdk/python/pulumi_azure/compute/get_confidential_ledger.py +++ b/sdk/python/pulumi_azure/compute/get_confidential_ledger.py @@ -184,9 +184,6 @@ def get_confidential_ledger(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_confidential_ledger) def get_confidential_ledger_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetConfidentialLedgerResult]: @@ -208,4 +205,19 @@ def get_confidential_ledger_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of this Confidential Ledger. :param str resource_group_name: Specifies the name of the Resource Group where this Confidential Ledger exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getConfidentialLedger:getConfidentialLedger', __args__, opts=opts, typ=GetConfidentialLedgerResult) + return __ret__.apply(lambda __response__: GetConfidentialLedgerResult( + azuread_based_service_principals=pulumi.get(__response__, 'azuread_based_service_principals'), + certificate_based_security_principals=pulumi.get(__response__, 'certificate_based_security_principals'), + id=pulumi.get(__response__, 'id'), + identity_service_endpoint=pulumi.get(__response__, 'identity_service_endpoint'), + ledger_endpoint=pulumi.get(__response__, 'ledger_endpoint'), + ledger_type=pulumi.get(__response__, 'ledger_type'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/compute/get_dedicated_host.py b/sdk/python/pulumi_azure/compute/get_dedicated_host.py index 0834c4e7e7..950afb3084 100644 --- a/sdk/python/pulumi_azure/compute/get_dedicated_host.py +++ b/sdk/python/pulumi_azure/compute/get_dedicated_host.py @@ -138,9 +138,6 @@ def get_dedicated_host(dedicated_host_group_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_dedicated_host) def get_dedicated_host_output(dedicated_host_group_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -165,4 +162,16 @@ def get_dedicated_host_output(dedicated_host_group_name: Optional[pulumi.Input[s :param str name: Specifies the name of the Dedicated Host. :param str resource_group_name: Specifies the name of the resource group the Dedicated Host is located in. """ - ... + __args__ = dict() + __args__['dedicatedHostGroupName'] = dedicated_host_group_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getDedicatedHost:getDedicatedHost', __args__, opts=opts, typ=GetDedicatedHostResult) + return __ret__.apply(lambda __response__: GetDedicatedHostResult( + dedicated_host_group_name=pulumi.get(__response__, 'dedicated_host_group_name'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/compute/get_dedicated_host_group.py b/sdk/python/pulumi_azure/compute/get_dedicated_host_group.py index 0c641e58e9..dfea794d22 100644 --- a/sdk/python/pulumi_azure/compute/get_dedicated_host_group.py +++ b/sdk/python/pulumi_azure/compute/get_dedicated_host_group.py @@ -163,9 +163,6 @@ def get_dedicated_host_group(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_dedicated_host_group) def get_dedicated_host_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDedicatedHostGroupResult]: @@ -187,4 +184,17 @@ def get_dedicated_host_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Dedicated Host Group. :param str resource_group_name: Specifies the name of the resource group the Dedicated Host Group is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getDedicatedHostGroup:getDedicatedHostGroup', __args__, opts=opts, typ=GetDedicatedHostGroupResult) + return __ret__.apply(lambda __response__: GetDedicatedHostGroupResult( + automatic_placement_enabled=pulumi.get(__response__, 'automatic_placement_enabled'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + platform_fault_domain_count=pulumi.get(__response__, 'platform_fault_domain_count'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/compute/get_disk_access.py b/sdk/python/pulumi_azure/compute/get_disk_access.py index 60c7c4160e..4b6eaf4cd7 100644 --- a/sdk/python/pulumi_azure/compute/get_disk_access.py +++ b/sdk/python/pulumi_azure/compute/get_disk_access.py @@ -108,9 +108,6 @@ def get_disk_access(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_disk_access) def get_disk_access_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDiskAccessResult]: @@ -132,4 +129,13 @@ def get_disk_access_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Disk Access. :param str resource_group_name: The name of the Resource Group where the Disk Access exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getDiskAccess:getDiskAccess', __args__, opts=opts, typ=GetDiskAccessResult) + return __ret__.apply(lambda __response__: GetDiskAccessResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/compute/get_disk_encryption_set.py b/sdk/python/pulumi_azure/compute/get_disk_encryption_set.py index e74a12be89..8721b91162 100644 --- a/sdk/python/pulumi_azure/compute/get_disk_encryption_set.py +++ b/sdk/python/pulumi_azure/compute/get_disk_encryption_set.py @@ -164,9 +164,6 @@ def get_disk_encryption_set(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_disk_encryption_set) def get_disk_encryption_set_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDiskEncryptionSetResult]: @@ -188,4 +185,17 @@ def get_disk_encryption_set_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the existing Disk Encryption Set. :param str resource_group_name: The name of the Resource Group where the Disk Encryption Set exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getDiskEncryptionSet:getDiskEncryptionSet', __args__, opts=opts, typ=GetDiskEncryptionSetResult) + return __ret__.apply(lambda __response__: GetDiskEncryptionSetResult( + auto_key_rotation_enabled=pulumi.get(__response__, 'auto_key_rotation_enabled'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + key_vault_key_url=pulumi.get(__response__, 'key_vault_key_url'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/compute/get_image.py b/sdk/python/pulumi_azure/compute/get_image.py index 9709516d8d..a069bf4ebe 100644 --- a/sdk/python/pulumi_azure/compute/get_image.py +++ b/sdk/python/pulumi_azure/compute/get_image.py @@ -193,9 +193,6 @@ def get_image(name: Optional[str] = None, sort_descending=pulumi.get(__ret__, 'sort_descending'), tags=pulumi.get(__ret__, 'tags'), zone_resilient=pulumi.get(__ret__, 'zone_resilient')) - - -@_utilities.lift_output_func(get_image) def get_image_output(name: Optional[pulumi.Input[Optional[str]]] = None, name_regex: Optional[pulumi.Input[Optional[str]]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -221,4 +218,21 @@ def get_image_output(name: Optional[pulumi.Input[Optional[str]]] = None, :param str resource_group_name: The Name of the Resource Group where this Image exists. :param bool sort_descending: By default when matching by regex, images are sorted by name in ascending order and the first match is chosen, to sort descending, set this flag. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['nameRegex'] = name_regex + __args__['resourceGroupName'] = resource_group_name + __args__['sortDescending'] = sort_descending + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getImage:getImage', __args__, opts=opts, typ=GetImageResult) + return __ret__.apply(lambda __response__: GetImageResult( + data_disks=pulumi.get(__response__, 'data_disks'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + name_regex=pulumi.get(__response__, 'name_regex'), + os_disks=pulumi.get(__response__, 'os_disks'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sort_descending=pulumi.get(__response__, 'sort_descending'), + tags=pulumi.get(__response__, 'tags'), + zone_resilient=pulumi.get(__response__, 'zone_resilient'))) diff --git a/sdk/python/pulumi_azure/compute/get_images.py b/sdk/python/pulumi_azure/compute/get_images.py index fe972cff4e..6318dceee9 100644 --- a/sdk/python/pulumi_azure/compute/get_images.py +++ b/sdk/python/pulumi_azure/compute/get_images.py @@ -110,9 +110,6 @@ def get_images(resource_group_name: Optional[str] = None, images=pulumi.get(__ret__, 'images'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags_filter=pulumi.get(__ret__, 'tags_filter')) - - -@_utilities.lift_output_func(get_images) def get_images_output(resource_group_name: Optional[pulumi.Input[str]] = None, tags_filter: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetImagesResult]: @@ -132,4 +129,13 @@ def get_images_output(resource_group_name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group in which the Image exists. :param Mapping[str, str] tags_filter: A mapping of tags to filter the list of images against. """ - ... + __args__ = dict() + __args__['resourceGroupName'] = resource_group_name + __args__['tagsFilter'] = tags_filter + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getImages:getImages', __args__, opts=opts, typ=GetImagesResult) + return __ret__.apply(lambda __response__: GetImagesResult( + id=pulumi.get(__response__, 'id'), + images=pulumi.get(__response__, 'images'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags_filter=pulumi.get(__response__, 'tags_filter'))) diff --git a/sdk/python/pulumi_azure/compute/get_managed_disk.py b/sdk/python/pulumi_azure/compute/get_managed_disk.py index 10eb8b88d9..412843560f 100644 --- a/sdk/python/pulumi_azure/compute/get_managed_disk.py +++ b/sdk/python/pulumi_azure/compute/get_managed_disk.py @@ -304,9 +304,6 @@ def get_managed_disk(name: Optional[str] = None, storage_account_type=pulumi.get(__ret__, 'storage_account_type'), tags=pulumi.get(__ret__, 'tags'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_managed_disk) def get_managed_disk_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetManagedDiskResult]: @@ -328,4 +325,28 @@ def get_managed_disk_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Managed Disk. :param str resource_group_name: Specifies the name of the Resource Group where this Managed Disk exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getManagedDisk:getManagedDisk', __args__, opts=opts, typ=GetManagedDiskResult) + return __ret__.apply(lambda __response__: GetManagedDiskResult( + create_option=pulumi.get(__response__, 'create_option'), + disk_access_id=pulumi.get(__response__, 'disk_access_id'), + disk_encryption_set_id=pulumi.get(__response__, 'disk_encryption_set_id'), + disk_iops_read_write=pulumi.get(__response__, 'disk_iops_read_write'), + disk_mbps_read_write=pulumi.get(__response__, 'disk_mbps_read_write'), + disk_size_gb=pulumi.get(__response__, 'disk_size_gb'), + encryption_settings=pulumi.get(__response__, 'encryption_settings'), + id=pulumi.get(__response__, 'id'), + image_reference_id=pulumi.get(__response__, 'image_reference_id'), + name=pulumi.get(__response__, 'name'), + network_access_policy=pulumi.get(__response__, 'network_access_policy'), + os_type=pulumi.get(__response__, 'os_type'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + source_resource_id=pulumi.get(__response__, 'source_resource_id'), + source_uri=pulumi.get(__response__, 'source_uri'), + storage_account_id=pulumi.get(__response__, 'storage_account_id'), + storage_account_type=pulumi.get(__response__, 'storage_account_type'), + tags=pulumi.get(__response__, 'tags'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/compute/get_orchestrated_virtual_machine_scale_set.py b/sdk/python/pulumi_azure/compute/get_orchestrated_virtual_machine_scale_set.py index 4b2b8065a5..651bd7857c 100644 --- a/sdk/python/pulumi_azure/compute/get_orchestrated_virtual_machine_scale_set.py +++ b/sdk/python/pulumi_azure/compute/get_orchestrated_virtual_machine_scale_set.py @@ -141,9 +141,6 @@ def get_orchestrated_virtual_machine_scale_set(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), network_interfaces=pulumi.get(__ret__, 'network_interfaces'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_orchestrated_virtual_machine_scale_set) def get_orchestrated_virtual_machine_scale_set_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOrchestratedVirtualMachineScaleSetResult]: @@ -165,4 +162,15 @@ def get_orchestrated_virtual_machine_scale_set_output(name: Optional[pulumi.Inpu :param str name: The name of this Orchestrated Virtual Machine Scale Set. :param str resource_group_name: The name of the Resource Group where the Orchestrated Virtual Machine Scale Set exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getOrchestratedVirtualMachineScaleSet:getOrchestratedVirtualMachineScaleSet', __args__, opts=opts, typ=GetOrchestratedVirtualMachineScaleSetResult) + return __ret__.apply(lambda __response__: GetOrchestratedVirtualMachineScaleSetResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + network_interfaces=pulumi.get(__response__, 'network_interfaces'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/compute/get_platform_image.py b/sdk/python/pulumi_azure/compute/get_platform_image.py index e875b7d05e..e5f0eeefe0 100644 --- a/sdk/python/pulumi_azure/compute/get_platform_image.py +++ b/sdk/python/pulumi_azure/compute/get_platform_image.py @@ -139,9 +139,6 @@ def get_platform_image(location: Optional[str] = None, publisher=pulumi.get(__ret__, 'publisher'), sku=pulumi.get(__ret__, 'sku'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_platform_image) def get_platform_image_output(location: Optional[pulumi.Input[str]] = None, offer: Optional[pulumi.Input[str]] = None, publisher: Optional[pulumi.Input[str]] = None, @@ -171,4 +168,18 @@ def get_platform_image_output(location: Optional[pulumi.Input[str]] = None, :param str sku: Specifies the SKU of the Platform Image. :param str version: The version of the Platform Image. """ - ... + __args__ = dict() + __args__['location'] = location + __args__['offer'] = offer + __args__['publisher'] = publisher + __args__['sku'] = sku + __args__['version'] = version + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getPlatformImage:getPlatformImage', __args__, opts=opts, typ=GetPlatformImageResult) + return __ret__.apply(lambda __response__: GetPlatformImageResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + offer=pulumi.get(__response__, 'offer'), + publisher=pulumi.get(__response__, 'publisher'), + sku=pulumi.get(__response__, 'sku'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_azure/compute/get_shared_image.py b/sdk/python/pulumi_azure/compute/get_shared_image.py index 321af4ceef..f0f161f754 100644 --- a/sdk/python/pulumi_azure/compute/get_shared_image.py +++ b/sdk/python/pulumi_azure/compute/get_shared_image.py @@ -346,9 +346,6 @@ def get_shared_image(gallery_name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), trusted_launch_enabled=pulumi.get(__ret__, 'trusted_launch_enabled'), trusted_launch_supported=pulumi.get(__ret__, 'trusted_launch_supported')) - - -@_utilities.lift_output_func(get_shared_image) def get_shared_image_output(gallery_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -372,4 +369,32 @@ def get_shared_image_output(gallery_name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Shared Image. :param str resource_group_name: The name of the Resource Group in which the Shared Image Gallery exists. """ - ... + __args__ = dict() + __args__['galleryName'] = gallery_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getSharedImage:getSharedImage', __args__, opts=opts, typ=GetSharedImageResult) + return __ret__.apply(lambda __response__: GetSharedImageResult( + accelerated_network_support_enabled=pulumi.get(__response__, 'accelerated_network_support_enabled'), + architecture=pulumi.get(__response__, 'architecture'), + confidential_vm_enabled=pulumi.get(__response__, 'confidential_vm_enabled'), + confidential_vm_supported=pulumi.get(__response__, 'confidential_vm_supported'), + description=pulumi.get(__response__, 'description'), + eula=pulumi.get(__response__, 'eula'), + gallery_name=pulumi.get(__response__, 'gallery_name'), + hibernation_enabled=pulumi.get(__response__, 'hibernation_enabled'), + hyper_v_generation=pulumi.get(__response__, 'hyper_v_generation'), + id=pulumi.get(__response__, 'id'), + identifiers=pulumi.get(__response__, 'identifiers'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + os_type=pulumi.get(__response__, 'os_type'), + privacy_statement_uri=pulumi.get(__response__, 'privacy_statement_uri'), + purchase_plans=pulumi.get(__response__, 'purchase_plans'), + release_note_uri=pulumi.get(__response__, 'release_note_uri'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + specialized=pulumi.get(__response__, 'specialized'), + tags=pulumi.get(__response__, 'tags'), + trusted_launch_enabled=pulumi.get(__response__, 'trusted_launch_enabled'), + trusted_launch_supported=pulumi.get(__response__, 'trusted_launch_supported'))) diff --git a/sdk/python/pulumi_azure/compute/get_shared_image_gallery.py b/sdk/python/pulumi_azure/compute/get_shared_image_gallery.py index 37ed2757d7..6977893727 100644 --- a/sdk/python/pulumi_azure/compute/get_shared_image_gallery.py +++ b/sdk/python/pulumi_azure/compute/get_shared_image_gallery.py @@ -159,9 +159,6 @@ def get_shared_image_gallery(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), unique_name=pulumi.get(__ret__, 'unique_name')) - - -@_utilities.lift_output_func(get_shared_image_gallery) def get_shared_image_gallery_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSharedImageGalleryResult]: @@ -182,4 +179,17 @@ def get_shared_image_gallery_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Shared Image Gallery. :param str resource_group_name: The name of the Resource Group in which the Shared Image Gallery exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getSharedImageGallery:getSharedImageGallery', __args__, opts=opts, typ=GetSharedImageGalleryResult) + return __ret__.apply(lambda __response__: GetSharedImageGalleryResult( + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + image_names=pulumi.get(__response__, 'image_names'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + unique_name=pulumi.get(__response__, 'unique_name'))) diff --git a/sdk/python/pulumi_azure/compute/get_shared_image_version.py b/sdk/python/pulumi_azure/compute/get_shared_image_version.py index 30c09bdae8..12ba1ae6c3 100644 --- a/sdk/python/pulumi_azure/compute/get_shared_image_version.py +++ b/sdk/python/pulumi_azure/compute/get_shared_image_version.py @@ -240,9 +240,6 @@ def get_shared_image_version(gallery_name: Optional[str] = None, sort_versions_by_semver=pulumi.get(__ret__, 'sort_versions_by_semver'), tags=pulumi.get(__ret__, 'tags'), target_regions=pulumi.get(__ret__, 'target_regions')) - - -@_utilities.lift_output_func(get_shared_image_version) def get_shared_image_version_output(gallery_name: Optional[pulumi.Input[str]] = None, image_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, @@ -277,4 +274,26 @@ def get_shared_image_version_output(gallery_name: Optional[pulumi.Input[str]] = :param bool sort_versions_by_semver: Sort available versions taking SemVer versioning scheme into account. Defaults to `false`. :param Mapping[str, str] tags: A mapping of tags assigned to the Shared Image. """ - ... + __args__ = dict() + __args__['galleryName'] = gallery_name + __args__['imageName'] = image_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['sortVersionsBySemver'] = sort_versions_by_semver + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getSharedImageVersion:getSharedImageVersion', __args__, opts=opts, typ=GetSharedImageVersionResult) + return __ret__.apply(lambda __response__: GetSharedImageVersionResult( + exclude_from_latest=pulumi.get(__response__, 'exclude_from_latest'), + gallery_name=pulumi.get(__response__, 'gallery_name'), + id=pulumi.get(__response__, 'id'), + image_name=pulumi.get(__response__, 'image_name'), + location=pulumi.get(__response__, 'location'), + managed_image_id=pulumi.get(__response__, 'managed_image_id'), + name=pulumi.get(__response__, 'name'), + os_disk_image_size_gb=pulumi.get(__response__, 'os_disk_image_size_gb'), + os_disk_snapshot_id=pulumi.get(__response__, 'os_disk_snapshot_id'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sort_versions_by_semver=pulumi.get(__response__, 'sort_versions_by_semver'), + tags=pulumi.get(__response__, 'tags'), + target_regions=pulumi.get(__response__, 'target_regions'))) diff --git a/sdk/python/pulumi_azure/compute/get_shared_image_versions.py b/sdk/python/pulumi_azure/compute/get_shared_image_versions.py index 0d4b1120af..504f89f503 100644 --- a/sdk/python/pulumi_azure/compute/get_shared_image_versions.py +++ b/sdk/python/pulumi_azure/compute/get_shared_image_versions.py @@ -138,9 +138,6 @@ def get_shared_image_versions(gallery_name: Optional[str] = None, images=pulumi.get(__ret__, 'images'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags_filter=pulumi.get(__ret__, 'tags_filter')) - - -@_utilities.lift_output_func(get_shared_image_versions) def get_shared_image_versions_output(gallery_name: Optional[pulumi.Input[str]] = None, image_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -166,4 +163,17 @@ def get_shared_image_versions_output(gallery_name: Optional[pulumi.Input[str]] = :param str resource_group_name: The name of the Resource Group in which the Shared Image Gallery exists. :param Mapping[str, str] tags_filter: A mapping of tags to filter the list of images against. """ - ... + __args__ = dict() + __args__['galleryName'] = gallery_name + __args__['imageName'] = image_name + __args__['resourceGroupName'] = resource_group_name + __args__['tagsFilter'] = tags_filter + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getSharedImageVersions:getSharedImageVersions', __args__, opts=opts, typ=GetSharedImageVersionsResult) + return __ret__.apply(lambda __response__: GetSharedImageVersionsResult( + gallery_name=pulumi.get(__response__, 'gallery_name'), + id=pulumi.get(__response__, 'id'), + image_name=pulumi.get(__response__, 'image_name'), + images=pulumi.get(__response__, 'images'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags_filter=pulumi.get(__response__, 'tags_filter'))) diff --git a/sdk/python/pulumi_azure/compute/get_snapshot.py b/sdk/python/pulumi_azure/compute/get_snapshot.py index 27955ec0f9..63827419a3 100644 --- a/sdk/python/pulumi_azure/compute/get_snapshot.py +++ b/sdk/python/pulumi_azure/compute/get_snapshot.py @@ -203,9 +203,6 @@ def get_snapshot(name: Optional[str] = None, storage_account_id=pulumi.get(__ret__, 'storage_account_id'), time_created=pulumi.get(__ret__, 'time_created'), trusted_launch_enabled=pulumi.get(__ret__, 'trusted_launch_enabled')) - - -@_utilities.lift_output_func(get_snapshot) def get_snapshot_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSnapshotResult]: @@ -226,4 +223,21 @@ def get_snapshot_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Snapshot. :param str resource_group_name: Specifies the name of the resource group the Snapshot is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getSnapshot:getSnapshot', __args__, opts=opts, typ=GetSnapshotResult) + return __ret__.apply(lambda __response__: GetSnapshotResult( + creation_option=pulumi.get(__response__, 'creation_option'), + disk_size_gb=pulumi.get(__response__, 'disk_size_gb'), + encryption_settings=pulumi.get(__response__, 'encryption_settings'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + os_type=pulumi.get(__response__, 'os_type'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + source_resource_id=pulumi.get(__response__, 'source_resource_id'), + source_uri=pulumi.get(__response__, 'source_uri'), + storage_account_id=pulumi.get(__response__, 'storage_account_id'), + time_created=pulumi.get(__response__, 'time_created'), + trusted_launch_enabled=pulumi.get(__response__, 'trusted_launch_enabled'))) diff --git a/sdk/python/pulumi_azure/compute/get_ssh_public_key.py b/sdk/python/pulumi_azure/compute/get_ssh_public_key.py index bb2e30a4b0..534a20ae7a 100644 --- a/sdk/python/pulumi_azure/compute/get_ssh_public_key.py +++ b/sdk/python/pulumi_azure/compute/get_ssh_public_key.py @@ -124,9 +124,6 @@ def get_ssh_public_key(name: Optional[str] = None, public_key=pulumi.get(__ret__, 'public_key'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_ssh_public_key) def get_ssh_public_key_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -150,4 +147,15 @@ def get_ssh_public_key_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group where the SSH Public Key exists. :param Mapping[str, str] tags: A mapping of tags which should be assigned to the SSH Public Key. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getSshPublicKey:getSshPublicKey', __args__, opts=opts, typ=GetSshPublicKeyResult) + return __ret__.apply(lambda __response__: GetSshPublicKeyResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + public_key=pulumi.get(__response__, 'public_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/compute/get_virtual_machine.py b/sdk/python/pulumi_azure/compute/get_virtual_machine.py index c3b3669ec2..2c1a90c9aa 100644 --- a/sdk/python/pulumi_azure/compute/get_virtual_machine.py +++ b/sdk/python/pulumi_azure/compute/get_virtual_machine.py @@ -187,9 +187,6 @@ def get_virtual_machine(name: Optional[str] = None, public_ip_address=pulumi.get(__ret__, 'public_ip_address'), public_ip_addresses=pulumi.get(__ret__, 'public_ip_addresses'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_virtual_machine) def get_virtual_machine_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVirtualMachineResult]: @@ -211,4 +208,19 @@ def get_virtual_machine_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Virtual Machine. :param str resource_group_name: Specifies the name of the resource group the Virtual Machine is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getVirtualMachine:getVirtualMachine', __args__, opts=opts, typ=GetVirtualMachineResult) + return __ret__.apply(lambda __response__: GetVirtualMachineResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + power_state=pulumi.get(__response__, 'power_state'), + private_ip_address=pulumi.get(__response__, 'private_ip_address'), + private_ip_addresses=pulumi.get(__response__, 'private_ip_addresses'), + public_ip_address=pulumi.get(__response__, 'public_ip_address'), + public_ip_addresses=pulumi.get(__response__, 'public_ip_addresses'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/compute/get_virtual_machine_scale_set.py b/sdk/python/pulumi_azure/compute/get_virtual_machine_scale_set.py index 6e4de821e1..5871e39f61 100644 --- a/sdk/python/pulumi_azure/compute/get_virtual_machine_scale_set.py +++ b/sdk/python/pulumi_azure/compute/get_virtual_machine_scale_set.py @@ -154,9 +154,6 @@ def get_virtual_machine_scale_set(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), network_interfaces=pulumi.get(__ret__, 'network_interfaces'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_virtual_machine_scale_set) def get_virtual_machine_scale_set_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVirtualMachineScaleSetResult]: @@ -178,4 +175,16 @@ def get_virtual_machine_scale_set_output(name: Optional[pulumi.Input[str]] = Non :param str name: The name of this Virtual Machine Scale Set. :param str resource_group_name: The name of the Resource Group where the Virtual Machine Scale Set exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:compute/getVirtualMachineScaleSet:getVirtualMachineScaleSet', __args__, opts=opts, typ=GetVirtualMachineScaleSetResult) + return __ret__.apply(lambda __response__: GetVirtualMachineScaleSetResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + instances=pulumi.get(__response__, 'instances'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + network_interfaces=pulumi.get(__response__, 'network_interfaces'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/connections/get_managed_api.py b/sdk/python/pulumi_azure/connections/get_managed_api.py index 252faf6634..691b2ed416 100644 --- a/sdk/python/pulumi_azure/connections/get_managed_api.py +++ b/sdk/python/pulumi_azure/connections/get_managed_api.py @@ -108,9 +108,6 @@ def get_managed_api(location: Optional[str] = None, location=pulumi.get(__ret__, 'location'), name=pulumi.get(__ret__, 'name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_managed_api) def get_managed_api_output(location: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetManagedApiResult]: @@ -132,4 +129,13 @@ def get_managed_api_output(location: Optional[pulumi.Input[str]] = None, :param str location: The Azure location for this Managed API. :param str name: Specifies the name of the Managed API. """ - ... + __args__ = dict() + __args__['location'] = location + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:connections/getManagedApi:getManagedApi', __args__, opts=opts, typ=GetManagedApiResult) + return __ret__.apply(lambda __response__: GetManagedApiResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/consumption/get_budget_resource_group.py b/sdk/python/pulumi_azure/consumption/get_budget_resource_group.py index d2557ee53e..d6f257d320 100644 --- a/sdk/python/pulumi_azure/consumption/get_budget_resource_group.py +++ b/sdk/python/pulumi_azure/consumption/get_budget_resource_group.py @@ -167,9 +167,6 @@ def get_budget_resource_group(name: Optional[str] = None, resource_group_id=pulumi.get(__ret__, 'resource_group_id'), time_grain=pulumi.get(__ret__, 'time_grain'), time_periods=pulumi.get(__ret__, 'time_periods')) - - -@_utilities.lift_output_func(get_budget_resource_group) def get_budget_resource_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBudgetResourceGroupResult]: @@ -191,4 +188,17 @@ def get_budget_resource_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Consumption Budget. :param str resource_group_id: The ID of the subscription. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupId'] = resource_group_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:consumption/getBudgetResourceGroup:getBudgetResourceGroup', __args__, opts=opts, typ=GetBudgetResourceGroupResult) + return __ret__.apply(lambda __response__: GetBudgetResourceGroupResult( + amount=pulumi.get(__response__, 'amount'), + filters=pulumi.get(__response__, 'filters'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + notifications=pulumi.get(__response__, 'notifications'), + resource_group_id=pulumi.get(__response__, 'resource_group_id'), + time_grain=pulumi.get(__response__, 'time_grain'), + time_periods=pulumi.get(__response__, 'time_periods'))) diff --git a/sdk/python/pulumi_azure/consumption/get_budget_subscription.py b/sdk/python/pulumi_azure/consumption/get_budget_subscription.py index fb33369f0f..13cb5b3205 100644 --- a/sdk/python/pulumi_azure/consumption/get_budget_subscription.py +++ b/sdk/python/pulumi_azure/consumption/get_budget_subscription.py @@ -167,9 +167,6 @@ def get_budget_subscription(name: Optional[str] = None, subscription_id=pulumi.get(__ret__, 'subscription_id'), time_grain=pulumi.get(__ret__, 'time_grain'), time_periods=pulumi.get(__ret__, 'time_periods')) - - -@_utilities.lift_output_func(get_budget_subscription) def get_budget_subscription_output(name: Optional[pulumi.Input[str]] = None, subscription_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBudgetSubscriptionResult]: @@ -191,4 +188,17 @@ def get_budget_subscription_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Consumption Budget. :param str subscription_id: The ID of the subscription. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['subscriptionId'] = subscription_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:consumption/getBudgetSubscription:getBudgetSubscription', __args__, opts=opts, typ=GetBudgetSubscriptionResult) + return __ret__.apply(lambda __response__: GetBudgetSubscriptionResult( + amount=pulumi.get(__response__, 'amount'), + filters=pulumi.get(__response__, 'filters'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + notifications=pulumi.get(__response__, 'notifications'), + subscription_id=pulumi.get(__response__, 'subscription_id'), + time_grain=pulumi.get(__response__, 'time_grain'), + time_periods=pulumi.get(__response__, 'time_periods'))) diff --git a/sdk/python/pulumi_azure/containerapp/get_app.py b/sdk/python/pulumi_azure/containerapp/get_app.py index 51ffcff954..806e8d8b53 100644 --- a/sdk/python/pulumi_azure/containerapp/get_app.py +++ b/sdk/python/pulumi_azure/containerapp/get_app.py @@ -281,9 +281,6 @@ def get_app(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), templates=pulumi.get(__ret__, 'templates'), workload_profile_name=pulumi.get(__ret__, 'workload_profile_name')) - - -@_utilities.lift_output_func(get_app) def get_app_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAppResult]: @@ -304,4 +301,27 @@ def get_app_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Container App. :param str resource_group_name: The name of the Resource Group where this Container App exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerapp/getApp:getApp', __args__, opts=opts, typ=GetAppResult) + return __ret__.apply(lambda __response__: GetAppResult( + container_app_environment_id=pulumi.get(__response__, 'container_app_environment_id'), + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + daprs=pulumi.get(__response__, 'daprs'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + ingresses=pulumi.get(__response__, 'ingresses'), + latest_revision_fqdn=pulumi.get(__response__, 'latest_revision_fqdn'), + latest_revision_name=pulumi.get(__response__, 'latest_revision_name'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + outbound_ip_addresses=pulumi.get(__response__, 'outbound_ip_addresses'), + registries=pulumi.get(__response__, 'registries'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + revision_mode=pulumi.get(__response__, 'revision_mode'), + secrets=pulumi.get(__response__, 'secrets'), + tags=pulumi.get(__response__, 'tags'), + templates=pulumi.get(__response__, 'templates'), + workload_profile_name=pulumi.get(__response__, 'workload_profile_name'))) diff --git a/sdk/python/pulumi_azure/containerapp/get_environment.py b/sdk/python/pulumi_azure/containerapp/get_environment.py index 27ac06b5d8..8cc398a21d 100644 --- a/sdk/python/pulumi_azure/containerapp/get_environment.py +++ b/sdk/python/pulumi_azure/containerapp/get_environment.py @@ -240,9 +240,6 @@ def get_environment(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), static_ip_address=pulumi.get(__ret__, 'static_ip_address'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_environment) def get_environment_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEnvironmentResult]: @@ -263,4 +260,23 @@ def get_environment_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Container Apps Managed Environment. :param str resource_group_name: The name of the Resource Group where this Container App Environment exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerapp/getEnvironment:getEnvironment', __args__, opts=opts, typ=GetEnvironmentResult) + return __ret__.apply(lambda __response__: GetEnvironmentResult( + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + default_domain=pulumi.get(__response__, 'default_domain'), + docker_bridge_cidr=pulumi.get(__response__, 'docker_bridge_cidr'), + id=pulumi.get(__response__, 'id'), + infrastructure_subnet_id=pulumi.get(__response__, 'infrastructure_subnet_id'), + internal_load_balancer_enabled=pulumi.get(__response__, 'internal_load_balancer_enabled'), + location=pulumi.get(__response__, 'location'), + log_analytics_workspace_name=pulumi.get(__response__, 'log_analytics_workspace_name'), + name=pulumi.get(__response__, 'name'), + platform_reserved_cidr=pulumi.get(__response__, 'platform_reserved_cidr'), + platform_reserved_dns_ip_address=pulumi.get(__response__, 'platform_reserved_dns_ip_address'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + static_ip_address=pulumi.get(__response__, 'static_ip_address'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/containerapp/get_environment_certificate.py b/sdk/python/pulumi_azure/containerapp/get_environment_certificate.py index 92136f05dd..eab8843e23 100644 --- a/sdk/python/pulumi_azure/containerapp/get_environment_certificate.py +++ b/sdk/python/pulumi_azure/containerapp/get_environment_certificate.py @@ -177,9 +177,6 @@ def get_environment_certificate(container_app_environment_id: Optional[str] = No subject_name=pulumi.get(__ret__, 'subject_name'), tags=pulumi.get(__ret__, 'tags'), thumbprint=pulumi.get(__ret__, 'thumbprint')) - - -@_utilities.lift_output_func(get_environment_certificate) def get_environment_certificate_output(container_app_environment_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEnvironmentCertificateResult]: @@ -202,4 +199,18 @@ def get_environment_certificate_output(container_app_environment_id: Optional[pu :param str container_app_environment_id: The ID of the Container App Environment to configure this Certificate on. Changing this forces a new resource to be created. :param str name: The name of the Container Apps Certificate. Changing this forces a new resource to be created. """ - ... + __args__ = dict() + __args__['containerAppEnvironmentId'] = container_app_environment_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerapp/getEnvironmentCertificate:getEnvironmentCertificate', __args__, opts=opts, typ=GetEnvironmentCertificateResult) + return __ret__.apply(lambda __response__: GetEnvironmentCertificateResult( + container_app_environment_id=pulumi.get(__response__, 'container_app_environment_id'), + expiration_date=pulumi.get(__response__, 'expiration_date'), + id=pulumi.get(__response__, 'id'), + issue_date=pulumi.get(__response__, 'issue_date'), + issuer=pulumi.get(__response__, 'issuer'), + name=pulumi.get(__response__, 'name'), + subject_name=pulumi.get(__response__, 'subject_name'), + tags=pulumi.get(__response__, 'tags'), + thumbprint=pulumi.get(__response__, 'thumbprint'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_cluster_node_pool.py b/sdk/python/pulumi_azure/containerservice/get_cluster_node_pool.py index cf7de6c06d..094f98150a 100644 --- a/sdk/python/pulumi_azure/containerservice/get_cluster_node_pool.py +++ b/sdk/python/pulumi_azure/containerservice/get_cluster_node_pool.py @@ -412,9 +412,6 @@ def get_cluster_node_pool(kubernetes_cluster_name: Optional[str] = None, vm_size=pulumi.get(__ret__, 'vm_size'), vnet_subnet_id=pulumi.get(__ret__, 'vnet_subnet_id'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_cluster_node_pool) def get_cluster_node_pool_output(kubernetes_cluster_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -439,4 +436,37 @@ def get_cluster_node_pool_output(kubernetes_cluster_name: Optional[pulumi.Input[ :param str name: The name of this Kubernetes Cluster Node Pool. :param str resource_group_name: The name of the Resource Group where the Kubernetes Cluster exists. """ - ... + __args__ = dict() + __args__['kubernetesClusterName'] = kubernetes_cluster_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getClusterNodePool:getClusterNodePool', __args__, opts=opts, typ=GetClusterNodePoolResult) + return __ret__.apply(lambda __response__: GetClusterNodePoolResult( + auto_scaling_enabled=pulumi.get(__response__, 'auto_scaling_enabled'), + eviction_policy=pulumi.get(__response__, 'eviction_policy'), + id=pulumi.get(__response__, 'id'), + kubernetes_cluster_name=pulumi.get(__response__, 'kubernetes_cluster_name'), + max_count=pulumi.get(__response__, 'max_count'), + max_pods=pulumi.get(__response__, 'max_pods'), + min_count=pulumi.get(__response__, 'min_count'), + mode=pulumi.get(__response__, 'mode'), + name=pulumi.get(__response__, 'name'), + node_count=pulumi.get(__response__, 'node_count'), + node_labels=pulumi.get(__response__, 'node_labels'), + node_public_ip_enabled=pulumi.get(__response__, 'node_public_ip_enabled'), + node_public_ip_prefix_id=pulumi.get(__response__, 'node_public_ip_prefix_id'), + node_taints=pulumi.get(__response__, 'node_taints'), + orchestrator_version=pulumi.get(__response__, 'orchestrator_version'), + os_disk_size_gb=pulumi.get(__response__, 'os_disk_size_gb'), + os_disk_type=pulumi.get(__response__, 'os_disk_type'), + os_type=pulumi.get(__response__, 'os_type'), + priority=pulumi.get(__response__, 'priority'), + proximity_placement_group_id=pulumi.get(__response__, 'proximity_placement_group_id'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + spot_max_price=pulumi.get(__response__, 'spot_max_price'), + tags=pulumi.get(__response__, 'tags'), + upgrade_settings=pulumi.get(__response__, 'upgrade_settings'), + vm_size=pulumi.get(__response__, 'vm_size'), + vnet_subnet_id=pulumi.get(__response__, 'vnet_subnet_id'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_group.py b/sdk/python/pulumi_azure/containerservice/get_group.py index 5b90f4e47d..14640f2113 100644 --- a/sdk/python/pulumi_azure/containerservice/get_group.py +++ b/sdk/python/pulumi_azure/containerservice/get_group.py @@ -195,9 +195,6 @@ def get_group(name: Optional[str] = None, subnet_ids=pulumi.get(__ret__, 'subnet_ids'), tags=pulumi.get(__ret__, 'tags'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_group) def get_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zones: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, @@ -223,4 +220,20 @@ def get_group_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group where the Container Group instance exists. :param Sequence[str] zones: A list of Availability Zones in which this Container Group is located. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zones'] = zones + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult) + return __ret__.apply(lambda __response__: GetGroupResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + ip_address=pulumi.get(__response__, 'ip_address'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + subnet_ids=pulumi.get(__response__, 'subnet_ids'), + tags=pulumi.get(__response__, 'tags'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_kubernetes_cluster.py b/sdk/python/pulumi_azure/containerservice/get_kubernetes_cluster.py index 3c1439dfe2..3fdb8fd963 100644 --- a/sdk/python/pulumi_azure/containerservice/get_kubernetes_cluster.py +++ b/sdk/python/pulumi_azure/containerservice/get_kubernetes_cluster.py @@ -605,9 +605,6 @@ def get_kubernetes_cluster(name: Optional[str] = None, storage_profiles=pulumi.get(__ret__, 'storage_profiles'), tags=pulumi.get(__ret__, 'tags'), windows_profiles=pulumi.get(__ret__, 'windows_profiles')) - - -@_utilities.lift_output_func(get_kubernetes_cluster) def get_kubernetes_cluster_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetKubernetesClusterResult]: @@ -628,4 +625,51 @@ def get_kubernetes_cluster_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the managed Kubernetes Cluster. :param str resource_group_name: The name of the Resource Group in which the managed Kubernetes Cluster exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getKubernetesCluster:getKubernetesCluster', __args__, opts=opts, typ=GetKubernetesClusterResult) + return __ret__.apply(lambda __response__: GetKubernetesClusterResult( + aci_connector_linuxes=pulumi.get(__response__, 'aci_connector_linuxes'), + agent_pool_profiles=pulumi.get(__response__, 'agent_pool_profiles'), + api_server_authorized_ip_ranges=pulumi.get(__response__, 'api_server_authorized_ip_ranges'), + azure_active_directory_role_based_access_controls=pulumi.get(__response__, 'azure_active_directory_role_based_access_controls'), + azure_policy_enabled=pulumi.get(__response__, 'azure_policy_enabled'), + current_kubernetes_version=pulumi.get(__response__, 'current_kubernetes_version'), + disk_encryption_set_id=pulumi.get(__response__, 'disk_encryption_set_id'), + dns_prefix=pulumi.get(__response__, 'dns_prefix'), + fqdn=pulumi.get(__response__, 'fqdn'), + http_application_routing_enabled=pulumi.get(__response__, 'http_application_routing_enabled'), + http_application_routing_zone_name=pulumi.get(__response__, 'http_application_routing_zone_name'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + ingress_application_gateways=pulumi.get(__response__, 'ingress_application_gateways'), + key_management_services=pulumi.get(__response__, 'key_management_services'), + key_vault_secrets_providers=pulumi.get(__response__, 'key_vault_secrets_providers'), + kube_admin_config_raw=pulumi.get(__response__, 'kube_admin_config_raw'), + kube_admin_configs=pulumi.get(__response__, 'kube_admin_configs'), + kube_config_raw=pulumi.get(__response__, 'kube_config_raw'), + kube_configs=pulumi.get(__response__, 'kube_configs'), + kubelet_identities=pulumi.get(__response__, 'kubelet_identities'), + kubernetes_version=pulumi.get(__response__, 'kubernetes_version'), + linux_profiles=pulumi.get(__response__, 'linux_profiles'), + location=pulumi.get(__response__, 'location'), + microsoft_defenders=pulumi.get(__response__, 'microsoft_defenders'), + name=pulumi.get(__response__, 'name'), + network_profiles=pulumi.get(__response__, 'network_profiles'), + node_resource_group=pulumi.get(__response__, 'node_resource_group'), + node_resource_group_id=pulumi.get(__response__, 'node_resource_group_id'), + oidc_issuer_enabled=pulumi.get(__response__, 'oidc_issuer_enabled'), + oidc_issuer_url=pulumi.get(__response__, 'oidc_issuer_url'), + oms_agents=pulumi.get(__response__, 'oms_agents'), + open_service_mesh_enabled=pulumi.get(__response__, 'open_service_mesh_enabled'), + private_cluster_enabled=pulumi.get(__response__, 'private_cluster_enabled'), + private_fqdn=pulumi.get(__response__, 'private_fqdn'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + role_based_access_control_enabled=pulumi.get(__response__, 'role_based_access_control_enabled'), + service_mesh_profiles=pulumi.get(__response__, 'service_mesh_profiles'), + service_principals=pulumi.get(__response__, 'service_principals'), + storage_profiles=pulumi.get(__response__, 'storage_profiles'), + tags=pulumi.get(__response__, 'tags'), + windows_profiles=pulumi.get(__response__, 'windows_profiles'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_kubernetes_node_pool_snapshot.py b/sdk/python/pulumi_azure/containerservice/get_kubernetes_node_pool_snapshot.py index def803284c..7bb216c9d3 100644 --- a/sdk/python/pulumi_azure/containerservice/get_kubernetes_node_pool_snapshot.py +++ b/sdk/python/pulumi_azure/containerservice/get_kubernetes_node_pool_snapshot.py @@ -120,9 +120,6 @@ def get_kubernetes_node_pool_snapshot(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), source_node_pool_id=pulumi.get(__ret__, 'source_node_pool_id'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_kubernetes_node_pool_snapshot) def get_kubernetes_node_pool_snapshot_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetKubernetesNodePoolSnapshotResult]: @@ -143,4 +140,14 @@ def get_kubernetes_node_pool_snapshot_output(name: Optional[pulumi.Input[str]] = :param str name: The name of the Kubernetes Node Pool Snapshot. :param str resource_group_name: The name of the Resource Group in which the Kubernetes Node Pool Snapshot exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getKubernetesNodePoolSnapshot:getKubernetesNodePoolSnapshot', __args__, opts=opts, typ=GetKubernetesNodePoolSnapshotResult) + return __ret__.apply(lambda __response__: GetKubernetesNodePoolSnapshotResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + source_node_pool_id=pulumi.get(__response__, 'source_node_pool_id'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_kubernetes_service_versions.py b/sdk/python/pulumi_azure/containerservice/get_kubernetes_service_versions.py index b5e7aa40fb..b68c2eb153 100644 --- a/sdk/python/pulumi_azure/containerservice/get_kubernetes_service_versions.py +++ b/sdk/python/pulumi_azure/containerservice/get_kubernetes_service_versions.py @@ -150,9 +150,6 @@ def get_kubernetes_service_versions(include_preview: Optional[bool] = None, location=pulumi.get(__ret__, 'location'), version_prefix=pulumi.get(__ret__, 'version_prefix'), versions=pulumi.get(__ret__, 'versions')) - - -@_utilities.lift_output_func(get_kubernetes_service_versions) def get_kubernetes_service_versions_output(include_preview: Optional[pulumi.Input[Optional[bool]]] = None, location: Optional[pulumi.Input[str]] = None, version_prefix: Optional[pulumi.Input[Optional[str]]] = None, @@ -176,4 +173,17 @@ def get_kubernetes_service_versions_output(include_preview: Optional[pulumi.Inpu :param str location: Specifies the location in which to query for versions. :param str version_prefix: A prefix filter for the versions of Kubernetes which should be returned; for example `1.` will return `1.9` to `1.14`, whereas `1.12` will return `1.12.2`. """ - ... + __args__ = dict() + __args__['includePreview'] = include_preview + __args__['location'] = location + __args__['versionPrefix'] = version_prefix + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getKubernetesServiceVersions:getKubernetesServiceVersions', __args__, opts=opts, typ=GetKubernetesServiceVersionsResult) + return __ret__.apply(lambda __response__: GetKubernetesServiceVersionsResult( + default_version=pulumi.get(__response__, 'default_version'), + id=pulumi.get(__response__, 'id'), + include_preview=pulumi.get(__response__, 'include_preview'), + latest_version=pulumi.get(__response__, 'latest_version'), + location=pulumi.get(__response__, 'location'), + version_prefix=pulumi.get(__response__, 'version_prefix'), + versions=pulumi.get(__response__, 'versions'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_registry.py b/sdk/python/pulumi_azure/containerservice/get_registry.py index ba7d8669ff..f0f1e53349 100644 --- a/sdk/python/pulumi_azure/containerservice/get_registry.py +++ b/sdk/python/pulumi_azure/containerservice/get_registry.py @@ -202,9 +202,6 @@ def get_registry(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_registry) def get_registry_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRegistryResult]: @@ -226,4 +223,20 @@ def get_registry_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Container Registry. :param str resource_group_name: The Name of the Resource Group where this Container Registry exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getRegistry:getRegistry', __args__, opts=opts, typ=GetRegistryResult) + return __ret__.apply(lambda __response__: GetRegistryResult( + admin_enabled=pulumi.get(__response__, 'admin_enabled'), + admin_password=pulumi.get(__response__, 'admin_password'), + admin_username=pulumi.get(__response__, 'admin_username'), + data_endpoint_enabled=pulumi.get(__response__, 'data_endpoint_enabled'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + login_server=pulumi.get(__response__, 'login_server'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_registry_cache_rule.py b/sdk/python/pulumi_azure/containerservice/get_registry_cache_rule.py index 19085da311..9c9bb7d625 100644 --- a/sdk/python/pulumi_azure/containerservice/get_registry_cache_rule.py +++ b/sdk/python/pulumi_azure/containerservice/get_registry_cache_rule.py @@ -126,9 +126,6 @@ def get_registry_cache_rule(container_registry_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), source_repo=pulumi.get(__ret__, 'source_repo'), target_repo=pulumi.get(__ret__, 'target_repo')) - - -@_utilities.lift_output_func(get_registry_cache_rule) def get_registry_cache_rule_output(container_registry_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRegistryCacheRuleResult]: @@ -139,4 +136,15 @@ def get_registry_cache_rule_output(container_registry_id: Optional[pulumi.Input[ :param str container_registry_id: The ID of the container registry where the cache rule should apply. Changing this forces a new resource to be created. :param str name: Specifies the name of the Container Registry Cache Rule. Only Alphanumeric characters allowed. Changing this forces a new resource to be created. """ - ... + __args__ = dict() + __args__['containerRegistryId'] = container_registry_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getRegistryCacheRule:getRegistryCacheRule', __args__, opts=opts, typ=GetRegistryCacheRuleResult) + return __ret__.apply(lambda __response__: GetRegistryCacheRuleResult( + container_registry_id=pulumi.get(__response__, 'container_registry_id'), + credential_set_id=pulumi.get(__response__, 'credential_set_id'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + source_repo=pulumi.get(__response__, 'source_repo'), + target_repo=pulumi.get(__response__, 'target_repo'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_registry_scope_map.py b/sdk/python/pulumi_azure/containerservice/get_registry_scope_map.py index 9481f76550..11126a4fe5 100644 --- a/sdk/python/pulumi_azure/containerservice/get_registry_scope_map.py +++ b/sdk/python/pulumi_azure/containerservice/get_registry_scope_map.py @@ -135,9 +135,6 @@ def get_registry_scope_map(container_registry_name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_registry_scope_map) def get_registry_scope_map_output(container_registry_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -162,4 +159,16 @@ def get_registry_scope_map_output(container_registry_name: Optional[pulumi.Input :param str name: The name of the Container Registry token. :param str resource_group_name: The Name of the Resource Group where this Container Registry token exists. """ - ... + __args__ = dict() + __args__['containerRegistryName'] = container_registry_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getRegistryScopeMap:getRegistryScopeMap', __args__, opts=opts, typ=GetRegistryScopeMapResult) + return __ret__.apply(lambda __response__: GetRegistryScopeMapResult( + actions=pulumi.get(__response__, 'actions'), + container_registry_name=pulumi.get(__response__, 'container_registry_name'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/containerservice/get_registry_token.py b/sdk/python/pulumi_azure/containerservice/get_registry_token.py index 5ed02bc64c..43ade25491 100644 --- a/sdk/python/pulumi_azure/containerservice/get_registry_token.py +++ b/sdk/python/pulumi_azure/containerservice/get_registry_token.py @@ -138,9 +138,6 @@ def get_registry_token(container_registry_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), scope_map_id=pulumi.get(__ret__, 'scope_map_id')) - - -@_utilities.lift_output_func(get_registry_token) def get_registry_token_output(container_registry_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -165,4 +162,16 @@ def get_registry_token_output(container_registry_name: Optional[pulumi.Input[str :param str name: The name of the Container Registry token. :param str resource_group_name: The Name of the Resource Group where this Container Registry token exists. """ - ... + __args__ = dict() + __args__['containerRegistryName'] = container_registry_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:containerservice/getRegistryToken:getRegistryToken', __args__, opts=opts, typ=GetRegistryTokenResult) + return __ret__.apply(lambda __response__: GetRegistryTokenResult( + container_registry_name=pulumi.get(__response__, 'container_registry_name'), + enabled=pulumi.get(__response__, 'enabled'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + scope_map_id=pulumi.get(__response__, 'scope_map_id'))) diff --git a/sdk/python/pulumi_azure/core/get_client_config.py b/sdk/python/pulumi_azure/core/get_client_config.py index ad788d69e1..528a651d9c 100644 --- a/sdk/python/pulumi_azure/core/get_client_config.py +++ b/sdk/python/pulumi_azure/core/get_client_config.py @@ -121,9 +121,6 @@ def get_client_config(opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableG object_id=pulumi.get(__ret__, 'object_id'), subscription_id=pulumi.get(__ret__, 'subscription_id'), tenant_id=pulumi.get(__ret__, 'tenant_id')) - - -@_utilities.lift_output_func(get_client_config) def get_client_config_output(opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetClientConfigResult]: """ Use this data source to access the configuration of the AzureRM provider. @@ -138,4 +135,12 @@ def get_client_config_output(opts: Optional[pulumi.InvokeOptions] = None) -> pul pulumi.export("accountId", current.client_id) ``` """ - ... + __args__ = dict() + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getClientConfig:getClientConfig', __args__, opts=opts, typ=GetClientConfigResult) + return __ret__.apply(lambda __response__: GetClientConfigResult( + client_id=pulumi.get(__response__, 'client_id'), + id=pulumi.get(__response__, 'id'), + object_id=pulumi.get(__response__, 'object_id'), + subscription_id=pulumi.get(__response__, 'subscription_id'), + tenant_id=pulumi.get(__response__, 'tenant_id'))) diff --git a/sdk/python/pulumi_azure/core/get_extended_locations.py b/sdk/python/pulumi_azure/core/get_extended_locations.py index 84c7a39f73..bc588bab52 100644 --- a/sdk/python/pulumi_azure/core/get_extended_locations.py +++ b/sdk/python/pulumi_azure/core/get_extended_locations.py @@ -96,9 +96,6 @@ def get_extended_locations(location: Optional[str] = None, extended_locations=pulumi.get(__ret__, 'extended_locations'), id=pulumi.get(__ret__, 'id'), location=pulumi.get(__ret__, 'location')) - - -@_utilities.lift_output_func(get_extended_locations) def get_extended_locations_output(location: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetExtendedLocationsResult]: """ @@ -116,4 +113,11 @@ def get_extended_locations_output(location: Optional[pulumi.Input[str]] = None, :param str location: The Azure location to retrieve the Extended Locations for. """ - ... + __args__ = dict() + __args__['location'] = location + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getExtendedLocations:getExtendedLocations', __args__, opts=opts, typ=GetExtendedLocationsResult) + return __ret__.apply(lambda __response__: GetExtendedLocationsResult( + extended_locations=pulumi.get(__response__, 'extended_locations'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'))) diff --git a/sdk/python/pulumi_azure/core/get_location.py b/sdk/python/pulumi_azure/core/get_location.py index 935766fb35..5cb9873362 100644 --- a/sdk/python/pulumi_azure/core/get_location.py +++ b/sdk/python/pulumi_azure/core/get_location.py @@ -110,9 +110,6 @@ def get_location(location: Optional[str] = None, id=pulumi.get(__ret__, 'id'), location=pulumi.get(__ret__, 'location'), zone_mappings=pulumi.get(__ret__, 'zone_mappings')) - - -@_utilities.lift_output_func(get_location) def get_location_output(location: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLocationResult]: """ @@ -130,4 +127,12 @@ def get_location_output(location: Optional[pulumi.Input[str]] = None, :param str location: Specifies the supported Azure location where the resource exists. """ - ... + __args__ = dict() + __args__['location'] = location + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getLocation:getLocation', __args__, opts=opts, typ=GetLocationResult) + return __ret__.apply(lambda __response__: GetLocationResult( + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + zone_mappings=pulumi.get(__response__, 'zone_mappings'))) diff --git a/sdk/python/pulumi_azure/core/get_resource_group.py b/sdk/python/pulumi_azure/core/get_resource_group.py index 1e325346ad..a14c07b5de 100644 --- a/sdk/python/pulumi_azure/core/get_resource_group.py +++ b/sdk/python/pulumi_azure/core/get_resource_group.py @@ -120,9 +120,6 @@ def get_resource_group(name: Optional[str] = None, managed_by=pulumi.get(__ret__, 'managed_by'), name=pulumi.get(__ret__, 'name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_resource_group) def get_resource_group_output(name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResourceGroupResult]: """ @@ -141,4 +138,13 @@ def get_resource_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: The Name of this Resource Group. """ - ... + __args__ = dict() + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getResourceGroup:getResourceGroup', __args__, opts=opts, typ=GetResourceGroupResult) + return __ret__.apply(lambda __response__: GetResourceGroupResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + managed_by=pulumi.get(__response__, 'managed_by'), + name=pulumi.get(__response__, 'name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/core/get_resource_group_template_deployment.py b/sdk/python/pulumi_azure/core/get_resource_group_template_deployment.py index 0bbbd98830..e889056144 100644 --- a/sdk/python/pulumi_azure/core/get_resource_group_template_deployment.py +++ b/sdk/python/pulumi_azure/core/get_resource_group_template_deployment.py @@ -100,9 +100,6 @@ def get_resource_group_template_deployment(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), output_content=pulumi.get(__ret__, 'output_content'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_resource_group_template_deployment) def get_resource_group_template_deployment_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResourceGroupTemplateDeploymentResult]: @@ -113,4 +110,13 @@ def get_resource_group_template_deployment_output(name: Optional[pulumi.Input[st :param str name: The name of this Resource Group Template Deployment. :param str resource_group_name: The name of the Resource Group to which the Resource Group Template Deployment was applied. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getResourceGroupTemplateDeployment:getResourceGroupTemplateDeployment', __args__, opts=opts, typ=GetResourceGroupTemplateDeploymentResult) + return __ret__.apply(lambda __response__: GetResourceGroupTemplateDeploymentResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + output_content=pulumi.get(__response__, 'output_content'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/core/get_resources.py b/sdk/python/pulumi_azure/core/get_resources.py index 65b64c71af..144e9a4cb5 100644 --- a/sdk/python/pulumi_azure/core/get_resources.py +++ b/sdk/python/pulumi_azure/core/get_resources.py @@ -136,9 +136,6 @@ def get_resources(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), resources=pulumi.get(__ret__, 'resources'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_resources) def get_resources_output(name: Optional[pulumi.Input[Optional[str]]] = None, required_tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, resource_group_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -153,4 +150,17 @@ def get_resources_output(name: Optional[pulumi.Input[Optional[str]]] = None, :param str resource_group_name: The name of the Resource group where the Resources are located. :param str type: The Resource Type of the Resources you want to list (e.g. `Microsoft.Network/virtualNetworks`). A resource type's name follows the format: `{resource-provider}/{resource-type}`. The resource type for a key vault is `Microsoft.KeyVault/vaults`. A full list of available Resource Providers can be found [here](https://docs.microsoft.com/azure/azure-resource-manager/azure-services-resource-providers). A full list of Resources Types can be found [here](https://learn.microsoft.com/en-us/azure/templates/#find-resources). """ - ... + __args__ = dict() + __args__['name'] = name + __args__['requiredTags'] = required_tags + __args__['resourceGroupName'] = resource_group_name + __args__['type'] = type + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getResources:getResources', __args__, opts=opts, typ=GetResourcesResult) + return __ret__.apply(lambda __response__: GetResourcesResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + required_tags=pulumi.get(__response__, 'required_tags'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + resources=pulumi.get(__response__, 'resources'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_azure/core/get_subscription.py b/sdk/python/pulumi_azure/core/get_subscription.py index ad693fd6c5..7681bedef9 100644 --- a/sdk/python/pulumi_azure/core/get_subscription.py +++ b/sdk/python/pulumi_azure/core/get_subscription.py @@ -178,9 +178,6 @@ def get_subscription(subscription_id: Optional[str] = None, subscription_id=pulumi.get(__ret__, 'subscription_id'), tags=pulumi.get(__ret__, 'tags'), tenant_id=pulumi.get(__ret__, 'tenant_id')) - - -@_utilities.lift_output_func(get_subscription) def get_subscription_output(subscription_id: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSubscriptionResult]: """ @@ -199,4 +196,17 @@ def get_subscription_output(subscription_id: Optional[pulumi.Input[Optional[str] :param str subscription_id: Specifies the ID of the subscription. If this argument is omitted, the subscription ID of the current Azure Resource Manager provider is used. """ - ... + __args__ = dict() + __args__['subscriptionId'] = subscription_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getSubscription:getSubscription', __args__, opts=opts, typ=GetSubscriptionResult) + return __ret__.apply(lambda __response__: GetSubscriptionResult( + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + location_placement_id=pulumi.get(__response__, 'location_placement_id'), + quota_id=pulumi.get(__response__, 'quota_id'), + spending_limit=pulumi.get(__response__, 'spending_limit'), + state=pulumi.get(__response__, 'state'), + subscription_id=pulumi.get(__response__, 'subscription_id'), + tags=pulumi.get(__response__, 'tags'), + tenant_id=pulumi.get(__response__, 'tenant_id'))) diff --git a/sdk/python/pulumi_azure/core/get_subscription_template_deployment.py b/sdk/python/pulumi_azure/core/get_subscription_template_deployment.py index 11f10b967d..d4bdc65c53 100644 --- a/sdk/python/pulumi_azure/core/get_subscription_template_deployment.py +++ b/sdk/python/pulumi_azure/core/get_subscription_template_deployment.py @@ -87,9 +87,6 @@ def get_subscription_template_deployment(name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), output_content=pulumi.get(__ret__, 'output_content')) - - -@_utilities.lift_output_func(get_subscription_template_deployment) def get_subscription_template_deployment_output(name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSubscriptionTemplateDeploymentResult]: """ @@ -98,4 +95,11 @@ def get_subscription_template_deployment_output(name: Optional[pulumi.Input[str] :param str name: The name of this Subscription Template Deployment. """ - ... + __args__ = dict() + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getSubscriptionTemplateDeployment:getSubscriptionTemplateDeployment', __args__, opts=opts, typ=GetSubscriptionTemplateDeploymentResult) + return __ret__.apply(lambda __response__: GetSubscriptionTemplateDeploymentResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + output_content=pulumi.get(__response__, 'output_content'))) diff --git a/sdk/python/pulumi_azure/core/get_subscriptions.py b/sdk/python/pulumi_azure/core/get_subscriptions.py index d2aba89a46..f4f08803ab 100644 --- a/sdk/python/pulumi_azure/core/get_subscriptions.py +++ b/sdk/python/pulumi_azure/core/get_subscriptions.py @@ -112,9 +112,6 @@ def get_subscriptions(display_name_contains: Optional[str] = None, display_name_prefix=pulumi.get(__ret__, 'display_name_prefix'), id=pulumi.get(__ret__, 'id'), subscriptions=pulumi.get(__ret__, 'subscriptions')) - - -@_utilities.lift_output_func(get_subscriptions) def get_subscriptions_output(display_name_contains: Optional[pulumi.Input[Optional[str]]] = None, display_name_prefix: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSubscriptionsResult]: @@ -136,4 +133,13 @@ def get_subscriptions_output(display_name_contains: Optional[pulumi.Input[Option :param str display_name_contains: A case-insensitive value which must be contained within the `display_name` field, used to filter the results :param str display_name_prefix: A case-insensitive prefix which can be used to filter on the `display_name` field """ - ... + __args__ = dict() + __args__['displayNameContains'] = display_name_contains + __args__['displayNamePrefix'] = display_name_prefix + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getSubscriptions:getSubscriptions', __args__, opts=opts, typ=GetSubscriptionsResult) + return __ret__.apply(lambda __response__: GetSubscriptionsResult( + display_name_contains=pulumi.get(__response__, 'display_name_contains'), + display_name_prefix=pulumi.get(__response__, 'display_name_prefix'), + id=pulumi.get(__response__, 'id'), + subscriptions=pulumi.get(__response__, 'subscriptions'))) diff --git a/sdk/python/pulumi_azure/core/get_template_spec_version.py b/sdk/python/pulumi_azure/core/get_template_spec_version.py index 8ce4e52407..7f3358de6d 100644 --- a/sdk/python/pulumi_azure/core/get_template_spec_version.py +++ b/sdk/python/pulumi_azure/core/get_template_spec_version.py @@ -138,9 +138,6 @@ def get_template_spec_version(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), template_body=pulumi.get(__ret__, 'template_body'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_template_spec_version) def get_template_spec_version_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, version: Optional[pulumi.Input[str]] = None, @@ -165,4 +162,16 @@ def get_template_spec_version_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group where the Template Spec exists. :param str version: The Version Name of the Template Spec. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['version'] = version + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getTemplateSpecVersion:getTemplateSpecVersion', __args__, opts=opts, typ=GetTemplateSpecVersionResult) + return __ret__.apply(lambda __response__: GetTemplateSpecVersionResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + template_body=pulumi.get(__response__, 'template_body'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_azure/core/get_tenant_template_deployment.py b/sdk/python/pulumi_azure/core/get_tenant_template_deployment.py index a313209612..aad34a74d0 100644 --- a/sdk/python/pulumi_azure/core/get_tenant_template_deployment.py +++ b/sdk/python/pulumi_azure/core/get_tenant_template_deployment.py @@ -87,9 +87,6 @@ def get_tenant_template_deployment(name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), output_content=pulumi.get(__ret__, 'output_content')) - - -@_utilities.lift_output_func(get_tenant_template_deployment) def get_tenant_template_deployment_output(name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetTenantTemplateDeploymentResult]: """ @@ -98,4 +95,11 @@ def get_tenant_template_deployment_output(name: Optional[pulumi.Input[str]] = No :param str name: The name of this Tenant Template Deployment. """ - ... + __args__ = dict() + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getTenantTemplateDeployment:getTenantTemplateDeployment', __args__, opts=opts, typ=GetTenantTemplateDeploymentResult) + return __ret__.apply(lambda __response__: GetTenantTemplateDeploymentResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + output_content=pulumi.get(__response__, 'output_content'))) diff --git a/sdk/python/pulumi_azure/core/get_user_assigned_identity.py b/sdk/python/pulumi_azure/core/get_user_assigned_identity.py index 475bfc1b9f..c3cda7146b 100644 --- a/sdk/python/pulumi_azure/core/get_user_assigned_identity.py +++ b/sdk/python/pulumi_azure/core/get_user_assigned_identity.py @@ -170,9 +170,6 @@ def get_user_assigned_identity(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), tenant_id=pulumi.get(__ret__, 'tenant_id')) - - -@_utilities.lift_output_func(get_user_assigned_identity) def get_user_assigned_identity_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetUserAssignedIdentityResult]: @@ -199,4 +196,17 @@ def get_user_assigned_identity_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group in which the User Assigned Identity exists. """ pulumi.log.warn("""get_user_assigned_identity is deprecated: azure.core.getUserAssignedIdentity has been deprecated in favor of azure.authorization.getUserAssignedIdentity""") - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:core/getUserAssignedIdentity:getUserAssignedIdentity', __args__, opts=opts, typ=GetUserAssignedIdentityResult) + return __ret__.apply(lambda __response__: GetUserAssignedIdentityResult( + client_id=pulumi.get(__response__, 'client_id'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + principal_id=pulumi.get(__response__, 'principal_id'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + tenant_id=pulumi.get(__response__, 'tenant_id'))) diff --git a/sdk/python/pulumi_azure/cosmosdb/get_account.py b/sdk/python/pulumi_azure/cosmosdb/get_account.py index 065c4e34dc..4f0d4325ae 100644 --- a/sdk/python/pulumi_azure/cosmosdb/get_account.py +++ b/sdk/python/pulumi_azure/cosmosdb/get_account.py @@ -470,9 +470,6 @@ def get_account(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), virtual_network_rules=pulumi.get(__ret__, 'virtual_network_rules'), write_endpoints=pulumi.get(__ret__, 'write_endpoints')) - - -@_utilities.lift_output_func(get_account) def get_account_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccountResult]: @@ -494,4 +491,41 @@ def get_account_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the CosmosDB Account. :param str resource_group_name: Specifies the name of the resource group in which the CosmosDB Account resides. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cosmosdb/getAccount:getAccount', __args__, opts=opts, typ=GetAccountResult) + return __ret__.apply(lambda __response__: GetAccountResult( + automatic_failover_enabled=pulumi.get(__response__, 'automatic_failover_enabled'), + capabilities=pulumi.get(__response__, 'capabilities'), + consistency_policies=pulumi.get(__response__, 'consistency_policies'), + endpoint=pulumi.get(__response__, 'endpoint'), + free_tier_enabled=pulumi.get(__response__, 'free_tier_enabled'), + geo_locations=pulumi.get(__response__, 'geo_locations'), + id=pulumi.get(__response__, 'id'), + ip_range_filter=pulumi.get(__response__, 'ip_range_filter'), + is_virtual_network_filter_enabled=pulumi.get(__response__, 'is_virtual_network_filter_enabled'), + key_vault_key_id=pulumi.get(__response__, 'key_vault_key_id'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + multiple_write_locations_enabled=pulumi.get(__response__, 'multiple_write_locations_enabled'), + name=pulumi.get(__response__, 'name'), + offer_type=pulumi.get(__response__, 'offer_type'), + primary_key=pulumi.get(__response__, 'primary_key'), + primary_mongodb_connection_string=pulumi.get(__response__, 'primary_mongodb_connection_string'), + primary_readonly_key=pulumi.get(__response__, 'primary_readonly_key'), + primary_readonly_mongodb_connection_string=pulumi.get(__response__, 'primary_readonly_mongodb_connection_string'), + primary_readonly_sql_connection_string=pulumi.get(__response__, 'primary_readonly_sql_connection_string'), + primary_sql_connection_string=pulumi.get(__response__, 'primary_sql_connection_string'), + read_endpoints=pulumi.get(__response__, 'read_endpoints'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_key=pulumi.get(__response__, 'secondary_key'), + secondary_mongodb_connection_string=pulumi.get(__response__, 'secondary_mongodb_connection_string'), + secondary_readonly_key=pulumi.get(__response__, 'secondary_readonly_key'), + secondary_readonly_mongodb_connection_string=pulumi.get(__response__, 'secondary_readonly_mongodb_connection_string'), + secondary_readonly_sql_connection_string=pulumi.get(__response__, 'secondary_readonly_sql_connection_string'), + secondary_sql_connection_string=pulumi.get(__response__, 'secondary_sql_connection_string'), + tags=pulumi.get(__response__, 'tags'), + virtual_network_rules=pulumi.get(__response__, 'virtual_network_rules'), + write_endpoints=pulumi.get(__response__, 'write_endpoints'))) diff --git a/sdk/python/pulumi_azure/cosmosdb/get_mongo_database.py b/sdk/python/pulumi_azure/cosmosdb/get_mongo_database.py index 0aed1275d5..888a3c40e0 100644 --- a/sdk/python/pulumi_azure/cosmosdb/get_mongo_database.py +++ b/sdk/python/pulumi_azure/cosmosdb/get_mongo_database.py @@ -125,9 +125,6 @@ def get_mongo_database(account_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_mongo_database) def get_mongo_database_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -152,4 +149,15 @@ def get_mongo_database_output(account_name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Cosmos DB Mongo Database. :param str resource_group_name: The name of the Resource Group where the Cosmos DB Mongo Database exists. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cosmosdb/getMongoDatabase:getMongoDatabase', __args__, opts=opts, typ=GetMongoDatabaseResult) + return __ret__.apply(lambda __response__: GetMongoDatabaseResult( + account_name=pulumi.get(__response__, 'account_name'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/cosmosdb/get_restorable_database_accounts.py b/sdk/python/pulumi_azure/cosmosdb/get_restorable_database_accounts.py index f42382d407..2d5534d624 100644 --- a/sdk/python/pulumi_azure/cosmosdb/get_restorable_database_accounts.py +++ b/sdk/python/pulumi_azure/cosmosdb/get_restorable_database_accounts.py @@ -115,9 +115,6 @@ def get_restorable_database_accounts(location: Optional[str] = None, id=pulumi.get(__ret__, 'id'), location=pulumi.get(__ret__, 'location'), name=pulumi.get(__ret__, 'name')) - - -@_utilities.lift_output_func(get_restorable_database_accounts) def get_restorable_database_accounts_output(location: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRestorableDatabaseAccountsResult]: @@ -139,4 +136,13 @@ def get_restorable_database_accounts_output(location: Optional[pulumi.Input[str] :param str location: The location where the Cosmos DB Database Account. :param str name: The name of this Cosmos DB Database Account. """ - ... + __args__ = dict() + __args__['location'] = location + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cosmosdb/getRestorableDatabaseAccounts:getRestorableDatabaseAccounts', __args__, opts=opts, typ=GetRestorableDatabaseAccountsResult) + return __ret__.apply(lambda __response__: GetRestorableDatabaseAccountsResult( + accounts=pulumi.get(__response__, 'accounts'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'))) diff --git a/sdk/python/pulumi_azure/cosmosdb/get_sql_database.py b/sdk/python/pulumi_azure/cosmosdb/get_sql_database.py index 22f99959e3..e78a865d80 100644 --- a/sdk/python/pulumi_azure/cosmosdb/get_sql_database.py +++ b/sdk/python/pulumi_azure/cosmosdb/get_sql_database.py @@ -138,9 +138,6 @@ def get_sql_database(account_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), throughput=pulumi.get(__ret__, 'throughput')) - - -@_utilities.lift_output_func(get_sql_database) def get_sql_database_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -164,4 +161,16 @@ def get_sql_database_output(account_name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Cosmos DB SQL Database. :param str resource_group_name: The name of the resource group in which the Cosmos DB SQL Database is created. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cosmosdb/getSqlDatabase:getSqlDatabase', __args__, opts=opts, typ=GetSqlDatabaseResult) + return __ret__.apply(lambda __response__: GetSqlDatabaseResult( + account_name=pulumi.get(__response__, 'account_name'), + autoscale_settings=pulumi.get(__response__, 'autoscale_settings'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + throughput=pulumi.get(__response__, 'throughput'))) diff --git a/sdk/python/pulumi_azure/cosmosdb/get_sql_role_definition.py b/sdk/python/pulumi_azure/cosmosdb/get_sql_role_definition.py index c88cafe958..96419e3c07 100644 --- a/sdk/python/pulumi_azure/cosmosdb/get_sql_role_definition.py +++ b/sdk/python/pulumi_azure/cosmosdb/get_sql_role_definition.py @@ -164,9 +164,6 @@ def get_sql_role_definition(account_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), role_definition_id=pulumi.get(__ret__, 'role_definition_id'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_sql_role_definition) def get_sql_role_definition_output(account_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, role_definition_id: Optional[pulumi.Input[str]] = None, @@ -190,4 +187,18 @@ def get_sql_role_definition_output(account_name: Optional[pulumi.Input[str]] = N :param str resource_group_name: The name of the Resource Group in which the Cosmos DB SQL Role Definition is created. :param str role_definition_id: The GUID as the name of the Cosmos DB SQL Role Definition. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['resourceGroupName'] = resource_group_name + __args__['roleDefinitionId'] = role_definition_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:cosmosdb/getSqlRoleDefinition:getSqlRoleDefinition', __args__, opts=opts, typ=GetSqlRoleDefinitionResult) + return __ret__.apply(lambda __response__: GetSqlRoleDefinitionResult( + account_name=pulumi.get(__response__, 'account_name'), + assignable_scopes=pulumi.get(__response__, 'assignable_scopes'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + permissions=pulumi.get(__response__, 'permissions'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + role_definition_id=pulumi.get(__response__, 'role_definition_id'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_azure/dashboard/azurerm_portal_dashboard.py b/sdk/python/pulumi_azure/dashboard/azurerm_portal_dashboard.py index 3ea2a148b5..fd53ea52d6 100644 --- a/sdk/python/pulumi_azure/dashboard/azurerm_portal_dashboard.py +++ b/sdk/python/pulumi_azure/dashboard/azurerm_portal_dashboard.py @@ -156,9 +156,6 @@ def azurerm_portal_dashboard(dashboard_properties: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(azurerm_portal_dashboard) def azurerm_portal_dashboard_output(dashboard_properties: Optional[pulumi.Input[Optional[str]]] = None, display_name: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, @@ -185,4 +182,18 @@ def azurerm_portal_dashboard_output(dashboard_properties: Optional[pulumi.Input[ :param str resource_group_name: Specifies the name of the resource group the shared Azure Portal Dashboard is located in. """ pulumi.log.warn("""azurerm_portal_dashboard is deprecated: azure.dashboard/azurerm_portal_dashboard.azurerm_portal_dashboard has been deprecated in favor of azure.portal/azurerm_portal_dashboard.azurerm_portal_dashboard""") - ... + __args__ = dict() + __args__['dashboardProperties'] = dashboard_properties + __args__['displayName'] = display_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dashboard/azurerm_portal_dashboard:azurerm_portal_dashboard', __args__, opts=opts, typ=Azurerm_portal_dashboardResult) + return __ret__.apply(lambda __response__: Azurerm_portal_dashboardResult( + dashboard_properties=pulumi.get(__response__, 'dashboard_properties'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/dashboard/get_grafana.py b/sdk/python/pulumi_azure/dashboard/get_grafana.py index 8f09191e29..6fbefac708 100644 --- a/sdk/python/pulumi_azure/dashboard/get_grafana.py +++ b/sdk/python/pulumi_azure/dashboard/get_grafana.py @@ -282,9 +282,6 @@ def get_grafana(identity: Optional[Union['GetGrafanaIdentityArgs', 'GetGrafanaId sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags'), zone_redundancy_enabled=pulumi.get(__ret__, 'zone_redundancy_enabled')) - - -@_utilities.lift_output_func(get_grafana) def get_grafana_output(identity: Optional[pulumi.Input[Optional[Union['GetGrafanaIdentityArgs', 'GetGrafanaIdentityArgsDict']]]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -308,4 +305,27 @@ def get_grafana_output(identity: Optional[pulumi.Input[Optional[Union['GetGrafan :param str name: Name of the grafana dashboard. :param str resource_group_name: Name of the resource group where resource belongs to. """ - ... + __args__ = dict() + __args__['identity'] = identity + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dashboard/getGrafana:getGrafana', __args__, opts=opts, typ=GetGrafanaResult) + return __ret__.apply(lambda __response__: GetGrafanaResult( + api_key_enabled=pulumi.get(__response__, 'api_key_enabled'), + auto_generated_domain_name_label_scope=pulumi.get(__response__, 'auto_generated_domain_name_label_scope'), + azure_monitor_workspace_integrations=pulumi.get(__response__, 'azure_monitor_workspace_integrations'), + deterministic_outbound_ip_enabled=pulumi.get(__response__, 'deterministic_outbound_ip_enabled'), + endpoint=pulumi.get(__response__, 'endpoint'), + grafana_major_version=pulumi.get(__response__, 'grafana_major_version'), + grafana_version=pulumi.get(__response__, 'grafana_version'), + id=pulumi.get(__response__, 'id'), + identity=pulumi.get(__response__, 'identity'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + outbound_ips=pulumi.get(__response__, 'outbound_ips'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + zone_redundancy_enabled=pulumi.get(__response__, 'zone_redundancy_enabled'))) diff --git a/sdk/python/pulumi_azure/databasemigration/get_project.py b/sdk/python/pulumi_azure/databasemigration/get_project.py index cbc77877bc..b7c0066acc 100644 --- a/sdk/python/pulumi_azure/databasemigration/get_project.py +++ b/sdk/python/pulumi_azure/databasemigration/get_project.py @@ -164,9 +164,6 @@ def get_project(name: Optional[str] = None, source_platform=pulumi.get(__ret__, 'source_platform'), tags=pulumi.get(__ret__, 'tags'), target_platform=pulumi.get(__ret__, 'target_platform')) - - -@_utilities.lift_output_func(get_project) def get_project_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, service_name: Optional[pulumi.Input[str]] = None, @@ -191,4 +188,18 @@ def get_project_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Name of the resource group where resource belongs to. :param str service_name: Name of the database migration service where resource belongs to. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['serviceName'] = service_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:databasemigration/getProject:getProject', __args__, opts=opts, typ=GetProjectResult) + return __ret__.apply(lambda __response__: GetProjectResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_name=pulumi.get(__response__, 'service_name'), + source_platform=pulumi.get(__response__, 'source_platform'), + tags=pulumi.get(__response__, 'tags'), + target_platform=pulumi.get(__response__, 'target_platform'))) diff --git a/sdk/python/pulumi_azure/databasemigration/get_service.py b/sdk/python/pulumi_azure/databasemigration/get_service.py index 11275bcfa9..ecbe009733 100644 --- a/sdk/python/pulumi_azure/databasemigration/get_service.py +++ b/sdk/python/pulumi_azure/databasemigration/get_service.py @@ -150,9 +150,6 @@ def get_service(name: Optional[str] = None, sku_name=pulumi.get(__ret__, 'sku_name'), subnet_id=pulumi.get(__ret__, 'subnet_id'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_service) def get_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceResult]: @@ -174,4 +171,16 @@ def get_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specify the name of the database migration service. :param str resource_group_name: Specifies the Name of the Resource Group within which the database migration service exists """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:databasemigration/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + subnet_id=pulumi.get(__response__, 'subnet_id'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/databoxedge/get_device.py b/sdk/python/pulumi_azure/databoxedge/get_device.py index 0e2c8a2e8e..d1133a9a64 100644 --- a/sdk/python/pulumi_azure/databoxedge/get_device.py +++ b/sdk/python/pulumi_azure/databoxedge/get_device.py @@ -150,9 +150,6 @@ def get_device(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_device) def get_device_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDeviceResult]: @@ -173,4 +170,16 @@ def get_device_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name which should be used for this Databox Edge Device. Changing this forces a new Databox Edge Device to be created. :param str resource_group_name: The name of the Resource Group where the Databox Edge Device should exist. Changing this forces a new Databox Edge Device to be created. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:databoxedge/getDevice:getDevice', __args__, opts=opts, typ=GetDeviceResult) + return __ret__.apply(lambda __response__: GetDeviceResult( + device_properties=pulumi.get(__response__, 'device_properties'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/databricks/get_access_connector.py b/sdk/python/pulumi_azure/databricks/get_access_connector.py index cb61624f53..c5bd8e12b5 100644 --- a/sdk/python/pulumi_azure/databricks/get_access_connector.py +++ b/sdk/python/pulumi_azure/databricks/get_access_connector.py @@ -138,9 +138,6 @@ def get_access_connector(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_access_connector) def get_access_connector_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessConnectorResult]: @@ -162,4 +159,15 @@ def get_access_connector_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Databricks Access Connector. :param str resource_group_name: The name of the Resource Group where the Databricks Access Connector exists. Changing this forces a new Databricks Access Connector to be created. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:databricks/getAccessConnector:getAccessConnector', __args__, opts=opts, typ=GetAccessConnectorResult) + return __ret__.apply(lambda __response__: GetAccessConnectorResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/databricks/get_workspace.py b/sdk/python/pulumi_azure/databricks/get_workspace.py index 59267f534a..34a1d8c195 100644 --- a/sdk/python/pulumi_azure/databricks/get_workspace.py +++ b/sdk/python/pulumi_azure/databricks/get_workspace.py @@ -193,9 +193,6 @@ def get_workspace(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), workspace_id=pulumi.get(__ret__, 'workspace_id'), workspace_url=pulumi.get(__ret__, 'workspace_url')) - - -@_utilities.lift_output_func(get_workspace) def get_workspace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -219,4 +216,20 @@ def get_workspace_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group where the Databricks Workspace exists. :param Mapping[str, str] tags: A mapping of tags to assign to the Databricks Workspace. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:databricks/getWorkspace:getWorkspace', __args__, opts=opts, typ=GetWorkspaceResult) + return __ret__.apply(lambda __response__: GetWorkspaceResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + managed_disk_identities=pulumi.get(__response__, 'managed_disk_identities'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + storage_account_identities=pulumi.get(__response__, 'storage_account_identities'), + tags=pulumi.get(__response__, 'tags'), + workspace_id=pulumi.get(__response__, 'workspace_id'), + workspace_url=pulumi.get(__response__, 'workspace_url'))) diff --git a/sdk/python/pulumi_azure/databricks/get_workspace_private_endpoint_connection.py b/sdk/python/pulumi_azure/databricks/get_workspace_private_endpoint_connection.py index e01e729627..b9c186d026 100644 --- a/sdk/python/pulumi_azure/databricks/get_workspace_private_endpoint_connection.py +++ b/sdk/python/pulumi_azure/databricks/get_workspace_private_endpoint_connection.py @@ -118,9 +118,6 @@ def get_workspace_private_endpoint_connection(private_endpoint_id: Optional[str] id=pulumi.get(__ret__, 'id'), private_endpoint_id=pulumi.get(__ret__, 'private_endpoint_id'), workspace_id=pulumi.get(__ret__, 'workspace_id')) - - -@_utilities.lift_output_func(get_workspace_private_endpoint_connection) def get_workspace_private_endpoint_connection_output(private_endpoint_id: Optional[pulumi.Input[str]] = None, workspace_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWorkspacePrivateEndpointConnectionResult]: @@ -142,4 +139,13 @@ def get_workspace_private_endpoint_connection_output(private_endpoint_id: Option :param str private_endpoint_id: The resource ID of the Private Endpoint. :param str workspace_id: The resource ID of the Databricks Workspace. """ - ... + __args__ = dict() + __args__['privateEndpointId'] = private_endpoint_id + __args__['workspaceId'] = workspace_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:databricks/getWorkspacePrivateEndpointConnection:getWorkspacePrivateEndpointConnection', __args__, opts=opts, typ=GetWorkspacePrivateEndpointConnectionResult) + return __ret__.apply(lambda __response__: GetWorkspacePrivateEndpointConnectionResult( + connections=pulumi.get(__response__, 'connections'), + id=pulumi.get(__response__, 'id'), + private_endpoint_id=pulumi.get(__response__, 'private_endpoint_id'), + workspace_id=pulumi.get(__response__, 'workspace_id'))) diff --git a/sdk/python/pulumi_azure/datafactory/get_factory.py b/sdk/python/pulumi_azure/datafactory/get_factory.py index 4fe2a195a1..1b3775bf19 100644 --- a/sdk/python/pulumi_azure/datafactory/get_factory.py +++ b/sdk/python/pulumi_azure/datafactory/get_factory.py @@ -164,9 +164,6 @@ def get_factory(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), vsts_configurations=pulumi.get(__ret__, 'vsts_configurations')) - - -@_utilities.lift_output_func(get_factory) def get_factory_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetFactoryResult]: @@ -188,4 +185,17 @@ def get_factory_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Azure Data Factory. :param str resource_group_name: The name of the Resource Group where the Azure Data Factory exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datafactory/getFactory:getFactory', __args__, opts=opts, typ=GetFactoryResult) + return __ret__.apply(lambda __response__: GetFactoryResult( + github_configurations=pulumi.get(__response__, 'github_configurations'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + vsts_configurations=pulumi.get(__response__, 'vsts_configurations'))) diff --git a/sdk/python/pulumi_azure/datafactory/get_trigger_schedule.py b/sdk/python/pulumi_azure/datafactory/get_trigger_schedule.py index f5aa446c7f..1e4371f270 100644 --- a/sdk/python/pulumi_azure/datafactory/get_trigger_schedule.py +++ b/sdk/python/pulumi_azure/datafactory/get_trigger_schedule.py @@ -229,9 +229,6 @@ def get_trigger_schedule(data_factory_id: Optional[str] = None, schedules=pulumi.get(__ret__, 'schedules'), start_time=pulumi.get(__ret__, 'start_time'), time_zone=pulumi.get(__ret__, 'time_zone')) - - -@_utilities.lift_output_func(get_trigger_schedule) def get_trigger_schedule_output(data_factory_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetTriggerScheduleResult]: @@ -253,4 +250,22 @@ def get_trigger_schedule_output(data_factory_id: Optional[pulumi.Input[str]] = N :param str data_factory_id: The ID of the Azure Data Factory to fetch trigger schedule from. :param str name: The name of the trigger schedule. """ - ... + __args__ = dict() + __args__['dataFactoryId'] = data_factory_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datafactory/getTriggerSchedule:getTriggerSchedule', __args__, opts=opts, typ=GetTriggerScheduleResult) + return __ret__.apply(lambda __response__: GetTriggerScheduleResult( + activated=pulumi.get(__response__, 'activated'), + annotations=pulumi.get(__response__, 'annotations'), + data_factory_id=pulumi.get(__response__, 'data_factory_id'), + description=pulumi.get(__response__, 'description'), + end_time=pulumi.get(__response__, 'end_time'), + frequency=pulumi.get(__response__, 'frequency'), + id=pulumi.get(__response__, 'id'), + interval=pulumi.get(__response__, 'interval'), + name=pulumi.get(__response__, 'name'), + pipeline_name=pulumi.get(__response__, 'pipeline_name'), + schedules=pulumi.get(__response__, 'schedules'), + start_time=pulumi.get(__response__, 'start_time'), + time_zone=pulumi.get(__response__, 'time_zone'))) diff --git a/sdk/python/pulumi_azure/datafactory/get_trigger_schedules.py b/sdk/python/pulumi_azure/datafactory/get_trigger_schedules.py index caf6104ca6..2520b9d421 100644 --- a/sdk/python/pulumi_azure/datafactory/get_trigger_schedules.py +++ b/sdk/python/pulumi_azure/datafactory/get_trigger_schedules.py @@ -97,9 +97,6 @@ def get_trigger_schedules(data_factory_id: Optional[str] = None, data_factory_id=pulumi.get(__ret__, 'data_factory_id'), id=pulumi.get(__ret__, 'id'), items=pulumi.get(__ret__, 'items')) - - -@_utilities.lift_output_func(get_trigger_schedules) def get_trigger_schedules_output(data_factory_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetTriggerSchedulesResult]: """ @@ -118,4 +115,11 @@ def get_trigger_schedules_output(data_factory_id: Optional[pulumi.Input[str]] = :param str data_factory_id: The ID of the Azure Data Factory to fetch trigger schedules from. """ - ... + __args__ = dict() + __args__['dataFactoryId'] = data_factory_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datafactory/getTriggerSchedules:getTriggerSchedules', __args__, opts=opts, typ=GetTriggerSchedulesResult) + return __ret__.apply(lambda __response__: GetTriggerSchedulesResult( + data_factory_id=pulumi.get(__response__, 'data_factory_id'), + id=pulumi.get(__response__, 'id'), + items=pulumi.get(__response__, 'items'))) diff --git a/sdk/python/pulumi_azure/dataprotection/get_backup_vault.py b/sdk/python/pulumi_azure/dataprotection/get_backup_vault.py index a38172253e..c7cdb23883 100644 --- a/sdk/python/pulumi_azure/dataprotection/get_backup_vault.py +++ b/sdk/python/pulumi_azure/dataprotection/get_backup_vault.py @@ -165,9 +165,6 @@ def get_backup_vault(name: Optional[str] = None, redundancy=pulumi.get(__ret__, 'redundancy'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_backup_vault) def get_backup_vault_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackupVaultResult]: @@ -190,4 +187,17 @@ def get_backup_vault_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Backup Vault. :param str resource_group_name: The name of the Resource Group where the Backup Vault exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dataprotection/getBackupVault:getBackupVault', __args__, opts=opts, typ=GetBackupVaultResult) + return __ret__.apply(lambda __response__: GetBackupVaultResult( + datastore_type=pulumi.get(__response__, 'datastore_type'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + redundancy=pulumi.get(__response__, 'redundancy'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/datashare/get_account.py b/sdk/python/pulumi_azure/datashare/get_account.py index a796a4c32a..1299e24c07 100644 --- a/sdk/python/pulumi_azure/datashare/get_account.py +++ b/sdk/python/pulumi_azure/datashare/get_account.py @@ -125,9 +125,6 @@ def get_account(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_account) def get_account_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccountResult]: @@ -149,4 +146,14 @@ def get_account_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Data Share Account. :param str resource_group_name: The name of the Resource Group where the Data Share Account exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datashare/getAccount:getAccount', __args__, opts=opts, typ=GetAccountResult) + return __ret__.apply(lambda __response__: GetAccountResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/datashare/get_dataset_blob_storage.py b/sdk/python/pulumi_azure/datashare/get_dataset_blob_storage.py index 57f91b0400..79e508554c 100644 --- a/sdk/python/pulumi_azure/datashare/get_dataset_blob_storage.py +++ b/sdk/python/pulumi_azure/datashare/get_dataset_blob_storage.py @@ -167,9 +167,6 @@ def get_dataset_blob_storage(data_share_id: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), storage_accounts=pulumi.get(__ret__, 'storage_accounts')) - - -@_utilities.lift_output_func(get_dataset_blob_storage) def get_dataset_blob_storage_output(data_share_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDatasetBlobStorageResult]: @@ -191,4 +188,17 @@ def get_dataset_blob_storage_output(data_share_id: Optional[pulumi.Input[str]] = :param str data_share_id: The ID of the Data Share in which this Data Share Blob Storage Dataset should be created. :param str name: The name of this Data Share Blob Storage Dataset. """ - ... + __args__ = dict() + __args__['dataShareId'] = data_share_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datashare/getDatasetBlobStorage:getDatasetBlobStorage', __args__, opts=opts, typ=GetDatasetBlobStorageResult) + return __ret__.apply(lambda __response__: GetDatasetBlobStorageResult( + container_name=pulumi.get(__response__, 'container_name'), + data_share_id=pulumi.get(__response__, 'data_share_id'), + display_name=pulumi.get(__response__, 'display_name'), + file_path=pulumi.get(__response__, 'file_path'), + folder_path=pulumi.get(__response__, 'folder_path'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + storage_accounts=pulumi.get(__response__, 'storage_accounts'))) diff --git a/sdk/python/pulumi_azure/datashare/get_dataset_data_lake_gen2.py b/sdk/python/pulumi_azure/datashare/get_dataset_data_lake_gen2.py index cc68fef2cd..bec4cbd4ef 100644 --- a/sdk/python/pulumi_azure/datashare/get_dataset_data_lake_gen2.py +++ b/sdk/python/pulumi_azure/datashare/get_dataset_data_lake_gen2.py @@ -163,9 +163,6 @@ def get_dataset_data_lake_gen2(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), share_id=pulumi.get(__ret__, 'share_id'), storage_account_id=pulumi.get(__ret__, 'storage_account_id')) - - -@_utilities.lift_output_func(get_dataset_data_lake_gen2) def get_dataset_data_lake_gen2_output(name: Optional[pulumi.Input[str]] = None, share_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDatasetDataLakeGen2Result]: @@ -187,4 +184,17 @@ def get_dataset_data_lake_gen2_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Data Share Data Lake Gen2 Dataset. :param str share_id: The resource ID of the Data Share where this Data Share Data Lake Gen2 Dataset should be created. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['shareId'] = share_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datashare/getDatasetDataLakeGen2:getDatasetDataLakeGen2', __args__, opts=opts, typ=GetDatasetDataLakeGen2Result) + return __ret__.apply(lambda __response__: GetDatasetDataLakeGen2Result( + display_name=pulumi.get(__response__, 'display_name'), + file_path=pulumi.get(__response__, 'file_path'), + file_system_name=pulumi.get(__response__, 'file_system_name'), + folder_path=pulumi.get(__response__, 'folder_path'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + share_id=pulumi.get(__response__, 'share_id'), + storage_account_id=pulumi.get(__response__, 'storage_account_id'))) diff --git a/sdk/python/pulumi_azure/datashare/get_dataset_kusto_cluster.py b/sdk/python/pulumi_azure/datashare/get_dataset_kusto_cluster.py index 299b425f67..81c87bfb5f 100644 --- a/sdk/python/pulumi_azure/datashare/get_dataset_kusto_cluster.py +++ b/sdk/python/pulumi_azure/datashare/get_dataset_kusto_cluster.py @@ -137,9 +137,6 @@ def get_dataset_kusto_cluster(name: Optional[str] = None, kusto_cluster_location=pulumi.get(__ret__, 'kusto_cluster_location'), name=pulumi.get(__ret__, 'name'), share_id=pulumi.get(__ret__, 'share_id')) - - -@_utilities.lift_output_func(get_dataset_kusto_cluster) def get_dataset_kusto_cluster_output(name: Optional[pulumi.Input[str]] = None, share_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDatasetKustoClusterResult]: @@ -161,4 +158,15 @@ def get_dataset_kusto_cluster_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Data Share Kusto Cluster Dataset. :param str share_id: The resource ID of the Data Share where this Data Share Kusto Cluster Dataset should be created. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['shareId'] = share_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datashare/getDatasetKustoCluster:getDatasetKustoCluster', __args__, opts=opts, typ=GetDatasetKustoClusterResult) + return __ret__.apply(lambda __response__: GetDatasetKustoClusterResult( + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + kusto_cluster_id=pulumi.get(__response__, 'kusto_cluster_id'), + kusto_cluster_location=pulumi.get(__response__, 'kusto_cluster_location'), + name=pulumi.get(__response__, 'name'), + share_id=pulumi.get(__response__, 'share_id'))) diff --git a/sdk/python/pulumi_azure/datashare/get_dataset_kusto_database.py b/sdk/python/pulumi_azure/datashare/get_dataset_kusto_database.py index db46e7c86c..1090c750ce 100644 --- a/sdk/python/pulumi_azure/datashare/get_dataset_kusto_database.py +++ b/sdk/python/pulumi_azure/datashare/get_dataset_kusto_database.py @@ -137,9 +137,6 @@ def get_dataset_kusto_database(name: Optional[str] = None, kusto_database_id=pulumi.get(__ret__, 'kusto_database_id'), name=pulumi.get(__ret__, 'name'), share_id=pulumi.get(__ret__, 'share_id')) - - -@_utilities.lift_output_func(get_dataset_kusto_database) def get_dataset_kusto_database_output(name: Optional[pulumi.Input[str]] = None, share_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDatasetKustoDatabaseResult]: @@ -161,4 +158,15 @@ def get_dataset_kusto_database_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Data Share Kusto Database Dataset. :param str share_id: The resource ID of the Data Share where this Data Share Kusto Database Dataset should be created. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['shareId'] = share_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datashare/getDatasetKustoDatabase:getDatasetKustoDatabase', __args__, opts=opts, typ=GetDatasetKustoDatabaseResult) + return __ret__.apply(lambda __response__: GetDatasetKustoDatabaseResult( + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + kusto_cluster_location=pulumi.get(__response__, 'kusto_cluster_location'), + kusto_database_id=pulumi.get(__response__, 'kusto_database_id'), + name=pulumi.get(__response__, 'name'), + share_id=pulumi.get(__response__, 'share_id'))) diff --git a/sdk/python/pulumi_azure/datashare/get_share.py b/sdk/python/pulumi_azure/datashare/get_share.py index beae165827..f406039971 100644 --- a/sdk/python/pulumi_azure/datashare/get_share.py +++ b/sdk/python/pulumi_azure/datashare/get_share.py @@ -156,9 +156,6 @@ def get_share(account_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), snapshot_schedules=pulumi.get(__ret__, 'snapshot_schedules'), terms=pulumi.get(__ret__, 'terms')) - - -@_utilities.lift_output_func(get_share) def get_share_output(account_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetShareResult]: @@ -182,4 +179,16 @@ def get_share_output(account_id: Optional[pulumi.Input[str]] = None, :param str account_id: The ID of the Data Share account in which the Data Share is created. :param str name: The name of this Data Share. """ - ... + __args__ = dict() + __args__['accountId'] = account_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:datashare/getShare:getShare', __args__, opts=opts, typ=GetShareResult) + return __ret__.apply(lambda __response__: GetShareResult( + account_id=pulumi.get(__response__, 'account_id'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + kind=pulumi.get(__response__, 'kind'), + name=pulumi.get(__response__, 'name'), + snapshot_schedules=pulumi.get(__response__, 'snapshot_schedules'), + terms=pulumi.get(__response__, 'terms'))) diff --git a/sdk/python/pulumi_azure/desktopvirtualization/get_application_group.py b/sdk/python/pulumi_azure/desktopvirtualization/get_application_group.py index c7b9d4456f..d02abbf345 100644 --- a/sdk/python/pulumi_azure/desktopvirtualization/get_application_group.py +++ b/sdk/python/pulumi_azure/desktopvirtualization/get_application_group.py @@ -189,9 +189,6 @@ def get_application_group(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), type=pulumi.get(__ret__, 'type'), workspace_id=pulumi.get(__ret__, 'workspace_id')) - - -@_utilities.lift_output_func(get_application_group) def get_application_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetApplicationGroupResult]: @@ -213,4 +210,19 @@ def get_application_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Application Group. :param str resource_group_name: The name of the Resource Group where the Application Group exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:desktopvirtualization/getApplicationGroup:getApplicationGroup', __args__, opts=opts, typ=GetApplicationGroupResult) + return __ret__.apply(lambda __response__: GetApplicationGroupResult( + description=pulumi.get(__response__, 'description'), + friendly_name=pulumi.get(__response__, 'friendly_name'), + host_pool_id=pulumi.get(__response__, 'host_pool_id'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + type=pulumi.get(__response__, 'type'), + workspace_id=pulumi.get(__response__, 'workspace_id'))) diff --git a/sdk/python/pulumi_azure/desktopvirtualization/get_host_pool.py b/sdk/python/pulumi_azure/desktopvirtualization/get_host_pool.py index 4a24149674..cbd264c3ff 100644 --- a/sdk/python/pulumi_azure/desktopvirtualization/get_host_pool.py +++ b/sdk/python/pulumi_azure/desktopvirtualization/get_host_pool.py @@ -267,9 +267,6 @@ def get_host_pool(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), type=pulumi.get(__ret__, 'type'), validate_environment=pulumi.get(__ret__, 'validate_environment')) - - -@_utilities.lift_output_func(get_host_pool) def get_host_pool_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetHostPoolResult]: @@ -290,4 +287,25 @@ def get_host_pool_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Virtual Desktop Host Pool to retrieve. :param str resource_group_name: The name of the resource group where the Virtual Desktop Host Pool exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:desktopvirtualization/getHostPool:getHostPool', __args__, opts=opts, typ=GetHostPoolResult) + return __ret__.apply(lambda __response__: GetHostPoolResult( + custom_rdp_properties=pulumi.get(__response__, 'custom_rdp_properties'), + description=pulumi.get(__response__, 'description'), + friendly_name=pulumi.get(__response__, 'friendly_name'), + id=pulumi.get(__response__, 'id'), + load_balancer_type=pulumi.get(__response__, 'load_balancer_type'), + location=pulumi.get(__response__, 'location'), + maximum_sessions_allowed=pulumi.get(__response__, 'maximum_sessions_allowed'), + name=pulumi.get(__response__, 'name'), + personal_desktop_assignment_type=pulumi.get(__response__, 'personal_desktop_assignment_type'), + preferred_app_group_type=pulumi.get(__response__, 'preferred_app_group_type'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + scheduled_agent_updates=pulumi.get(__response__, 'scheduled_agent_updates'), + start_vm_on_connect=pulumi.get(__response__, 'start_vm_on_connect'), + tags=pulumi.get(__response__, 'tags'), + type=pulumi.get(__response__, 'type'), + validate_environment=pulumi.get(__response__, 'validate_environment'))) diff --git a/sdk/python/pulumi_azure/desktopvirtualization/get_workspace.py b/sdk/python/pulumi_azure/desktopvirtualization/get_workspace.py index 307847d070..dbe551e442 100644 --- a/sdk/python/pulumi_azure/desktopvirtualization/get_workspace.py +++ b/sdk/python/pulumi_azure/desktopvirtualization/get_workspace.py @@ -163,9 +163,6 @@ def get_workspace(name: Optional[str] = None, public_network_access_enabled=pulumi.get(__ret__, 'public_network_access_enabled'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_workspace) def get_workspace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWorkspaceResult]: @@ -187,4 +184,17 @@ def get_workspace_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Virtual Desktop Workspace to retrieve. :param str resource_group_name: The name of the Resource Group where the Virtual Desktop Workspace exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:desktopvirtualization/getWorkspace:getWorkspace', __args__, opts=opts, typ=GetWorkspaceResult) + return __ret__.apply(lambda __response__: GetWorkspaceResult( + description=pulumi.get(__response__, 'description'), + friendly_name=pulumi.get(__response__, 'friendly_name'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/devtest/get_lab.py b/sdk/python/pulumi_azure/devtest/get_lab.py index e581b298e2..1720e09641 100644 --- a/sdk/python/pulumi_azure/devtest/get_lab.py +++ b/sdk/python/pulumi_azure/devtest/get_lab.py @@ -215,9 +215,6 @@ def get_lab(name: Optional[str] = None, storage_type=pulumi.get(__ret__, 'storage_type'), tags=pulumi.get(__ret__, 'tags'), unique_identifier=pulumi.get(__ret__, 'unique_identifier')) - - -@_utilities.lift_output_func(get_lab) def get_lab_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLabResult]: @@ -239,4 +236,21 @@ def get_lab_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Dev Test Lab. :param str resource_group_name: The Name of the Resource Group where the Dev Test Lab exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:devtest/getLab:getLab', __args__, opts=opts, typ=GetLabResult) + return __ret__.apply(lambda __response__: GetLabResult( + artifacts_storage_account_id=pulumi.get(__response__, 'artifacts_storage_account_id'), + default_premium_storage_account_id=pulumi.get(__response__, 'default_premium_storage_account_id'), + default_storage_account_id=pulumi.get(__response__, 'default_storage_account_id'), + id=pulumi.get(__response__, 'id'), + key_vault_id=pulumi.get(__response__, 'key_vault_id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + premium_data_disk_storage_account_id=pulumi.get(__response__, 'premium_data_disk_storage_account_id'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + storage_type=pulumi.get(__response__, 'storage_type'), + tags=pulumi.get(__response__, 'tags'), + unique_identifier=pulumi.get(__response__, 'unique_identifier'))) diff --git a/sdk/python/pulumi_azure/devtest/get_virtual_network.py b/sdk/python/pulumi_azure/devtest/get_virtual_network.py index 150eddf2b6..49e143a173 100644 --- a/sdk/python/pulumi_azure/devtest/get_virtual_network.py +++ b/sdk/python/pulumi_azure/devtest/get_virtual_network.py @@ -152,9 +152,6 @@ def get_virtual_network(lab_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), subnet_overrides=pulumi.get(__ret__, 'subnet_overrides'), unique_identifier=pulumi.get(__ret__, 'unique_identifier')) - - -@_utilities.lift_output_func(get_virtual_network) def get_virtual_network_output(lab_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -179,4 +176,17 @@ def get_virtual_network_output(lab_name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Virtual Network. :param str resource_group_name: Specifies the name of the resource group that contains the Virtual Network. """ - ... + __args__ = dict() + __args__['labName'] = lab_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:devtest/getVirtualNetwork:getVirtualNetwork', __args__, opts=opts, typ=GetVirtualNetworkResult) + return __ret__.apply(lambda __response__: GetVirtualNetworkResult( + allowed_subnets=pulumi.get(__response__, 'allowed_subnets'), + id=pulumi.get(__response__, 'id'), + lab_name=pulumi.get(__response__, 'lab_name'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + subnet_overrides=pulumi.get(__response__, 'subnet_overrides'), + unique_identifier=pulumi.get(__response__, 'unique_identifier'))) diff --git a/sdk/python/pulumi_azure/digitaltwins/get_instance.py b/sdk/python/pulumi_azure/digitaltwins/get_instance.py index 582364a26b..73482c5d90 100644 --- a/sdk/python/pulumi_azure/digitaltwins/get_instance.py +++ b/sdk/python/pulumi_azure/digitaltwins/get_instance.py @@ -137,9 +137,6 @@ def get_instance(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_instance) def get_instance_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetInstanceResult]: @@ -161,4 +158,15 @@ def get_instance_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Digital Twins instance. :param str resource_group_name: The name of the Resource Group where the Digital Twins instance exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:digitaltwins/getInstance:getInstance', __args__, opts=opts, typ=GetInstanceResult) + return __ret__.apply(lambda __response__: GetInstanceResult( + host_name=pulumi.get(__response__, 'host_name'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/dns/get_a_record.py b/sdk/python/pulumi_azure/dns/get_a_record.py index 14ec8b9f94..0d51e33473 100644 --- a/sdk/python/pulumi_azure/dns/get_a_record.py +++ b/sdk/python/pulumi_azure/dns/get_a_record.py @@ -175,9 +175,6 @@ def get_a_record(name: Optional[str] = None, target_resource_id=pulumi.get(__ret__, 'target_resource_id'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_a_record) def get_a_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -200,4 +197,19 @@ def get_a_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getARecord:getARecord', __args__, opts=opts, typ=GetARecordResult) + return __ret__.apply(lambda __response__: GetARecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + target_resource_id=pulumi.get(__response__, 'target_resource_id'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_aaaa_record.py b/sdk/python/pulumi_azure/dns/get_aaaa_record.py index fe6e55291a..57d10b6f62 100644 --- a/sdk/python/pulumi_azure/dns/get_aaaa_record.py +++ b/sdk/python/pulumi_azure/dns/get_aaaa_record.py @@ -175,9 +175,6 @@ def get_aaaa_record(name: Optional[str] = None, target_resource_id=pulumi.get(__ret__, 'target_resource_id'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_aaaa_record) def get_aaaa_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -200,4 +197,19 @@ def get_aaaa_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getAAAARecord:getAAAARecord', __args__, opts=opts, typ=GetAAAARecordResult) + return __ret__.apply(lambda __response__: GetAAAARecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + target_resource_id=pulumi.get(__response__, 'target_resource_id'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_caa_record.py b/sdk/python/pulumi_azure/dns/get_caa_record.py index b3e5dcc68e..ce4a3a9d1f 100644 --- a/sdk/python/pulumi_azure/dns/get_caa_record.py +++ b/sdk/python/pulumi_azure/dns/get_caa_record.py @@ -163,9 +163,6 @@ def get_caa_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_caa_record) def get_caa_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -188,4 +185,18 @@ def get_caa_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getCAARecord:getCAARecord', __args__, opts=opts, typ=GetCAARecordResult) + return __ret__.apply(lambda __response__: GetCAARecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_cname_record.py b/sdk/python/pulumi_azure/dns/get_cname_record.py index 6014dd7094..d3fc1b471c 100644 --- a/sdk/python/pulumi_azure/dns/get_cname_record.py +++ b/sdk/python/pulumi_azure/dns/get_cname_record.py @@ -175,9 +175,6 @@ def get_cname_record(name: Optional[str] = None, target_resource_id=pulumi.get(__ret__, 'target_resource_id'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_cname_record) def get_cname_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -200,4 +197,19 @@ def get_cname_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getCnameRecord:getCnameRecord', __args__, opts=opts, typ=GetCnameRecordResult) + return __ret__.apply(lambda __response__: GetCnameRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + record=pulumi.get(__response__, 'record'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + target_resource_id=pulumi.get(__response__, 'target_resource_id'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_mx_record.py b/sdk/python/pulumi_azure/dns/get_mx_record.py index de9ca41b84..60da305497 100644 --- a/sdk/python/pulumi_azure/dns/get_mx_record.py +++ b/sdk/python/pulumi_azure/dns/get_mx_record.py @@ -163,9 +163,6 @@ def get_mx_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_mx_record) def get_mx_record_output(name: Optional[pulumi.Input[Optional[str]]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -188,4 +185,18 @@ def get_mx_record_output(name: Optional[pulumi.Input[Optional[str]]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getMxRecord:getMxRecord', __args__, opts=opts, typ=GetMxRecordResult) + return __ret__.apply(lambda __response__: GetMxRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_ns_record.py b/sdk/python/pulumi_azure/dns/get_ns_record.py index e7360a15e4..ca7f3ed655 100644 --- a/sdk/python/pulumi_azure/dns/get_ns_record.py +++ b/sdk/python/pulumi_azure/dns/get_ns_record.py @@ -162,9 +162,6 @@ def get_ns_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_ns_record) def get_ns_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -187,4 +184,18 @@ def get_ns_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getNsRecord:getNsRecord', __args__, opts=opts, typ=GetNsRecordResult) + return __ret__.apply(lambda __response__: GetNsRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_ptr_record.py b/sdk/python/pulumi_azure/dns/get_ptr_record.py index 514d9d953f..4638c93f20 100644 --- a/sdk/python/pulumi_azure/dns/get_ptr_record.py +++ b/sdk/python/pulumi_azure/dns/get_ptr_record.py @@ -162,9 +162,6 @@ def get_ptr_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_ptr_record) def get_ptr_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -187,4 +184,18 @@ def get_ptr_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getPtrRecord:getPtrRecord', __args__, opts=opts, typ=GetPtrRecordResult) + return __ret__.apply(lambda __response__: GetPtrRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_soa_record.py b/sdk/python/pulumi_azure/dns/get_soa_record.py index a8f3177e18..602f07bf6f 100644 --- a/sdk/python/pulumi_azure/dns/get_soa_record.py +++ b/sdk/python/pulumi_azure/dns/get_soa_record.py @@ -242,9 +242,6 @@ def get_soa_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_soa_record) def get_soa_record_output(name: Optional[pulumi.Input[Optional[str]]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -266,4 +263,24 @@ def get_soa_record_output(name: Optional[pulumi.Input[Optional[str]]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getSoaRecord:getSoaRecord', __args__, opts=opts, typ=GetSoaRecordResult) + return __ret__.apply(lambda __response__: GetSoaRecordResult( + email=pulumi.get(__response__, 'email'), + expire_time=pulumi.get(__response__, 'expire_time'), + fqdn=pulumi.get(__response__, 'fqdn'), + host_name=pulumi.get(__response__, 'host_name'), + id=pulumi.get(__response__, 'id'), + minimum_ttl=pulumi.get(__response__, 'minimum_ttl'), + name=pulumi.get(__response__, 'name'), + refresh_time=pulumi.get(__response__, 'refresh_time'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + retry_time=pulumi.get(__response__, 'retry_time'), + serial_number=pulumi.get(__response__, 'serial_number'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_srv_record.py b/sdk/python/pulumi_azure/dns/get_srv_record.py index dd776ac67e..f8640db32f 100644 --- a/sdk/python/pulumi_azure/dns/get_srv_record.py +++ b/sdk/python/pulumi_azure/dns/get_srv_record.py @@ -163,9 +163,6 @@ def get_srv_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_srv_record) def get_srv_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -188,4 +185,18 @@ def get_srv_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getSrvRecord:getSrvRecord', __args__, opts=opts, typ=GetSrvRecordResult) + return __ret__.apply(lambda __response__: GetSrvRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_txt_record.py b/sdk/python/pulumi_azure/dns/get_txt_record.py index 0b909bae95..4c9644a76d 100644 --- a/sdk/python/pulumi_azure/dns/get_txt_record.py +++ b/sdk/python/pulumi_azure/dns/get_txt_record.py @@ -163,9 +163,6 @@ def get_txt_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_txt_record) def get_txt_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -188,4 +185,18 @@ def get_txt_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the DNS Zone (parent resource) exists. :param str zone_name: Specifies the DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getTxtRecord:getTxtRecord', __args__, opts=opts, typ=GetTxtRecordResult) + return __ret__.apply(lambda __response__: GetTxtRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/dns/get_zone.py b/sdk/python/pulumi_azure/dns/get_zone.py index 96c3bb3bd6..7aa58b9514 100644 --- a/sdk/python/pulumi_azure/dns/get_zone.py +++ b/sdk/python/pulumi_azure/dns/get_zone.py @@ -152,9 +152,6 @@ def get_zone(name: Optional[str] = None, number_of_record_sets=pulumi.get(__ret__, 'number_of_record_sets'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_zone) def get_zone_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetZoneResult]: @@ -178,4 +175,16 @@ def get_zone_output(name: Optional[pulumi.Input[str]] = None, If the Name of the Resource Group is not provided, the first DNS Zone from the list of DNS Zones in your subscription that matches `name` will be returned. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:dns/getZone:getZone', __args__, opts=opts, typ=GetZoneResult) + return __ret__.apply(lambda __response__: GetZoneResult( + id=pulumi.get(__response__, 'id'), + max_number_of_record_sets=pulumi.get(__response__, 'max_number_of_record_sets'), + name=pulumi.get(__response__, 'name'), + name_servers=pulumi.get(__response__, 'name_servers'), + number_of_record_sets=pulumi.get(__response__, 'number_of_record_sets'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/domainservices/get_service.py b/sdk/python/pulumi_azure/domainservices/get_service.py index b813293937..25fbfb8474 100644 --- a/sdk/python/pulumi_azure/domainservices/get_service.py +++ b/sdk/python/pulumi_azure/domainservices/get_service.py @@ -286,9 +286,6 @@ def get_service(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), tenant_id=pulumi.get(__ret__, 'tenant_id'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_service) def get_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -313,4 +310,28 @@ def get_service_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group in which the Domain Service should exist. Changing this forces a new resource to be created. :param Mapping[str, str] tags: A mapping of tags assigned to the resource. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:domainservices/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + deployment_id=pulumi.get(__response__, 'deployment_id'), + domain_configuration_type=pulumi.get(__response__, 'domain_configuration_type'), + domain_name=pulumi.get(__response__, 'domain_name'), + filtered_sync_enabled=pulumi.get(__response__, 'filtered_sync_enabled'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + notifications=pulumi.get(__response__, 'notifications'), + replica_sets=pulumi.get(__response__, 'replica_sets'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + resource_id=pulumi.get(__response__, 'resource_id'), + secure_ldaps=pulumi.get(__response__, 'secure_ldaps'), + securities=pulumi.get(__response__, 'securities'), + sku=pulumi.get(__response__, 'sku'), + sync_owner=pulumi.get(__response__, 'sync_owner'), + tags=pulumi.get(__response__, 'tags'), + tenant_id=pulumi.get(__response__, 'tenant_id'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_azure/elasticcloud/get_elasticsearch.py b/sdk/python/pulumi_azure/elasticcloud/get_elasticsearch.py index 0deab05cd8..544b6e3b71 100644 --- a/sdk/python/pulumi_azure/elasticcloud/get_elasticsearch.py +++ b/sdk/python/pulumi_azure/elasticcloud/get_elasticsearch.py @@ -263,9 +263,6 @@ def get_elasticsearch(logs: Optional[Sequence[Union['GetElasticsearchLogArgs', ' resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_elasticsearch) def get_elasticsearch_output(logs: Optional[pulumi.Input[Optional[Sequence[Union['GetElasticsearchLogArgs', 'GetElasticsearchLogArgsDict']]]]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -290,4 +287,25 @@ def get_elasticsearch_output(logs: Optional[pulumi.Input[Optional[Sequence[Union :param str name: The name of the Elasticsearch resource. :param str resource_group_name: The name of the resource group in which the Elasticsearch exists. """ - ... + __args__ = dict() + __args__['logs'] = logs + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:elasticcloud/getElasticsearch:getElasticsearch', __args__, opts=opts, typ=GetElasticsearchResult) + return __ret__.apply(lambda __response__: GetElasticsearchResult( + elastic_cloud_deployment_id=pulumi.get(__response__, 'elastic_cloud_deployment_id'), + elastic_cloud_email_address=pulumi.get(__response__, 'elastic_cloud_email_address'), + elastic_cloud_sso_default_url=pulumi.get(__response__, 'elastic_cloud_sso_default_url'), + elastic_cloud_user_id=pulumi.get(__response__, 'elastic_cloud_user_id'), + elasticsearch_service_url=pulumi.get(__response__, 'elasticsearch_service_url'), + id=pulumi.get(__response__, 'id'), + kibana_service_url=pulumi.get(__response__, 'kibana_service_url'), + kibana_sso_uri=pulumi.get(__response__, 'kibana_sso_uri'), + location=pulumi.get(__response__, 'location'), + logs=pulumi.get(__response__, 'logs'), + monitoring_enabled=pulumi.get(__response__, 'monitoring_enabled'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/elasticsan/get.py b/sdk/python/pulumi_azure/elasticsan/get.py index f9e4afee07..affdec30c6 100644 --- a/sdk/python/pulumi_azure/elasticsan/get.py +++ b/sdk/python/pulumi_azure/elasticsan/get.py @@ -245,9 +245,6 @@ def get(name: Optional[str] = None, total_volume_size_in_gib=pulumi.get(__ret__, 'total_volume_size_in_gib'), volume_group_count=pulumi.get(__ret__, 'volume_group_count'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get) def get_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResult]: @@ -269,4 +266,23 @@ def get_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Elastic SAN. :param str resource_group_name: The name of the Resource Group where the Elastic SAN exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:elasticsan/get:get', __args__, opts=opts, typ=GetResult) + return __ret__.apply(lambda __response__: GetResult( + base_size_in_tib=pulumi.get(__response__, 'base_size_in_tib'), + extended_size_in_tib=pulumi.get(__response__, 'extended_size_in_tib'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + skus=pulumi.get(__response__, 'skus'), + tags=pulumi.get(__response__, 'tags'), + total_iops=pulumi.get(__response__, 'total_iops'), + total_mbps=pulumi.get(__response__, 'total_mbps'), + total_size_in_tib=pulumi.get(__response__, 'total_size_in_tib'), + total_volume_size_in_gib=pulumi.get(__response__, 'total_volume_size_in_gib'), + volume_group_count=pulumi.get(__response__, 'volume_group_count'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/elasticsan/get_volume_group.py b/sdk/python/pulumi_azure/elasticsan/get_volume_group.py index c4d09919e5..7a71833c07 100644 --- a/sdk/python/pulumi_azure/elasticsan/get_volume_group.py +++ b/sdk/python/pulumi_azure/elasticsan/get_volume_group.py @@ -166,9 +166,6 @@ def get_volume_group(elastic_san_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), network_rules=pulumi.get(__ret__, 'network_rules'), protocol_type=pulumi.get(__ret__, 'protocol_type')) - - -@_utilities.lift_output_func(get_volume_group) def get_volume_group_output(elastic_san_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVolumeGroupResult]: @@ -192,4 +189,17 @@ def get_volume_group_output(elastic_san_id: Optional[pulumi.Input[str]] = None, :param str elastic_san_id: The Elastic SAN ID within which the Elastic SAN Volume Group exists. :param str name: The name of the Elastic SAN Volume Group. """ - ... + __args__ = dict() + __args__['elasticSanId'] = elastic_san_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:elasticsan/getVolumeGroup:getVolumeGroup', __args__, opts=opts, typ=GetVolumeGroupResult) + return __ret__.apply(lambda __response__: GetVolumeGroupResult( + elastic_san_id=pulumi.get(__response__, 'elastic_san_id'), + encryption_type=pulumi.get(__response__, 'encryption_type'), + encryptions=pulumi.get(__response__, 'encryptions'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + name=pulumi.get(__response__, 'name'), + network_rules=pulumi.get(__response__, 'network_rules'), + protocol_type=pulumi.get(__response__, 'protocol_type'))) diff --git a/sdk/python/pulumi_azure/elasticsan/get_volume_snapshot.py b/sdk/python/pulumi_azure/elasticsan/get_volume_snapshot.py index 243b05563e..cc84f86e4c 100644 --- a/sdk/python/pulumi_azure/elasticsan/get_volume_snapshot.py +++ b/sdk/python/pulumi_azure/elasticsan/get_volume_snapshot.py @@ -141,9 +141,6 @@ def get_volume_snapshot(name: Optional[str] = None, source_volume_size_in_gib=pulumi.get(__ret__, 'source_volume_size_in_gib'), volume_group_id=pulumi.get(__ret__, 'volume_group_id'), volume_name=pulumi.get(__ret__, 'volume_name')) - - -@_utilities.lift_output_func(get_volume_snapshot) def get_volume_snapshot_output(name: Optional[pulumi.Input[str]] = None, volume_group_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVolumeSnapshotResult]: @@ -169,4 +166,15 @@ def get_volume_snapshot_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Elastic SAN Volume Snapshot. :param str volume_group_id: The Elastic SAN Volume Group ID within which the Elastic SAN Volume Snapshot exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['volumeGroupId'] = volume_group_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:elasticsan/getVolumeSnapshot:getVolumeSnapshot', __args__, opts=opts, typ=GetVolumeSnapshotResult) + return __ret__.apply(lambda __response__: GetVolumeSnapshotResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + source_id=pulumi.get(__response__, 'source_id'), + source_volume_size_in_gib=pulumi.get(__response__, 'source_volume_size_in_gib'), + volume_group_id=pulumi.get(__response__, 'volume_group_id'), + volume_name=pulumi.get(__response__, 'volume_name'))) diff --git a/sdk/python/pulumi_azure/eventgrid/get_domain.py b/sdk/python/pulumi_azure/eventgrid/get_domain.py index 1af22d1681..afc3248608 100644 --- a/sdk/python/pulumi_azure/eventgrid/get_domain.py +++ b/sdk/python/pulumi_azure/eventgrid/get_domain.py @@ -242,9 +242,6 @@ def get_domain(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), secondary_access_key=pulumi.get(__ret__, 'secondary_access_key'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_domain) def get_domain_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDomainResult]: @@ -266,4 +263,23 @@ def get_domain_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the EventGrid Domain resource. :param str resource_group_name: The name of the resource group in which the EventGrid Domain exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventgrid/getDomain:getDomain', __args__, opts=opts, typ=GetDomainResult) + return __ret__.apply(lambda __response__: GetDomainResult( + endpoint=pulumi.get(__response__, 'endpoint'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + inbound_ip_rules=pulumi.get(__response__, 'inbound_ip_rules'), + input_mapping_default_values=pulumi.get(__response__, 'input_mapping_default_values'), + input_mapping_fields=pulumi.get(__response__, 'input_mapping_fields'), + input_schema=pulumi.get(__response__, 'input_schema'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/eventgrid/get_domain_topic.py b/sdk/python/pulumi_azure/eventgrid/get_domain_topic.py index 3e66cb079a..9c52ce36a2 100644 --- a/sdk/python/pulumi_azure/eventgrid/get_domain_topic.py +++ b/sdk/python/pulumi_azure/eventgrid/get_domain_topic.py @@ -113,9 +113,6 @@ def get_domain_topic(domain_name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_domain_topic) def get_domain_topic_output(domain_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -138,4 +135,14 @@ def get_domain_topic_output(domain_name: Optional[pulumi.Input[str]] = None, :param str name: The name of the EventGrid Domain Topic resource. :param str resource_group_name: The name of the resource group in which the EventGrid Domain Topic exists. """ - ... + __args__ = dict() + __args__['domainName'] = domain_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventgrid/getDomainTopic:getDomainTopic', __args__, opts=opts, typ=GetDomainTopicResult) + return __ret__.apply(lambda __response__: GetDomainTopicResult( + domain_name=pulumi.get(__response__, 'domain_name'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/eventgrid/get_system_topic.py b/sdk/python/pulumi_azure/eventgrid/get_system_topic.py index 6ab13bc5b6..bd74cc39d7 100644 --- a/sdk/python/pulumi_azure/eventgrid/get_system_topic.py +++ b/sdk/python/pulumi_azure/eventgrid/get_system_topic.py @@ -173,9 +173,6 @@ def get_system_topic(name: Optional[str] = None, source_arm_resource_id=pulumi.get(__ret__, 'source_arm_resource_id'), tags=pulumi.get(__ret__, 'tags'), topic_type=pulumi.get(__ret__, 'topic_type')) - - -@_utilities.lift_output_func(get_system_topic) def get_system_topic_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSystemTopicResult]: @@ -196,4 +193,18 @@ def get_system_topic_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the EventGrid System Topic resource. :param str resource_group_name: The name of the resource group in which the EventGrid System Topic exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventgrid/getSystemTopic:getSystemTopic', __args__, opts=opts, typ=GetSystemTopicResult) + return __ret__.apply(lambda __response__: GetSystemTopicResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + metric_arm_resource_id=pulumi.get(__response__, 'metric_arm_resource_id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + source_arm_resource_id=pulumi.get(__response__, 'source_arm_resource_id'), + tags=pulumi.get(__response__, 'tags'), + topic_type=pulumi.get(__response__, 'topic_type'))) diff --git a/sdk/python/pulumi_azure/eventgrid/get_topic.py b/sdk/python/pulumi_azure/eventgrid/get_topic.py index 0a8b2a60ea..415587ba88 100644 --- a/sdk/python/pulumi_azure/eventgrid/get_topic.py +++ b/sdk/python/pulumi_azure/eventgrid/get_topic.py @@ -156,9 +156,6 @@ def get_topic(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), secondary_access_key=pulumi.get(__ret__, 'secondary_access_key'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_topic) def get_topic_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetTopicResult]: @@ -179,4 +176,17 @@ def get_topic_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the EventGrid Topic resource. :param str resource_group_name: The name of the resource group in which the EventGrid Topic exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventgrid/getTopic:getTopic', __args__, opts=opts, typ=GetTopicResult) + return __ret__.apply(lambda __response__: GetTopicResult( + endpoint=pulumi.get(__response__, 'endpoint'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_authorization_rule.py b/sdk/python/pulumi_azure/eventhub/get_authorization_rule.py index bd341854c4..b44d4253b9 100644 --- a/sdk/python/pulumi_azure/eventhub/get_authorization_rule.py +++ b/sdk/python/pulumi_azure/eventhub/get_authorization_rule.py @@ -239,9 +239,6 @@ def get_authorization_rule(eventhub_name: Optional[str] = None, secondary_connection_string_alias=pulumi.get(__ret__, 'secondary_connection_string_alias'), secondary_key=pulumi.get(__ret__, 'secondary_key'), send=pulumi.get(__ret__, 'send')) - - -@_utilities.lift_output_func(get_authorization_rule) def get_authorization_rule_output(eventhub_name: Optional[pulumi.Input[str]] = None, listen: Optional[pulumi.Input[Optional[bool]]] = None, manage: Optional[pulumi.Input[Optional[bool]]] = None, @@ -271,4 +268,28 @@ def get_authorization_rule_output(eventhub_name: Optional[pulumi.Input[str]] = N :param str namespace_name: Specifies the name of the grandparent EventHub Namespace. :param str resource_group_name: The name of the resource group in which the EventHub Authorization Rule's grandparent Namespace exists. """ - ... + __args__ = dict() + __args__['eventhubName'] = eventhub_name + __args__['listen'] = listen + __args__['manage'] = manage + __args__['name'] = name + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + __args__['send'] = send + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getAuthorizationRule:getAuthorizationRule', __args__, opts=opts, typ=GetAuthorizationRuleResult) + return __ret__.apply(lambda __response__: GetAuthorizationRuleResult( + eventhub_name=pulumi.get(__response__, 'eventhub_name'), + id=pulumi.get(__response__, 'id'), + listen=pulumi.get(__response__, 'listen'), + manage=pulumi.get(__response__, 'manage'), + name=pulumi.get(__response__, 'name'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_connection_string_alias=pulumi.get(__response__, 'primary_connection_string_alias'), + primary_key=pulumi.get(__response__, 'primary_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_connection_string_alias=pulumi.get(__response__, 'secondary_connection_string_alias'), + secondary_key=pulumi.get(__response__, 'secondary_key'), + send=pulumi.get(__response__, 'send'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_cluster.py b/sdk/python/pulumi_azure/eventhub/get_cluster.py index 7c0d908f6f..d94370b418 100644 --- a/sdk/python/pulumi_azure/eventhub/get_cluster.py +++ b/sdk/python/pulumi_azure/eventhub/get_cluster.py @@ -124,9 +124,6 @@ def get_cluster(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku_name=pulumi.get(__ret__, 'sku_name')) - - -@_utilities.lift_output_func(get_cluster) def get_cluster_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetClusterResult]: @@ -148,4 +145,14 @@ def get_cluster_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this EventHub Cluster. :param str resource_group_name: The name of the Resource Group where the EventHub Cluster exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getCluster:getCluster', __args__, opts=opts, typ=GetClusterResult) + return __ret__.apply(lambda __response__: GetClusterResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_consume_group.py b/sdk/python/pulumi_azure/eventhub/get_consume_group.py index 0f6180c2a7..2ac63e5672 100644 --- a/sdk/python/pulumi_azure/eventhub/get_consume_group.py +++ b/sdk/python/pulumi_azure/eventhub/get_consume_group.py @@ -138,9 +138,6 @@ def get_consume_group(eventhub_name: Optional[str] = None, namespace_name=pulumi.get(__ret__, 'namespace_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), user_metadata=pulumi.get(__ret__, 'user_metadata')) - - -@_utilities.lift_output_func(get_consume_group) def get_consume_group_output(eventhub_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, namespace_name: Optional[pulumi.Input[str]] = None, @@ -167,4 +164,17 @@ def get_consume_group_output(eventhub_name: Optional[pulumi.Input[str]] = None, :param str namespace_name: Specifies the name of the grandparent EventHub Namespace. :param str resource_group_name: The name of the resource group in which the EventHub Consumer Group's grandparent Namespace exists. """ - ... + __args__ = dict() + __args__['eventhubName'] = eventhub_name + __args__['name'] = name + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getConsumeGroup:getConsumeGroup', __args__, opts=opts, typ=GetConsumeGroupResult) + return __ret__.apply(lambda __response__: GetConsumeGroupResult( + eventhub_name=pulumi.get(__response__, 'eventhub_name'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + user_metadata=pulumi.get(__response__, 'user_metadata'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_event_hub.py b/sdk/python/pulumi_azure/eventhub/get_event_hub.py index 175f0cc1b4..7dbc12017d 100644 --- a/sdk/python/pulumi_azure/eventhub/get_event_hub.py +++ b/sdk/python/pulumi_azure/eventhub/get_event_hub.py @@ -138,9 +138,6 @@ def get_event_hub(name: Optional[str] = None, partition_count=pulumi.get(__ret__, 'partition_count'), partition_ids=pulumi.get(__ret__, 'partition_ids'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_event_hub) def get_event_hub_output(name: Optional[pulumi.Input[str]] = None, namespace_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -165,4 +162,16 @@ def get_event_hub_output(name: Optional[pulumi.Input[str]] = None, :param str namespace_name: The name of the EventHub Namespace where the EventHub exists. :param str resource_group_name: The name of the Resource Group where the EventHub exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getEventHub:getEventHub', __args__, opts=opts, typ=GetEventHubResult) + return __ret__.apply(lambda __response__: GetEventHubResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + partition_count=pulumi.get(__response__, 'partition_count'), + partition_ids=pulumi.get(__response__, 'partition_ids'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_eventhub_namespace.py b/sdk/python/pulumi_azure/eventhub/get_eventhub_namespace.py index 9eb338cd04..79f5397368 100644 --- a/sdk/python/pulumi_azure/eventhub/get_eventhub_namespace.py +++ b/sdk/python/pulumi_azure/eventhub/get_eventhub_namespace.py @@ -284,9 +284,6 @@ def get_eventhub_namespace(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_eventhub_namespace) def get_eventhub_namespace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEventhubNamespaceResult]: @@ -309,4 +306,26 @@ def get_eventhub_namespace_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group where the EventHub Namespace exists. """ pulumi.log.warn("""get_eventhub_namespace is deprecated: azure.eventhub.getEventhubNamespace has been deprecated in favor of azure.eventhub.getNamespace""") - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getEventhubNamespace:getEventhubNamespace', __args__, opts=opts, typ=GetEventhubNamespaceResult) + return __ret__.apply(lambda __response__: GetEventhubNamespaceResult( + auto_inflate_enabled=pulumi.get(__response__, 'auto_inflate_enabled'), + capacity=pulumi.get(__response__, 'capacity'), + dedicated_cluster_id=pulumi.get(__response__, 'dedicated_cluster_id'), + default_primary_connection_string=pulumi.get(__response__, 'default_primary_connection_string'), + default_primary_connection_string_alias=pulumi.get(__response__, 'default_primary_connection_string_alias'), + default_primary_key=pulumi.get(__response__, 'default_primary_key'), + default_secondary_connection_string=pulumi.get(__response__, 'default_secondary_connection_string'), + default_secondary_connection_string_alias=pulumi.get(__response__, 'default_secondary_connection_string_alias'), + default_secondary_key=pulumi.get(__response__, 'default_secondary_key'), + id=pulumi.get(__response__, 'id'), + kafka_enabled=pulumi.get(__response__, 'kafka_enabled'), + location=pulumi.get(__response__, 'location'), + maximum_throughput_units=pulumi.get(__response__, 'maximum_throughput_units'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_namespace.py b/sdk/python/pulumi_azure/eventhub/get_namespace.py index 7d5a7a6a07..f9f2526884 100644 --- a/sdk/python/pulumi_azure/eventhub/get_namespace.py +++ b/sdk/python/pulumi_azure/eventhub/get_namespace.py @@ -281,9 +281,6 @@ def get_namespace(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_namespace) def get_namespace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]: @@ -305,4 +302,26 @@ def get_namespace_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the EventHub Namespace. :param str resource_group_name: The Name of the Resource Group where the EventHub Namespace exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult) + return __ret__.apply(lambda __response__: GetNamespaceResult( + auto_inflate_enabled=pulumi.get(__response__, 'auto_inflate_enabled'), + capacity=pulumi.get(__response__, 'capacity'), + dedicated_cluster_id=pulumi.get(__response__, 'dedicated_cluster_id'), + default_primary_connection_string=pulumi.get(__response__, 'default_primary_connection_string'), + default_primary_connection_string_alias=pulumi.get(__response__, 'default_primary_connection_string_alias'), + default_primary_key=pulumi.get(__response__, 'default_primary_key'), + default_secondary_connection_string=pulumi.get(__response__, 'default_secondary_connection_string'), + default_secondary_connection_string_alias=pulumi.get(__response__, 'default_secondary_connection_string_alias'), + default_secondary_key=pulumi.get(__response__, 'default_secondary_key'), + id=pulumi.get(__response__, 'id'), + kafka_enabled=pulumi.get(__response__, 'kafka_enabled'), + location=pulumi.get(__response__, 'location'), + maximum_throughput_units=pulumi.get(__response__, 'maximum_throughput_units'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_namespace_authorization_rule.py b/sdk/python/pulumi_azure/eventhub/get_namespace_authorization_rule.py index 975ab54a0d..d2278a3710 100644 --- a/sdk/python/pulumi_azure/eventhub/get_namespace_authorization_rule.py +++ b/sdk/python/pulumi_azure/eventhub/get_namespace_authorization_rule.py @@ -229,9 +229,6 @@ def get_namespace_authorization_rule(name: Optional[str] = None, secondary_connection_string_alias=pulumi.get(__ret__, 'secondary_connection_string_alias'), secondary_key=pulumi.get(__ret__, 'secondary_key'), send=pulumi.get(__ret__, 'send')) - - -@_utilities.lift_output_func(get_namespace_authorization_rule) def get_namespace_authorization_rule_output(name: Optional[pulumi.Input[str]] = None, namespace_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -256,4 +253,23 @@ def get_namespace_authorization_rule_output(name: Optional[pulumi.Input[str]] = :param str namespace_name: Specifies the name of the EventHub Namespace. :param str resource_group_name: The name of the resource group in which the EventHub Namespace exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getNamespaceAuthorizationRule:getNamespaceAuthorizationRule', __args__, opts=opts, typ=GetNamespaceAuthorizationRuleResult) + return __ret__.apply(lambda __response__: GetNamespaceAuthorizationRuleResult( + id=pulumi.get(__response__, 'id'), + listen=pulumi.get(__response__, 'listen'), + manage=pulumi.get(__response__, 'manage'), + name=pulumi.get(__response__, 'name'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_connection_string_alias=pulumi.get(__response__, 'primary_connection_string_alias'), + primary_key=pulumi.get(__response__, 'primary_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_connection_string_alias=pulumi.get(__response__, 'secondary_connection_string_alias'), + secondary_key=pulumi.get(__response__, 'secondary_key'), + send=pulumi.get(__response__, 'send'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_sas.py b/sdk/python/pulumi_azure/eventhub/get_sas.py index f972dd427d..a125a409f4 100644 --- a/sdk/python/pulumi_azure/eventhub/get_sas.py +++ b/sdk/python/pulumi_azure/eventhub/get_sas.py @@ -136,9 +136,6 @@ def get_sas(connection_string: Optional[str] = None, expiry=pulumi.get(__ret__, 'expiry'), id=pulumi.get(__ret__, 'id'), sas=pulumi.get(__ret__, 'sas')) - - -@_utilities.lift_output_func(get_sas) def get_sas_output(connection_string: Optional[pulumi.Input[str]] = None, expiry: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSasResult]: @@ -185,4 +182,13 @@ def get_sas_output(connection_string: Optional[pulumi.Input[str]] = None, :param str connection_string: The connection string for the Event Hub to which this SAS applies. :param str expiry: The expiration time and date of this SAS. Must be a valid ISO-8601 format time/date string. """ - ... + __args__ = dict() + __args__['connectionString'] = connection_string + __args__['expiry'] = expiry + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getSas:getSas', __args__, opts=opts, typ=GetSasResult) + return __ret__.apply(lambda __response__: GetSasResult( + connection_string=pulumi.get(__response__, 'connection_string'), + expiry=pulumi.get(__response__, 'expiry'), + id=pulumi.get(__response__, 'id'), + sas=pulumi.get(__response__, 'sas'))) diff --git a/sdk/python/pulumi_azure/eventhub/get_service_bus_namespace.py b/sdk/python/pulumi_azure/eventhub/get_service_bus_namespace.py index 170b2b8b70..17b112d968 100644 --- a/sdk/python/pulumi_azure/eventhub/get_service_bus_namespace.py +++ b/sdk/python/pulumi_azure/eventhub/get_service_bus_namespace.py @@ -233,9 +233,6 @@ def get_service_bus_namespace(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_service_bus_namespace) def get_service_bus_namespace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceBusNamespaceResult]: @@ -258,4 +255,22 @@ def get_service_bus_namespace_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the name of the Resource Group where the ServiceBus Namespace exists. """ pulumi.log.warn("""get_service_bus_namespace is deprecated: azure.eventhub.getServiceBusNamespace has been deprecated in favor of azure.servicebus.getNamespace""") - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:eventhub/getServiceBusNamespace:getServiceBusNamespace', __args__, opts=opts, typ=GetServiceBusNamespaceResult) + return __ret__.apply(lambda __response__: GetServiceBusNamespaceResult( + capacity=pulumi.get(__response__, 'capacity'), + default_primary_connection_string=pulumi.get(__response__, 'default_primary_connection_string'), + default_primary_key=pulumi.get(__response__, 'default_primary_key'), + default_secondary_connection_string=pulumi.get(__response__, 'default_secondary_connection_string'), + default_secondary_key=pulumi.get(__response__, 'default_secondary_key'), + endpoint=pulumi.get(__response__, 'endpoint'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + premium_messaging_partitions=pulumi.get(__response__, 'premium_messaging_partitions'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/expressroute/get_circuit_peering.py b/sdk/python/pulumi_azure/expressroute/get_circuit_peering.py index 1d61b01298..712aad4adf 100644 --- a/sdk/python/pulumi_azure/expressroute/get_circuit_peering.py +++ b/sdk/python/pulumi_azure/expressroute/get_circuit_peering.py @@ -245,9 +245,6 @@ def get_circuit_peering(express_route_circuit_name: Optional[str] = None, secondary_peer_address_prefix=pulumi.get(__ret__, 'secondary_peer_address_prefix'), shared_key=pulumi.get(__ret__, 'shared_key'), vlan_id=pulumi.get(__ret__, 'vlan_id')) - - -@_utilities.lift_output_func(get_circuit_peering) def get_circuit_peering_output(express_route_circuit_name: Optional[pulumi.Input[str]] = None, peering_type: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -271,4 +268,25 @@ def get_circuit_peering_output(express_route_circuit_name: Optional[pulumi.Input :param str peering_type: The type of the ExpressRoute Circuit Peering. Acceptable values include `AzurePrivatePeering`, `AzurePublicPeering` and `MicrosoftPeering`. :param str resource_group_name: The name of the resource group in which to create the Express Route Circuit Peering. Changing this forces a new resource to be created. """ - ... + __args__ = dict() + __args__['expressRouteCircuitName'] = express_route_circuit_name + __args__['peeringType'] = peering_type + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:expressroute/getCircuitPeering:getCircuitPeering', __args__, opts=opts, typ=GetCircuitPeeringResult) + return __ret__.apply(lambda __response__: GetCircuitPeeringResult( + azure_asn=pulumi.get(__response__, 'azure_asn'), + express_route_circuit_name=pulumi.get(__response__, 'express_route_circuit_name'), + gateway_manager_etag=pulumi.get(__response__, 'gateway_manager_etag'), + id=pulumi.get(__response__, 'id'), + ipv4_enabled=pulumi.get(__response__, 'ipv4_enabled'), + peer_asn=pulumi.get(__response__, 'peer_asn'), + peering_type=pulumi.get(__response__, 'peering_type'), + primary_azure_port=pulumi.get(__response__, 'primary_azure_port'), + primary_peer_address_prefix=pulumi.get(__response__, 'primary_peer_address_prefix'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + route_filter_id=pulumi.get(__response__, 'route_filter_id'), + secondary_azure_port=pulumi.get(__response__, 'secondary_azure_port'), + secondary_peer_address_prefix=pulumi.get(__response__, 'secondary_peer_address_prefix'), + shared_key=pulumi.get(__response__, 'shared_key'), + vlan_id=pulumi.get(__response__, 'vlan_id'))) diff --git a/sdk/python/pulumi_azure/hdinsight/get_cluster.py b/sdk/python/pulumi_azure/hdinsight/get_cluster.py index 5e719f93ec..6645d30d1c 100644 --- a/sdk/python/pulumi_azure/hdinsight/get_cluster.py +++ b/sdk/python/pulumi_azure/hdinsight/get_cluster.py @@ -272,9 +272,6 @@ def get_cluster(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), tier=pulumi.get(__ret__, 'tier'), tls_min_version=pulumi.get(__ret__, 'tls_min_version')) - - -@_utilities.lift_output_func(get_cluster) def get_cluster_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetClusterResult]: @@ -297,4 +294,25 @@ def get_cluster_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of this HDInsight Cluster. :param str resource_group_name: Specifies the name of the Resource Group in which this HDInsight Cluster exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:hdinsight/getCluster:getCluster', __args__, opts=opts, typ=GetClusterResult) + return __ret__.apply(lambda __response__: GetClusterResult( + cluster_id=pulumi.get(__response__, 'cluster_id'), + cluster_version=pulumi.get(__response__, 'cluster_version'), + component_versions=pulumi.get(__response__, 'component_versions'), + edge_ssh_endpoint=pulumi.get(__response__, 'edge_ssh_endpoint'), + gateways=pulumi.get(__response__, 'gateways'), + https_endpoint=pulumi.get(__response__, 'https_endpoint'), + id=pulumi.get(__response__, 'id'), + kafka_rest_proxy_endpoint=pulumi.get(__response__, 'kafka_rest_proxy_endpoint'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + ssh_endpoint=pulumi.get(__response__, 'ssh_endpoint'), + tags=pulumi.get(__response__, 'tags'), + tier=pulumi.get(__response__, 'tier'), + tls_min_version=pulumi.get(__response__, 'tls_min_version'))) diff --git a/sdk/python/pulumi_azure/healthcare/get_dicom_service.py b/sdk/python/pulumi_azure/healthcare/get_dicom_service.py index 79b1504060..f75a9e8f77 100644 --- a/sdk/python/pulumi_azure/healthcare/get_dicom_service.py +++ b/sdk/python/pulumi_azure/healthcare/get_dicom_service.py @@ -171,9 +171,6 @@ def get_dicom_service(name: Optional[str] = None, service_url=pulumi.get(__ret__, 'service_url'), tags=pulumi.get(__ret__, 'tags'), workspace_id=pulumi.get(__ret__, 'workspace_id')) - - -@_utilities.lift_output_func(get_dicom_service) def get_dicom_service_output(name: Optional[pulumi.Input[str]] = None, workspace_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDicomServiceResult]: @@ -195,4 +192,18 @@ def get_dicom_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Healthcare DICOM Service :param str workspace_id: The id of the Healthcare Workspace in which the Healthcare DICOM Service exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['workspaceId'] = workspace_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:healthcare/getDicomService:getDicomService', __args__, opts=opts, typ=GetDicomServiceResult) + return __ret__.apply(lambda __response__: GetDicomServiceResult( + authentications=pulumi.get(__response__, 'authentications'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + private_endpoints=pulumi.get(__response__, 'private_endpoints'), + service_url=pulumi.get(__response__, 'service_url'), + tags=pulumi.get(__response__, 'tags'), + workspace_id=pulumi.get(__response__, 'workspace_id'))) diff --git a/sdk/python/pulumi_azure/healthcare/get_fhir_service.py b/sdk/python/pulumi_azure/healthcare/get_fhir_service.py index 85e5ced72a..0d5d264c10 100644 --- a/sdk/python/pulumi_azure/healthcare/get_fhir_service.py +++ b/sdk/python/pulumi_azure/healthcare/get_fhir_service.py @@ -208,9 +208,6 @@ def get_fhir_service(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), tags=pulumi.get(__ret__, 'tags'), workspace_id=pulumi.get(__ret__, 'workspace_id')) - - -@_utilities.lift_output_func(get_fhir_service) def get_fhir_service_output(name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, workspace_id: Optional[pulumi.Input[str]] = None, @@ -223,4 +220,22 @@ def get_fhir_service_output(name: Optional[pulumi.Input[str]] = None, :param Mapping[str, str] tags: The map of tags assigned to the Healthcare FHIR Service. :param str workspace_id: The id of the Healthcare Workspace in which the Healthcare FHIR Service exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['tags'] = tags + __args__['workspaceId'] = workspace_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:healthcare/getFhirService:getFhirService', __args__, opts=opts, typ=GetFhirServiceResult) + return __ret__.apply(lambda __response__: GetFhirServiceResult( + access_policy_object_ids=pulumi.get(__response__, 'access_policy_object_ids'), + authentications=pulumi.get(__response__, 'authentications'), + configuration_export_storage_account_name=pulumi.get(__response__, 'configuration_export_storage_account_name'), + container_registry_login_server_urls=pulumi.get(__response__, 'container_registry_login_server_urls'), + cors=pulumi.get(__response__, 'cors'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + tags=pulumi.get(__response__, 'tags'), + workspace_id=pulumi.get(__response__, 'workspace_id'))) diff --git a/sdk/python/pulumi_azure/healthcare/get_medtech_service.py b/sdk/python/pulumi_azure/healthcare/get_medtech_service.py index 62978ab29e..1eee18615d 100644 --- a/sdk/python/pulumi_azure/healthcare/get_medtech_service.py +++ b/sdk/python/pulumi_azure/healthcare/get_medtech_service.py @@ -164,9 +164,6 @@ def get_medtech_service(name: Optional[str] = None, identities=pulumi.get(__ret__, 'identities'), name=pulumi.get(__ret__, 'name'), workspace_id=pulumi.get(__ret__, 'workspace_id')) - - -@_utilities.lift_output_func(get_medtech_service) def get_medtech_service_output(name: Optional[pulumi.Input[str]] = None, workspace_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetMedtechServiceResult]: @@ -188,4 +185,17 @@ def get_medtech_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Healthcare Med Tech Service. :param str workspace_id: The id of the Healthcare Workspace in which the Healthcare Med Tech Service exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['workspaceId'] = workspace_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:healthcare/getMedtechService:getMedtechService', __args__, opts=opts, typ=GetMedtechServiceResult) + return __ret__.apply(lambda __response__: GetMedtechServiceResult( + device_mapping_json=pulumi.get(__response__, 'device_mapping_json'), + eventhub_consumer_group_name=pulumi.get(__response__, 'eventhub_consumer_group_name'), + eventhub_name=pulumi.get(__response__, 'eventhub_name'), + eventhub_namespace_name=pulumi.get(__response__, 'eventhub_namespace_name'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + name=pulumi.get(__response__, 'name'), + workspace_id=pulumi.get(__response__, 'workspace_id'))) diff --git a/sdk/python/pulumi_azure/healthcare/get_service.py b/sdk/python/pulumi_azure/healthcare/get_service.py index bd12293bc2..e101f12546 100644 --- a/sdk/python/pulumi_azure/healthcare/get_service.py +++ b/sdk/python/pulumi_azure/healthcare/get_service.py @@ -204,9 +204,6 @@ def get_service(location: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_service) def get_service_output(location: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -231,4 +228,21 @@ def get_service_output(location: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Healthcare Service. :param str resource_group_name: The name of the Resource Group in which the Healthcare Service exists. """ - ... + __args__ = dict() + __args__['location'] = location + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:healthcare/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + access_policy_object_ids=pulumi.get(__response__, 'access_policy_object_ids'), + authentication_configurations=pulumi.get(__response__, 'authentication_configurations'), + cors_configurations=pulumi.get(__response__, 'cors_configurations'), + cosmosdb_key_vault_key_versionless_id=pulumi.get(__response__, 'cosmosdb_key_vault_key_versionless_id'), + cosmosdb_throughput=pulumi.get(__response__, 'cosmosdb_throughput'), + id=pulumi.get(__response__, 'id'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/healthcare/get_workspace.py b/sdk/python/pulumi_azure/healthcare/get_workspace.py index d0ffeb819e..7109204b47 100644 --- a/sdk/python/pulumi_azure/healthcare/get_workspace.py +++ b/sdk/python/pulumi_azure/healthcare/get_workspace.py @@ -124,9 +124,6 @@ def get_workspace(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_workspace) def get_workspace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWorkspaceResult]: @@ -148,4 +145,14 @@ def get_workspace_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Healthcare Workspace. :param str resource_group_name: The name of the Resource Group in which the Healthcare Workspace exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:healthcare/getWorkspace:getWorkspace', __args__, opts=opts, typ=GetWorkspaceResult) + return __ret__.apply(lambda __response__: GetWorkspaceResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/iot/get_dps.py b/sdk/python/pulumi_azure/iot/get_dps.py index e381f31c61..5cab6c2bf6 100644 --- a/sdk/python/pulumi_azure/iot/get_dps.py +++ b/sdk/python/pulumi_azure/iot/get_dps.py @@ -174,9 +174,6 @@ def get_dps(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), service_operations_host_name=pulumi.get(__ret__, 'service_operations_host_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_dps) def get_dps_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -198,4 +195,19 @@ def get_dps_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Iot Device Provisioning Service resource. :param str resource_group_name: The name of the resource group under which the Iot Device Provisioning Service is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:iot/getDps:getDps', __args__, opts=opts, typ=GetDpsResult) + return __ret__.apply(lambda __response__: GetDpsResult( + allocation_policy=pulumi.get(__response__, 'allocation_policy'), + device_provisioning_host_name=pulumi.get(__response__, 'device_provisioning_host_name'), + id=pulumi.get(__response__, 'id'), + id_scope=pulumi.get(__response__, 'id_scope'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_operations_host_name=pulumi.get(__response__, 'service_operations_host_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/iot/get_dps_shared_access_policy.py b/sdk/python/pulumi_azure/iot/get_dps_shared_access_policy.py index 38edd0eacb..8c2e4a5a0a 100644 --- a/sdk/python/pulumi_azure/iot/get_dps_shared_access_policy.py +++ b/sdk/python/pulumi_azure/iot/get_dps_shared_access_policy.py @@ -163,9 +163,6 @@ def get_dps_shared_access_policy(iothub_dps_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), secondary_connection_string=pulumi.get(__ret__, 'secondary_connection_string'), secondary_key=pulumi.get(__ret__, 'secondary_key')) - - -@_utilities.lift_output_func(get_dps_shared_access_policy) def get_dps_shared_access_policy_output(iothub_dps_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -189,4 +186,18 @@ def get_dps_shared_access_policy_output(iothub_dps_name: Optional[pulumi.Input[s :param str name: Specifies the name of the IotHub Shared Access Policy. :param str resource_group_name: Specifies the name of the resource group under which the IotHub Shared Access Policy resource exists. """ - ... + __args__ = dict() + __args__['iothubDpsName'] = iothub_dps_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:iot/getDpsSharedAccessPolicy:getDpsSharedAccessPolicy', __args__, opts=opts, typ=GetDpsSharedAccessPolicyResult) + return __ret__.apply(lambda __response__: GetDpsSharedAccessPolicyResult( + id=pulumi.get(__response__, 'id'), + iothub_dps_name=pulumi.get(__response__, 'iothub_dps_name'), + name=pulumi.get(__response__, 'name'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_key=pulumi.get(__response__, 'primary_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_key=pulumi.get(__response__, 'secondary_key'))) diff --git a/sdk/python/pulumi_azure/iot/get_iot_hub.py b/sdk/python/pulumi_azure/iot/get_iot_hub.py index 883de1d622..36c5535d65 100644 --- a/sdk/python/pulumi_azure/iot/get_iot_hub.py +++ b/sdk/python/pulumi_azure/iot/get_iot_hub.py @@ -138,9 +138,6 @@ def get_iot_hub(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_iot_hub) def get_iot_hub_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -164,4 +161,16 @@ def get_iot_hub_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the Resource Group where the IoTHub exists. :param Mapping[str, str] tags: A mapping of tags which should be assigned to the IoTHub. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:iot/getIotHub:getIotHub', __args__, opts=opts, typ=GetIotHubResult) + return __ret__.apply(lambda __response__: GetIotHubResult( + hostname=pulumi.get(__response__, 'hostname'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/iot/get_shared_access_policy.py b/sdk/python/pulumi_azure/iot/get_shared_access_policy.py index d2a51ae1d3..f98fc748fe 100644 --- a/sdk/python/pulumi_azure/iot/get_shared_access_policy.py +++ b/sdk/python/pulumi_azure/iot/get_shared_access_policy.py @@ -163,9 +163,6 @@ def get_shared_access_policy(iothub_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), secondary_connection_string=pulumi.get(__ret__, 'secondary_connection_string'), secondary_key=pulumi.get(__ret__, 'secondary_key')) - - -@_utilities.lift_output_func(get_shared_access_policy) def get_shared_access_policy_output(iothub_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -189,4 +186,18 @@ def get_shared_access_policy_output(iothub_name: Optional[pulumi.Input[str]] = N :param str name: Specifies the name of the IotHub Shared Access Policy resource. :param str resource_group_name: The name of the resource group under which the IotHub Shared Access Policy resource has to be created. """ - ... + __args__ = dict() + __args__['iothubName'] = iothub_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:iot/getSharedAccessPolicy:getSharedAccessPolicy', __args__, opts=opts, typ=GetSharedAccessPolicyResult) + return __ret__.apply(lambda __response__: GetSharedAccessPolicyResult( + id=pulumi.get(__response__, 'id'), + iothub_name=pulumi.get(__response__, 'iothub_name'), + name=pulumi.get(__response__, 'name'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_key=pulumi.get(__response__, 'primary_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_key=pulumi.get(__response__, 'secondary_key'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_access_policy.py b/sdk/python/pulumi_azure/keyvault/get_access_policy.py index 2c8f94f3bd..1ebbbc50f4 100644 --- a/sdk/python/pulumi_azure/keyvault/get_access_policy.py +++ b/sdk/python/pulumi_azure/keyvault/get_access_policy.py @@ -125,9 +125,6 @@ def get_access_policy(name: Optional[str] = None, key_permissions=pulumi.get(__ret__, 'key_permissions'), name=pulumi.get(__ret__, 'name'), secret_permissions=pulumi.get(__ret__, 'secret_permissions')) - - -@_utilities.lift_output_func(get_access_policy) def get_access_policy_output(name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessPolicyResult]: """ @@ -148,4 +145,13 @@ def get_access_policy_output(name: Optional[pulumi.Input[str]] = None, `Secret Management`, `Certificate Management`, `Key & Secret Management`, `Key & Certificate Management`, `Secret & Certificate Management`, `Key, Secret, & Certificate Management` """ - ... + __args__ = dict() + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getAccessPolicy:getAccessPolicy', __args__, opts=opts, typ=GetAccessPolicyResult) + return __ret__.apply(lambda __response__: GetAccessPolicyResult( + certificate_permissions=pulumi.get(__response__, 'certificate_permissions'), + id=pulumi.get(__response__, 'id'), + key_permissions=pulumi.get(__response__, 'key_permissions'), + name=pulumi.get(__response__, 'name'), + secret_permissions=pulumi.get(__response__, 'secret_permissions'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_certificate.py b/sdk/python/pulumi_azure/keyvault/get_certificate.py index 2546e591e3..cd554c0f09 100644 --- a/sdk/python/pulumi_azure/keyvault/get_certificate.py +++ b/sdk/python/pulumi_azure/keyvault/get_certificate.py @@ -278,9 +278,6 @@ def get_certificate(key_vault_id: Optional[str] = None, version=pulumi.get(__ret__, 'version'), versionless_id=pulumi.get(__ret__, 'versionless_id'), versionless_secret_id=pulumi.get(__ret__, 'versionless_secret_id')) - - -@_utilities.lift_output_func(get_certificate) def get_certificate_output(key_vault_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, version: Optional[pulumi.Input[Optional[str]]] = None, @@ -308,4 +305,26 @@ def get_certificate_output(key_vault_id: Optional[pulumi.Input[str]] = None, **NOTE:** The vault must be in the same subscription as the provider. If the vault is in another subscription, you must create an aliased provider for that subscription. """ - ... + __args__ = dict() + __args__['keyVaultId'] = key_vault_id + __args__['name'] = name + __args__['version'] = version + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getCertificate:getCertificate', __args__, opts=opts, typ=GetCertificateResult) + return __ret__.apply(lambda __response__: GetCertificateResult( + certificate_data=pulumi.get(__response__, 'certificate_data'), + certificate_data_base64=pulumi.get(__response__, 'certificate_data_base64'), + certificate_policies=pulumi.get(__response__, 'certificate_policies'), + expires=pulumi.get(__response__, 'expires'), + id=pulumi.get(__response__, 'id'), + key_vault_id=pulumi.get(__response__, 'key_vault_id'), + name=pulumi.get(__response__, 'name'), + not_before=pulumi.get(__response__, 'not_before'), + resource_manager_id=pulumi.get(__response__, 'resource_manager_id'), + resource_manager_versionless_id=pulumi.get(__response__, 'resource_manager_versionless_id'), + secret_id=pulumi.get(__response__, 'secret_id'), + tags=pulumi.get(__response__, 'tags'), + thumbprint=pulumi.get(__response__, 'thumbprint'), + version=pulumi.get(__response__, 'version'), + versionless_id=pulumi.get(__response__, 'versionless_id'), + versionless_secret_id=pulumi.get(__response__, 'versionless_secret_id'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_certificate_data.py b/sdk/python/pulumi_azure/keyvault/get_certificate_data.py index 7c9e7570ba..bf5aefbb42 100644 --- a/sdk/python/pulumi_azure/keyvault/get_certificate_data.py +++ b/sdk/python/pulumi_azure/keyvault/get_certificate_data.py @@ -208,9 +208,6 @@ def get_certificate_data(key_vault_id: Optional[str] = None, pem=pulumi.get(__ret__, 'pem'), tags=pulumi.get(__ret__, 'tags'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_certificate_data) def get_certificate_data_output(key_vault_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, version: Optional[pulumi.Input[Optional[str]]] = None, @@ -240,4 +237,21 @@ def get_certificate_data_output(key_vault_id: Optional[pulumi.Input[str]] = None > **NOTE:** The vault must be in the same subscription as the provider. If the vault is in another subscription, you must create an aliased provider for that subscription. """ - ... + __args__ = dict() + __args__['keyVaultId'] = key_vault_id + __args__['name'] = name + __args__['version'] = version + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getCertificateData:getCertificateData', __args__, opts=opts, typ=GetCertificateDataResult) + return __ret__.apply(lambda __response__: GetCertificateDataResult( + certificates_count=pulumi.get(__response__, 'certificates_count'), + expires=pulumi.get(__response__, 'expires'), + hex=pulumi.get(__response__, 'hex'), + id=pulumi.get(__response__, 'id'), + key=pulumi.get(__response__, 'key'), + key_vault_id=pulumi.get(__response__, 'key_vault_id'), + name=pulumi.get(__response__, 'name'), + not_before=pulumi.get(__response__, 'not_before'), + pem=pulumi.get(__response__, 'pem'), + tags=pulumi.get(__response__, 'tags'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_certificate_issuer.py b/sdk/python/pulumi_azure/keyvault/get_certificate_issuer.py index a48bc71971..f5ba7242ee 100644 --- a/sdk/python/pulumi_azure/keyvault/get_certificate_issuer.py +++ b/sdk/python/pulumi_azure/keyvault/get_certificate_issuer.py @@ -153,9 +153,6 @@ def get_certificate_issuer(key_vault_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), org_id=pulumi.get(__ret__, 'org_id'), provider_name=pulumi.get(__ret__, 'provider_name')) - - -@_utilities.lift_output_func(get_certificate_issuer) def get_certificate_issuer_output(key_vault_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetCertificateIssuerResult]: @@ -179,4 +176,16 @@ def get_certificate_issuer_output(key_vault_id: Optional[pulumi.Input[str]] = No :param str key_vault_id: The ID of the Key Vault in which to locate the Certificate Issuer. :param str name: The name of the Key Vault Certificate Issuer. """ - ... + __args__ = dict() + __args__['keyVaultId'] = key_vault_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getCertificateIssuer:getCertificateIssuer', __args__, opts=opts, typ=GetCertificateIssuerResult) + return __ret__.apply(lambda __response__: GetCertificateIssuerResult( + account_id=pulumi.get(__response__, 'account_id'), + admins=pulumi.get(__response__, 'admins'), + id=pulumi.get(__response__, 'id'), + key_vault_id=pulumi.get(__response__, 'key_vault_id'), + name=pulumi.get(__response__, 'name'), + org_id=pulumi.get(__response__, 'org_id'), + provider_name=pulumi.get(__response__, 'provider_name'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_certificates.py b/sdk/python/pulumi_azure/keyvault/get_certificates.py index 61ae1d61fc..2c96a293ce 100644 --- a/sdk/python/pulumi_azure/keyvault/get_certificates.py +++ b/sdk/python/pulumi_azure/keyvault/get_certificates.py @@ -119,9 +119,6 @@ def get_certificates(include_pending: Optional[bool] = None, include_pending=pulumi.get(__ret__, 'include_pending'), key_vault_id=pulumi.get(__ret__, 'key_vault_id'), names=pulumi.get(__ret__, 'names')) - - -@_utilities.lift_output_func(get_certificates) def get_certificates_output(include_pending: Optional[pulumi.Input[Optional[bool]]] = None, key_vault_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetCertificatesResult]: @@ -134,4 +131,14 @@ def get_certificates_output(include_pending: Optional[pulumi.Input[Optional[bool **NOTE:** The vault must be in the same subscription as the provider. If the vault is in another subscription, you must create an aliased provider for that subscription. """ - ... + __args__ = dict() + __args__['includePending'] = include_pending + __args__['keyVaultId'] = key_vault_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getCertificates:getCertificates', __args__, opts=opts, typ=GetCertificatesResult) + return __ret__.apply(lambda __response__: GetCertificatesResult( + certificates=pulumi.get(__response__, 'certificates'), + id=pulumi.get(__response__, 'id'), + include_pending=pulumi.get(__response__, 'include_pending'), + key_vault_id=pulumi.get(__response__, 'key_vault_id'), + names=pulumi.get(__response__, 'names'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_encrypted_value.py b/sdk/python/pulumi_azure/keyvault/get_encrypted_value.py index 101219c3a2..cff1190a28 100644 --- a/sdk/python/pulumi_azure/keyvault/get_encrypted_value.py +++ b/sdk/python/pulumi_azure/keyvault/get_encrypted_value.py @@ -128,9 +128,6 @@ def get_encrypted_value(algorithm: Optional[str] = None, id=pulumi.get(__ret__, 'id'), key_vault_key_id=pulumi.get(__ret__, 'key_vault_key_id'), plain_text_value=pulumi.get(__ret__, 'plain_text_value')) - - -@_utilities.lift_output_func(get_encrypted_value) def get_encrypted_value_output(algorithm: Optional[pulumi.Input[str]] = None, encrypted_data: Optional[pulumi.Input[Optional[str]]] = None, key_vault_key_id: Optional[pulumi.Input[str]] = None, @@ -147,4 +144,17 @@ def get_encrypted_value_output(algorithm: Optional[pulumi.Input[str]] = None, > **Note:** One of either `encrypted_data` or `plain_text_value` must be specified and is used to populate the encrypted/decrypted value for the other field. """ - ... + __args__ = dict() + __args__['algorithm'] = algorithm + __args__['encryptedData'] = encrypted_data + __args__['keyVaultKeyId'] = key_vault_key_id + __args__['plainTextValue'] = plain_text_value + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getEncryptedValue:getEncryptedValue', __args__, opts=opts, typ=GetEncryptedValueResult) + return __ret__.apply(lambda __response__: GetEncryptedValueResult( + algorithm=pulumi.get(__response__, 'algorithm'), + decoded_plain_text_value=pulumi.get(__response__, 'decoded_plain_text_value'), + encrypted_data=pulumi.get(__response__, 'encrypted_data'), + id=pulumi.get(__response__, 'id'), + key_vault_key_id=pulumi.get(__response__, 'key_vault_key_id'), + plain_text_value=pulumi.get(__response__, 'plain_text_value'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_key.py b/sdk/python/pulumi_azure/keyvault/get_key.py index aeb69c64e1..71fc7ad027 100644 --- a/sdk/python/pulumi_azure/keyvault/get_key.py +++ b/sdk/python/pulumi_azure/keyvault/get_key.py @@ -295,9 +295,6 @@ def get_key(key_vault_id: Optional[str] = None, versionless_id=pulumi.get(__ret__, 'versionless_id'), x=pulumi.get(__ret__, 'x'), y=pulumi.get(__ret__, 'y')) - - -@_utilities.lift_output_func(get_key) def get_key_output(key_vault_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetKeyResult]: @@ -321,4 +318,27 @@ def get_key_output(key_vault_id: Optional[pulumi.Input[str]] = None, **NOTE:** The vault must be in the same subscription as the provider. If the vault is in another subscription, you must create an aliased provider for that subscription. :param str name: Specifies the name of the Key Vault Key. """ - ... + __args__ = dict() + __args__['keyVaultId'] = key_vault_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getKey:getKey', __args__, opts=opts, typ=GetKeyResult) + return __ret__.apply(lambda __response__: GetKeyResult( + curve=pulumi.get(__response__, 'curve'), + e=pulumi.get(__response__, 'e'), + id=pulumi.get(__response__, 'id'), + key_opts=pulumi.get(__response__, 'key_opts'), + key_size=pulumi.get(__response__, 'key_size'), + key_type=pulumi.get(__response__, 'key_type'), + key_vault_id=pulumi.get(__response__, 'key_vault_id'), + n=pulumi.get(__response__, 'n'), + name=pulumi.get(__response__, 'name'), + public_key_openssh=pulumi.get(__response__, 'public_key_openssh'), + public_key_pem=pulumi.get(__response__, 'public_key_pem'), + resource_id=pulumi.get(__response__, 'resource_id'), + resource_versionless_id=pulumi.get(__response__, 'resource_versionless_id'), + tags=pulumi.get(__response__, 'tags'), + version=pulumi.get(__response__, 'version'), + versionless_id=pulumi.get(__response__, 'versionless_id'), + x=pulumi.get(__response__, 'x'), + y=pulumi.get(__response__, 'y'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_key_vault.py b/sdk/python/pulumi_azure/keyvault/get_key_vault.py index 5dc0d1150a..5772c0ccd6 100644 --- a/sdk/python/pulumi_azure/keyvault/get_key_vault.py +++ b/sdk/python/pulumi_azure/keyvault/get_key_vault.py @@ -265,9 +265,6 @@ def get_key_vault(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), tenant_id=pulumi.get(__ret__, 'tenant_id'), vault_uri=pulumi.get(__ret__, 'vault_uri')) - - -@_utilities.lift_output_func(get_key_vault) def get_key_vault_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetKeyVaultResult]: @@ -289,4 +286,25 @@ def get_key_vault_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Key Vault. :param str resource_group_name: The name of the Resource Group in which the Key Vault exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getKeyVault:getKeyVault', __args__, opts=opts, typ=GetKeyVaultResult) + return __ret__.apply(lambda __response__: GetKeyVaultResult( + access_policies=pulumi.get(__response__, 'access_policies'), + enable_rbac_authorization=pulumi.get(__response__, 'enable_rbac_authorization'), + enabled_for_deployment=pulumi.get(__response__, 'enabled_for_deployment'), + enabled_for_disk_encryption=pulumi.get(__response__, 'enabled_for_disk_encryption'), + enabled_for_template_deployment=pulumi.get(__response__, 'enabled_for_template_deployment'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + network_acls=pulumi.get(__response__, 'network_acls'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + purge_protection_enabled=pulumi.get(__response__, 'purge_protection_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'), + tenant_id=pulumi.get(__response__, 'tenant_id'), + vault_uri=pulumi.get(__response__, 'vault_uri'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_managed_hardware_security_module.py b/sdk/python/pulumi_azure/keyvault/get_managed_hardware_security_module.py index 16724790dd..b4eeb089ed 100644 --- a/sdk/python/pulumi_azure/keyvault/get_managed_hardware_security_module.py +++ b/sdk/python/pulumi_azure/keyvault/get_managed_hardware_security_module.py @@ -202,9 +202,6 @@ def get_managed_hardware_security_module(name: Optional[str] = None, soft_delete_retention_days=pulumi.get(__ret__, 'soft_delete_retention_days'), tags=pulumi.get(__ret__, 'tags'), tenant_id=pulumi.get(__ret__, 'tenant_id')) - - -@_utilities.lift_output_func(get_managed_hardware_security_module) def get_managed_hardware_security_module_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetManagedHardwareSecurityModuleResult]: @@ -226,4 +223,20 @@ def get_managed_hardware_security_module_output(name: Optional[pulumi.Input[str] :param str name: The name of the Key Vault Managed Hardware Security Module. :param str resource_group_name: The name of the Resource Group in which the Key Vault Managed Hardware Security Module exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getManagedHardwareSecurityModule:getManagedHardwareSecurityModule', __args__, opts=opts, typ=GetManagedHardwareSecurityModuleResult) + return __ret__.apply(lambda __response__: GetManagedHardwareSecurityModuleResult( + admin_object_ids=pulumi.get(__response__, 'admin_object_ids'), + hsm_uri=pulumi.get(__response__, 'hsm_uri'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + purge_protection_enabled=pulumi.get(__response__, 'purge_protection_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + soft_delete_retention_days=pulumi.get(__response__, 'soft_delete_retention_days'), + tags=pulumi.get(__response__, 'tags'), + tenant_id=pulumi.get(__response__, 'tenant_id'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_managed_hardware_security_module_role_definition.py b/sdk/python/pulumi_azure/keyvault/get_managed_hardware_security_module_role_definition.py index 1a73c209ba..703a0a6963 100644 --- a/sdk/python/pulumi_azure/keyvault/get_managed_hardware_security_module_role_definition.py +++ b/sdk/python/pulumi_azure/keyvault/get_managed_hardware_security_module_role_definition.py @@ -165,9 +165,6 @@ def get_managed_hardware_security_module_role_definition(managed_hsm_id: Optiona resource_manager_id=pulumi.get(__ret__, 'resource_manager_id'), role_name=pulumi.get(__ret__, 'role_name'), role_type=pulumi.get(__ret__, 'role_type')) - - -@_utilities.lift_output_func(get_managed_hardware_security_module_role_definition) def get_managed_hardware_security_module_role_definition_output(managed_hsm_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetManagedHardwareSecurityModuleRoleDefinitionResult]: @@ -177,4 +174,18 @@ def get_managed_hardware_security_module_role_definition_output(managed_hsm_id: :param str name: The name in UUID notation of this KeyVault Role Definition. """ - ... + __args__ = dict() + __args__['managedHsmId'] = managed_hsm_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getManagedHardwareSecurityModuleRoleDefinition:getManagedHardwareSecurityModuleRoleDefinition', __args__, opts=opts, typ=GetManagedHardwareSecurityModuleRoleDefinitionResult) + return __ret__.apply(lambda __response__: GetManagedHardwareSecurityModuleRoleDefinitionResult( + assignable_scopes=pulumi.get(__response__, 'assignable_scopes'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + managed_hsm_id=pulumi.get(__response__, 'managed_hsm_id'), + name=pulumi.get(__response__, 'name'), + permissions=pulumi.get(__response__, 'permissions'), + resource_manager_id=pulumi.get(__response__, 'resource_manager_id'), + role_name=pulumi.get(__response__, 'role_name'), + role_type=pulumi.get(__response__, 'role_type'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_secret.py b/sdk/python/pulumi_azure/keyvault/get_secret.py index aeb9961268..81a7c27fa8 100644 --- a/sdk/python/pulumi_azure/keyvault/get_secret.py +++ b/sdk/python/pulumi_azure/keyvault/get_secret.py @@ -217,9 +217,6 @@ def get_secret(key_vault_id: Optional[str] = None, value=pulumi.get(__ret__, 'value'), version=pulumi.get(__ret__, 'version'), versionless_id=pulumi.get(__ret__, 'versionless_id')) - - -@_utilities.lift_output_func(get_secret) def get_secret_output(key_vault_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, version: Optional[pulumi.Input[Optional[str]]] = None, @@ -245,4 +242,22 @@ def get_secret_output(key_vault_id: Optional[pulumi.Input[str]] = None, **NOTE:** The vault must be in the same subscription as the provider. If the vault is in another subscription, you must create an aliased provider for that subscription. """ - ... + __args__ = dict() + __args__['keyVaultId'] = key_vault_id + __args__['name'] = name + __args__['version'] = version + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult) + return __ret__.apply(lambda __response__: GetSecretResult( + content_type=pulumi.get(__response__, 'content_type'), + expiration_date=pulumi.get(__response__, 'expiration_date'), + id=pulumi.get(__response__, 'id'), + key_vault_id=pulumi.get(__response__, 'key_vault_id'), + name=pulumi.get(__response__, 'name'), + not_before_date=pulumi.get(__response__, 'not_before_date'), + resource_id=pulumi.get(__response__, 'resource_id'), + resource_versionless_id=pulumi.get(__response__, 'resource_versionless_id'), + tags=pulumi.get(__response__, 'tags'), + value=pulumi.get(__response__, 'value'), + version=pulumi.get(__response__, 'version'), + versionless_id=pulumi.get(__response__, 'versionless_id'))) diff --git a/sdk/python/pulumi_azure/keyvault/get_secrets.py b/sdk/python/pulumi_azure/keyvault/get_secrets.py index ade01bdc2c..a4cae9f111 100644 --- a/sdk/python/pulumi_azure/keyvault/get_secrets.py +++ b/sdk/python/pulumi_azure/keyvault/get_secrets.py @@ -103,9 +103,6 @@ def get_secrets(key_vault_id: Optional[str] = None, key_vault_id=pulumi.get(__ret__, 'key_vault_id'), names=pulumi.get(__ret__, 'names'), secrets=pulumi.get(__ret__, 'secrets')) - - -@_utilities.lift_output_func(get_secrets) def get_secrets_output(key_vault_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsResult]: """ @@ -116,4 +113,12 @@ def get_secrets_output(key_vault_id: Optional[pulumi.Input[str]] = None, **NOTE:** The vault must be in the same subscription as the provider. If the vault is in another subscription, you must create an aliased provider for that subscription. """ - ... + __args__ = dict() + __args__['keyVaultId'] = key_vault_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:keyvault/getSecrets:getSecrets', __args__, opts=opts, typ=GetSecretsResult) + return __ret__.apply(lambda __response__: GetSecretsResult( + id=pulumi.get(__response__, 'id'), + key_vault_id=pulumi.get(__response__, 'key_vault_id'), + names=pulumi.get(__response__, 'names'), + secrets=pulumi.get(__response__, 'secrets'))) diff --git a/sdk/python/pulumi_azure/kusto/get_cluster.py b/sdk/python/pulumi_azure/kusto/get_cluster.py index 4be5971dda..d9560fed6c 100644 --- a/sdk/python/pulumi_azure/kusto/get_cluster.py +++ b/sdk/python/pulumi_azure/kusto/get_cluster.py @@ -157,9 +157,6 @@ def get_cluster(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), uri=pulumi.get(__ret__, 'uri')) - - -@_utilities.lift_output_func(get_cluster) def get_cluster_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetClusterResult]: @@ -180,4 +177,17 @@ def get_cluster_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Kusto Cluster. :param str resource_group_name: The name of the Resource Group where the Kusto Cluster exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:kusto/getCluster:getCluster', __args__, opts=opts, typ=GetClusterResult) + return __ret__.apply(lambda __response__: GetClusterResult( + data_ingestion_uri=pulumi.get(__response__, 'data_ingestion_uri'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + uri=pulumi.get(__response__, 'uri'))) diff --git a/sdk/python/pulumi_azure/kusto/get_database.py b/sdk/python/pulumi_azure/kusto/get_database.py index dc39e8ff59..46cf68fca5 100644 --- a/sdk/python/pulumi_azure/kusto/get_database.py +++ b/sdk/python/pulumi_azure/kusto/get_database.py @@ -163,9 +163,6 @@ def get_database(cluster_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), size=pulumi.get(__ret__, 'size'), soft_delete_period=pulumi.get(__ret__, 'soft_delete_period')) - - -@_utilities.lift_output_func(get_database) def get_database_output(cluster_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -189,4 +186,18 @@ def get_database_output(cluster_name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Kusto Database. :param str resource_group_name: The Resource Group where the Kusto Database exists. """ - ... + __args__ = dict() + __args__['clusterName'] = cluster_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:kusto/getDatabase:getDatabase', __args__, opts=opts, typ=GetDatabaseResult) + return __ret__.apply(lambda __response__: GetDatabaseResult( + cluster_name=pulumi.get(__response__, 'cluster_name'), + hot_cache_period=pulumi.get(__response__, 'hot_cache_period'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + size=pulumi.get(__response__, 'size'), + soft_delete_period=pulumi.get(__response__, 'soft_delete_period'))) diff --git a/sdk/python/pulumi_azure/lb/get_backend_address_pool.py b/sdk/python/pulumi_azure/lb/get_backend_address_pool.py index 3df7692be3..2a2e6b5dec 100644 --- a/sdk/python/pulumi_azure/lb/get_backend_address_pool.py +++ b/sdk/python/pulumi_azure/lb/get_backend_address_pool.py @@ -170,9 +170,6 @@ def get_backend_address_pool(loadbalancer_id: Optional[str] = None, loadbalancer_id=pulumi.get(__ret__, 'loadbalancer_id'), name=pulumi.get(__ret__, 'name'), outbound_rules=pulumi.get(__ret__, 'outbound_rules')) - - -@_utilities.lift_output_func(get_backend_address_pool) def get_backend_address_pool_output(loadbalancer_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendAddressPoolResult]: @@ -197,4 +194,17 @@ def get_backend_address_pool_output(loadbalancer_id: Optional[pulumi.Input[str]] :param str loadbalancer_id: The ID of the Load Balancer in which the Backend Address Pool exists. :param str name: Specifies the name of the Backend Address Pool. """ - ... + __args__ = dict() + __args__['loadbalancerId'] = loadbalancer_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:lb/getBackendAddressPool:getBackendAddressPool', __args__, opts=opts, typ=GetBackendAddressPoolResult) + return __ret__.apply(lambda __response__: GetBackendAddressPoolResult( + backend_addresses=pulumi.get(__response__, 'backend_addresses'), + backend_ip_configurations=pulumi.get(__response__, 'backend_ip_configurations'), + id=pulumi.get(__response__, 'id'), + inbound_nat_rules=pulumi.get(__response__, 'inbound_nat_rules'), + load_balancing_rules=pulumi.get(__response__, 'load_balancing_rules'), + loadbalancer_id=pulumi.get(__response__, 'loadbalancer_id'), + name=pulumi.get(__response__, 'name'), + outbound_rules=pulumi.get(__response__, 'outbound_rules'))) diff --git a/sdk/python/pulumi_azure/lb/get_lb.py b/sdk/python/pulumi_azure/lb/get_lb.py index 3391358d13..d43a7c9a15 100644 --- a/sdk/python/pulumi_azure/lb/get_lb.py +++ b/sdk/python/pulumi_azure/lb/get_lb.py @@ -180,9 +180,6 @@ def get_lb(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_lb) def get_lb_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLBResult]: @@ -204,4 +201,18 @@ def get_lb_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Load Balancer. :param str resource_group_name: The name of the Resource Group in which the Load Balancer exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:lb/getLB:getLB', __args__, opts=opts, typ=GetLBResult) + return __ret__.apply(lambda __response__: GetLBResult( + frontend_ip_configurations=pulumi.get(__response__, 'frontend_ip_configurations'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + private_ip_address=pulumi.get(__response__, 'private_ip_address'), + private_ip_addresses=pulumi.get(__response__, 'private_ip_addresses'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/lb/get_lb_outbound_rule.py b/sdk/python/pulumi_azure/lb/get_lb_outbound_rule.py index 732790b0c4..76c36c4ab7 100644 --- a/sdk/python/pulumi_azure/lb/get_lb_outbound_rule.py +++ b/sdk/python/pulumi_azure/lb/get_lb_outbound_rule.py @@ -180,9 +180,6 @@ def get_lb_outbound_rule(loadbalancer_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), protocol=pulumi.get(__ret__, 'protocol'), tcp_reset_enabled=pulumi.get(__ret__, 'tcp_reset_enabled')) - - -@_utilities.lift_output_func(get_lb_outbound_rule) def get_lb_outbound_rule_output(loadbalancer_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLBOutboundRuleResult]: @@ -204,4 +201,18 @@ def get_lb_outbound_rule_output(loadbalancer_id: Optional[pulumi.Input[str]] = N :param str loadbalancer_id: The ID of the Load Balancer in which the Outbound Rule exists. :param str name: The name of this Load Balancer Outbound Rule. """ - ... + __args__ = dict() + __args__['loadbalancerId'] = loadbalancer_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:lb/getLBOutboundRule:getLBOutboundRule', __args__, opts=opts, typ=GetLBOutboundRuleResult) + return __ret__.apply(lambda __response__: GetLBOutboundRuleResult( + allocated_outbound_ports=pulumi.get(__response__, 'allocated_outbound_ports'), + backend_address_pool_id=pulumi.get(__response__, 'backend_address_pool_id'), + frontend_ip_configurations=pulumi.get(__response__, 'frontend_ip_configurations'), + id=pulumi.get(__response__, 'id'), + idle_timeout_in_minutes=pulumi.get(__response__, 'idle_timeout_in_minutes'), + loadbalancer_id=pulumi.get(__response__, 'loadbalancer_id'), + name=pulumi.get(__response__, 'name'), + protocol=pulumi.get(__response__, 'protocol'), + tcp_reset_enabled=pulumi.get(__response__, 'tcp_reset_enabled'))) diff --git a/sdk/python/pulumi_azure/lb/get_lb_rule.py b/sdk/python/pulumi_azure/lb/get_lb_rule.py index 3c2c9d5377..229b44d080 100644 --- a/sdk/python/pulumi_azure/lb/get_lb_rule.py +++ b/sdk/python/pulumi_azure/lb/get_lb_rule.py @@ -230,9 +230,6 @@ def get_lb_rule(loadbalancer_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), probe_id=pulumi.get(__ret__, 'probe_id'), protocol=pulumi.get(__ret__, 'protocol')) - - -@_utilities.lift_output_func(get_lb_rule) def get_lb_rule_output(loadbalancer_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLBRuleResult]: @@ -243,4 +240,23 @@ def get_lb_rule_output(loadbalancer_id: Optional[pulumi.Input[str]] = None, :param str loadbalancer_id: The ID of the Load Balancer Rule. :param str name: The name of this Load Balancer Rule. """ - ... + __args__ = dict() + __args__['loadbalancerId'] = loadbalancer_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:lb/getLBRule:getLBRule', __args__, opts=opts, typ=GetLBRuleResult) + return __ret__.apply(lambda __response__: GetLBRuleResult( + backend_address_pool_id=pulumi.get(__response__, 'backend_address_pool_id'), + backend_port=pulumi.get(__response__, 'backend_port'), + disable_outbound_snat=pulumi.get(__response__, 'disable_outbound_snat'), + enable_floating_ip=pulumi.get(__response__, 'enable_floating_ip'), + enable_tcp_reset=pulumi.get(__response__, 'enable_tcp_reset'), + frontend_ip_configuration_name=pulumi.get(__response__, 'frontend_ip_configuration_name'), + frontend_port=pulumi.get(__response__, 'frontend_port'), + id=pulumi.get(__response__, 'id'), + idle_timeout_in_minutes=pulumi.get(__response__, 'idle_timeout_in_minutes'), + load_distribution=pulumi.get(__response__, 'load_distribution'), + loadbalancer_id=pulumi.get(__response__, 'loadbalancer_id'), + name=pulumi.get(__response__, 'name'), + probe_id=pulumi.get(__response__, 'probe_id'), + protocol=pulumi.get(__response__, 'protocol'))) diff --git a/sdk/python/pulumi_azure/loadtest/get.py b/sdk/python/pulumi_azure/loadtest/get.py index 2d08423695..97ede2f1c5 100644 --- a/sdk/python/pulumi_azure/loadtest/get.py +++ b/sdk/python/pulumi_azure/loadtest/get.py @@ -177,9 +177,6 @@ def get(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get) def get_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResult]: @@ -201,4 +198,18 @@ def get_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Load Test Service. :param str resource_group_name: The name of the Resource Group in which the Load Test Service exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:loadtest/get:get', __args__, opts=opts, typ=GetResult) + return __ret__.apply(lambda __response__: GetResult( + data_plane_uri=pulumi.get(__response__, 'data_plane_uri'), + description=pulumi.get(__response__, 'description'), + encryptions=pulumi.get(__response__, 'encryptions'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/logicapps/get_integration_account.py b/sdk/python/pulumi_azure/logicapps/get_integration_account.py index 0c3de7ede6..436c49045b 100644 --- a/sdk/python/pulumi_azure/logicapps/get_integration_account.py +++ b/sdk/python/pulumi_azure/logicapps/get_integration_account.py @@ -137,9 +137,6 @@ def get_integration_account(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_integration_account) def get_integration_account_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetIntegrationAccountResult]: @@ -161,4 +158,15 @@ def get_integration_account_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Logic App Integration Account. :param str resource_group_name: The name of the Resource Group where the Logic App Integration Account exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:logicapps/getIntegrationAccount:getIntegrationAccount', __args__, opts=opts, typ=GetIntegrationAccountResult) + return __ret__.apply(lambda __response__: GetIntegrationAccountResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/logicapps/get_standard.py b/sdk/python/pulumi_azure/logicapps/get_standard.py index a96e42889e..1eac8bb434 100644 --- a/sdk/python/pulumi_azure/logicapps/get_standard.py +++ b/sdk/python/pulumi_azure/logicapps/get_standard.py @@ -350,9 +350,6 @@ def get_standard(name: Optional[str] = None, use_extension_bundle=pulumi.get(__ret__, 'use_extension_bundle'), version=pulumi.get(__ret__, 'version'), virtual_network_subnet_id=pulumi.get(__ret__, 'virtual_network_subnet_id')) - - -@_utilities.lift_output_func(get_standard) def get_standard_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, site_config: Optional[pulumi.Input[Optional[Union['GetStandardSiteConfigArgs', 'GetStandardSiteConfigArgsDict']]]] = None, @@ -376,4 +373,38 @@ def get_standard_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Logic App. :param str resource_group_name: The name of the Resource Group where the Logic App exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['siteConfig'] = site_config + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:logicapps/getStandard:getStandard', __args__, opts=opts, typ=GetStandardResult) + return __ret__.apply(lambda __response__: GetStandardResult( + app_service_plan_id=pulumi.get(__response__, 'app_service_plan_id'), + app_settings=pulumi.get(__response__, 'app_settings'), + bundle_version=pulumi.get(__response__, 'bundle_version'), + client_affinity_enabled=pulumi.get(__response__, 'client_affinity_enabled'), + client_certificate_mode=pulumi.get(__response__, 'client_certificate_mode'), + connection_strings=pulumi.get(__response__, 'connection_strings'), + custom_domain_verification_id=pulumi.get(__response__, 'custom_domain_verification_id'), + default_hostname=pulumi.get(__response__, 'default_hostname'), + enabled=pulumi.get(__response__, 'enabled'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + outbound_ip_addresses=pulumi.get(__response__, 'outbound_ip_addresses'), + possible_outbound_ip_addresses=pulumi.get(__response__, 'possible_outbound_ip_addresses'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + site_config=pulumi.get(__response__, 'site_config'), + site_credentials=pulumi.get(__response__, 'site_credentials'), + storage_account_access_key=pulumi.get(__response__, 'storage_account_access_key'), + storage_account_name=pulumi.get(__response__, 'storage_account_name'), + storage_account_share_name=pulumi.get(__response__, 'storage_account_share_name'), + tags=pulumi.get(__response__, 'tags'), + use_extension_bundle=pulumi.get(__response__, 'use_extension_bundle'), + version=pulumi.get(__response__, 'version'), + virtual_network_subnet_id=pulumi.get(__response__, 'virtual_network_subnet_id'))) diff --git a/sdk/python/pulumi_azure/logicapps/get_workflow.py b/sdk/python/pulumi_azure/logicapps/get_workflow.py index df110e300b..bb0589bccc 100644 --- a/sdk/python/pulumi_azure/logicapps/get_workflow.py +++ b/sdk/python/pulumi_azure/logicapps/get_workflow.py @@ -255,9 +255,6 @@ def get_workflow(name: Optional[str] = None, workflow_outbound_ip_addresses=pulumi.get(__ret__, 'workflow_outbound_ip_addresses'), workflow_schema=pulumi.get(__ret__, 'workflow_schema'), workflow_version=pulumi.get(__ret__, 'workflow_version')) - - -@_utilities.lift_output_func(get_workflow) def get_workflow_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWorkflowResult]: @@ -279,4 +276,24 @@ def get_workflow_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Logic App Workflow. :param str resource_group_name: The name of the Resource Group in which the Logic App Workflow exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:logicapps/getWorkflow:getWorkflow', __args__, opts=opts, typ=GetWorkflowResult) + return __ret__.apply(lambda __response__: GetWorkflowResult( + access_endpoint=pulumi.get(__response__, 'access_endpoint'), + connector_endpoint_ip_addresses=pulumi.get(__response__, 'connector_endpoint_ip_addresses'), + connector_outbound_ip_addresses=pulumi.get(__response__, 'connector_outbound_ip_addresses'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + logic_app_integration_account_id=pulumi.get(__response__, 'logic_app_integration_account_id'), + name=pulumi.get(__response__, 'name'), + parameters=pulumi.get(__response__, 'parameters'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + workflow_endpoint_ip_addresses=pulumi.get(__response__, 'workflow_endpoint_ip_addresses'), + workflow_outbound_ip_addresses=pulumi.get(__response__, 'workflow_outbound_ip_addresses'), + workflow_schema=pulumi.get(__response__, 'workflow_schema'), + workflow_version=pulumi.get(__response__, 'workflow_version'))) diff --git a/sdk/python/pulumi_azure/machinelearning/get_workspace.py b/sdk/python/pulumi_azure/machinelearning/get_workspace.py index 7d2237eef0..f333021b50 100644 --- a/sdk/python/pulumi_azure/machinelearning/get_workspace.py +++ b/sdk/python/pulumi_azure/machinelearning/get_workspace.py @@ -138,9 +138,6 @@ def get_workspace(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_workspace) def get_workspace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWorkspaceResult]: @@ -162,4 +159,15 @@ def get_workspace_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Machine Learning Workspace exists. :param str resource_group_name: The name of the Resource Group where the Machine Learning Workspace exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:machinelearning/getWorkspace:getWorkspace', __args__, opts=opts, typ=GetWorkspaceResult) + return __ret__.apply(lambda __response__: GetWorkspaceResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/maintenance/get_configuration.py b/sdk/python/pulumi_azure/maintenance/get_configuration.py index 46af995c26..3be56f41c0 100644 --- a/sdk/python/pulumi_azure/maintenance/get_configuration.py +++ b/sdk/python/pulumi_azure/maintenance/get_configuration.py @@ -203,9 +203,6 @@ def get_configuration(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), visibility=pulumi.get(__ret__, 'visibility'), windows=pulumi.get(__ret__, 'windows')) - - -@_utilities.lift_output_func(get_configuration) def get_configuration_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetConfigurationResult]: @@ -227,4 +224,20 @@ def get_configuration_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Maintenance Configuration. :param str resource_group_name: Specifies the name of the Resource Group where this Maintenance Configuration exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:maintenance/getConfiguration:getConfiguration', __args__, opts=opts, typ=GetConfigurationResult) + return __ret__.apply(lambda __response__: GetConfigurationResult( + id=pulumi.get(__response__, 'id'), + in_guest_user_patch_mode=pulumi.get(__response__, 'in_guest_user_patch_mode'), + install_patches=pulumi.get(__response__, 'install_patches'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + properties=pulumi.get(__response__, 'properties'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + scope=pulumi.get(__response__, 'scope'), + tags=pulumi.get(__response__, 'tags'), + visibility=pulumi.get(__response__, 'visibility'), + windows=pulumi.get(__response__, 'windows'))) diff --git a/sdk/python/pulumi_azure/maintenance/get_public_configurations.py b/sdk/python/pulumi_azure/maintenance/get_public_configurations.py index 08292fcca9..75a4492a70 100644 --- a/sdk/python/pulumi_azure/maintenance/get_public_configurations.py +++ b/sdk/python/pulumi_azure/maintenance/get_public_configurations.py @@ -132,9 +132,6 @@ def get_public_configurations(location: Optional[str] = None, location=pulumi.get(__ret__, 'location'), recur_every=pulumi.get(__ret__, 'recur_every'), scope=pulumi.get(__ret__, 'scope')) - - -@_utilities.lift_output_func(get_public_configurations) def get_public_configurations_output(location: Optional[pulumi.Input[Optional[str]]] = None, recur_every: Optional[pulumi.Input[Optional[str]]] = None, scope: Optional[pulumi.Input[Optional[str]]] = None, @@ -159,4 +156,15 @@ def get_public_configurations_output(location: Optional[pulumi.Input[Optional[st :param str recur_every: The recurring window to filter the list of Public Maintenance Configurations against. Possible values are `Monday-Thursday` and `Friday-Sunday` :param str scope: The scope to filter the list of Public Maintenance Configurations against. Possible values are `Extension`, `Host`, `InGuestPatch`, `OSImage`, `SQLDB` and `SQLManagedInstance`. """ - ... + __args__ = dict() + __args__['location'] = location + __args__['recurEvery'] = recur_every + __args__['scope'] = scope + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:maintenance/getPublicConfigurations:getPublicConfigurations', __args__, opts=opts, typ=GetPublicConfigurationsResult) + return __ret__.apply(lambda __response__: GetPublicConfigurationsResult( + configs=pulumi.get(__response__, 'configs'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + recur_every=pulumi.get(__response__, 'recur_every'), + scope=pulumi.get(__response__, 'scope'))) diff --git a/sdk/python/pulumi_azure/managedapplication/get_definition.py b/sdk/python/pulumi_azure/managedapplication/get_definition.py index bdedd4f17f..77bdd274bb 100644 --- a/sdk/python/pulumi_azure/managedapplication/get_definition.py +++ b/sdk/python/pulumi_azure/managedapplication/get_definition.py @@ -108,9 +108,6 @@ def get_definition(name: Optional[str] = None, location=pulumi.get(__ret__, 'location'), name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_definition) def get_definition_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDefinitionResult]: @@ -132,4 +129,13 @@ def get_definition_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Managed Application Definition. :param str resource_group_name: Specifies the name of the Resource Group where this Managed Application Definition exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:managedapplication/getDefinition:getDefinition', __args__, opts=opts, typ=GetDefinitionResult) + return __ret__.apply(lambda __response__: GetDefinitionResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/management/get_group.py b/sdk/python/pulumi_azure/management/get_group.py index afa69a3be8..5e8efb9a2c 100644 --- a/sdk/python/pulumi_azure/management/get_group.py +++ b/sdk/python/pulumi_azure/management/get_group.py @@ -177,9 +177,6 @@ def get_group(display_name: Optional[str] = None, parent_management_group_id=pulumi.get(__ret__, 'parent_management_group_id'), subscription_ids=pulumi.get(__ret__, 'subscription_ids'), tenant_scoped_id=pulumi.get(__ret__, 'tenant_scoped_id')) - - -@_utilities.lift_output_func(get_group) def get_group_output(display_name: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGroupResult]: @@ -202,4 +199,18 @@ def get_group_output(display_name: Optional[pulumi.Input[Optional[str]]] = None, > **NOTE** Whilst multiple management groups may share the same display name, when filtering, the provider expects a single management group to be found with this name. :param str name: Specifies the name or UUID of this Management Group. """ - ... + __args__ = dict() + __args__['displayName'] = display_name + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:management/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult) + return __ret__.apply(lambda __response__: GetGroupResult( + all_management_group_ids=pulumi.get(__response__, 'all_management_group_ids'), + all_subscription_ids=pulumi.get(__response__, 'all_subscription_ids'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + management_group_ids=pulumi.get(__response__, 'management_group_ids'), + name=pulumi.get(__response__, 'name'), + parent_management_group_id=pulumi.get(__response__, 'parent_management_group_id'), + subscription_ids=pulumi.get(__response__, 'subscription_ids'), + tenant_scoped_id=pulumi.get(__response__, 'tenant_scoped_id'))) diff --git a/sdk/python/pulumi_azure/management/get_group_template_deployment.py b/sdk/python/pulumi_azure/management/get_group_template_deployment.py index 6cd8e44716..eb35e03e69 100644 --- a/sdk/python/pulumi_azure/management/get_group_template_deployment.py +++ b/sdk/python/pulumi_azure/management/get_group_template_deployment.py @@ -100,9 +100,6 @@ def get_group_template_deployment(management_group_id: Optional[str] = None, management_group_id=pulumi.get(__ret__, 'management_group_id'), name=pulumi.get(__ret__, 'name'), output_content=pulumi.get(__ret__, 'output_content')) - - -@_utilities.lift_output_func(get_group_template_deployment) def get_group_template_deployment_output(management_group_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGroupTemplateDeploymentResult]: @@ -113,4 +110,13 @@ def get_group_template_deployment_output(management_group_id: Optional[pulumi.In :param str management_group_id: The ID of the Management Group to which this template was applied. :param str name: The name of this Management Group Template Deployment. """ - ... + __args__ = dict() + __args__['managementGroupId'] = management_group_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:management/getGroupTemplateDeployment:getGroupTemplateDeployment', __args__, opts=opts, typ=GetGroupTemplateDeploymentResult) + return __ret__.apply(lambda __response__: GetGroupTemplateDeploymentResult( + id=pulumi.get(__response__, 'id'), + management_group_id=pulumi.get(__response__, 'management_group_id'), + name=pulumi.get(__response__, 'name'), + output_content=pulumi.get(__response__, 'output_content'))) diff --git a/sdk/python/pulumi_azure/managementgroups/get_management_group.py b/sdk/python/pulumi_azure/managementgroups/get_management_group.py index 5b5b8743bf..72be38f5fc 100644 --- a/sdk/python/pulumi_azure/managementgroups/get_management_group.py +++ b/sdk/python/pulumi_azure/managementgroups/get_management_group.py @@ -180,9 +180,6 @@ def get_management_group(display_name: Optional[str] = None, parent_management_group_id=pulumi.get(__ret__, 'parent_management_group_id'), subscription_ids=pulumi.get(__ret__, 'subscription_ids'), tenant_scoped_id=pulumi.get(__ret__, 'tenant_scoped_id')) - - -@_utilities.lift_output_func(get_management_group) def get_management_group_output(display_name: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetManagementGroupResult]: @@ -206,4 +203,18 @@ def get_management_group_output(display_name: Optional[pulumi.Input[Optional[str :param str name: Specifies the name or UUID of this Management Group. """ pulumi.log.warn("""get_management_group is deprecated: azure.managementgroups.getManagementGroup has been deprecated in favor of azure.management.getGroup""") - ... + __args__ = dict() + __args__['displayName'] = display_name + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:managementgroups/getManagementGroup:getManagementGroup', __args__, opts=opts, typ=GetManagementGroupResult) + return __ret__.apply(lambda __response__: GetManagementGroupResult( + all_management_group_ids=pulumi.get(__response__, 'all_management_group_ids'), + all_subscription_ids=pulumi.get(__response__, 'all_subscription_ids'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + management_group_ids=pulumi.get(__response__, 'management_group_ids'), + name=pulumi.get(__response__, 'name'), + parent_management_group_id=pulumi.get(__response__, 'parent_management_group_id'), + subscription_ids=pulumi.get(__response__, 'subscription_ids'), + tenant_scoped_id=pulumi.get(__response__, 'tenant_scoped_id'))) diff --git a/sdk/python/pulumi_azure/maps/get_account.py b/sdk/python/pulumi_azure/maps/get_account.py index f3b9ad1f0e..fc64e14cdc 100644 --- a/sdk/python/pulumi_azure/maps/get_account.py +++ b/sdk/python/pulumi_azure/maps/get_account.py @@ -162,9 +162,6 @@ def get_account(name: Optional[str] = None, sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags'), x_ms_client_id=pulumi.get(__ret__, 'x_ms_client_id')) - - -@_utilities.lift_output_func(get_account) def get_account_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -187,4 +184,18 @@ def get_account_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Maps Account. :param str resource_group_name: Specifies the name of the Resource Group in which the Maps Account is located. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:maps/getAccount:getAccount', __args__, opts=opts, typ=GetAccountResult) + return __ret__.apply(lambda __response__: GetAccountResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'), + x_ms_client_id=pulumi.get(__response__, 'x_ms_client_id'))) diff --git a/sdk/python/pulumi_azure/marketplace/get_agreement.py b/sdk/python/pulumi_azure/marketplace/get_agreement.py index 4cdcc5249c..1f0a3c6411 100644 --- a/sdk/python/pulumi_azure/marketplace/get_agreement.py +++ b/sdk/python/pulumi_azure/marketplace/get_agreement.py @@ -132,9 +132,6 @@ def get_agreement(offer: Optional[str] = None, plan=pulumi.get(__ret__, 'plan'), privacy_policy_link=pulumi.get(__ret__, 'privacy_policy_link'), publisher=pulumi.get(__ret__, 'publisher')) - - -@_utilities.lift_output_func(get_agreement) def get_agreement_output(offer: Optional[pulumi.Input[str]] = None, plan: Optional[pulumi.Input[str]] = None, publisher: Optional[pulumi.Input[str]] = None, @@ -159,4 +156,16 @@ def get_agreement_output(offer: Optional[pulumi.Input[str]] = None, :param str plan: The Plan of the Marketplace Image. :param str publisher: The Publisher of the Marketplace Image. """ - ... + __args__ = dict() + __args__['offer'] = offer + __args__['plan'] = plan + __args__['publisher'] = publisher + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:marketplace/getAgreement:getAgreement', __args__, opts=opts, typ=GetAgreementResult) + return __ret__.apply(lambda __response__: GetAgreementResult( + id=pulumi.get(__response__, 'id'), + license_text_link=pulumi.get(__response__, 'license_text_link'), + offer=pulumi.get(__response__, 'offer'), + plan=pulumi.get(__response__, 'plan'), + privacy_policy_link=pulumi.get(__response__, 'privacy_policy_link'), + publisher=pulumi.get(__response__, 'publisher'))) diff --git a/sdk/python/pulumi_azure/mixedreality/get_spatial_anchors_account.py b/sdk/python/pulumi_azure/mixedreality/get_spatial_anchors_account.py index a118ff3e20..1dd7593afb 100644 --- a/sdk/python/pulumi_azure/mixedreality/get_spatial_anchors_account.py +++ b/sdk/python/pulumi_azure/mixedreality/get_spatial_anchors_account.py @@ -147,9 +147,6 @@ def get_spatial_anchors_account(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_spatial_anchors_account) def get_spatial_anchors_account_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSpatialAnchorsAccountResult]: @@ -171,4 +168,16 @@ def get_spatial_anchors_account_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Spatial Anchors Account. Changing this forces a new resource to be created. Must be globally unique. :param str resource_group_name: The name of the resource group in which to create the Spatial Anchors Account. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mixedreality/getSpatialAnchorsAccount:getSpatialAnchorsAccount', __args__, opts=opts, typ=GetSpatialAnchorsAccountResult) + return __ret__.apply(lambda __response__: GetSpatialAnchorsAccountResult( + account_domain=pulumi.get(__response__, 'account_domain'), + account_id=pulumi.get(__response__, 'account_id'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network.py b/sdk/python/pulumi_azure/mobile/get_network.py index 45f4ff56bc..5b12ac9b3c 100644 --- a/sdk/python/pulumi_azure/mobile/get_network.py +++ b/sdk/python/pulumi_azure/mobile/get_network.py @@ -162,9 +162,6 @@ def get_network(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), service_key=pulumi.get(__ret__, 'service_key'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network) def get_network_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkResult]: @@ -185,4 +182,17 @@ def get_network_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name which should be used for this Mobile Network. :param str resource_group_name: Specifies the name of the Resource Group where the Mobile Network should exist. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetwork:getNetwork', __args__, opts=opts, typ=GetNetworkResult) + return __ret__.apply(lambda __response__: GetNetworkResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + mobile_country_code=pulumi.get(__response__, 'mobile_country_code'), + mobile_network_code=pulumi.get(__response__, 'mobile_network_code'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_key=pulumi.get(__response__, 'service_key'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_attached_data_network.py b/sdk/python/pulumi_azure/mobile/get_network_attached_data_network.py index 7d1e1588e9..b2ac238525 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_attached_data_network.py +++ b/sdk/python/pulumi_azure/mobile/get_network_attached_data_network.py @@ -224,9 +224,6 @@ def get_network_attached_data_network(mobile_network_data_network_name: Optional user_plane_access_ipv4_gateway=pulumi.get(__ret__, 'user_plane_access_ipv4_gateway'), user_plane_access_ipv4_subnet=pulumi.get(__ret__, 'user_plane_access_ipv4_subnet'), user_plane_access_name=pulumi.get(__ret__, 'user_plane_access_name')) - - -@_utilities.lift_output_func(get_network_attached_data_network) def get_network_attached_data_network_output(mobile_network_data_network_name: Optional[pulumi.Input[str]] = None, mobile_network_packet_core_data_plane_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkAttachedDataNetworkResult]: @@ -249,4 +246,22 @@ def get_network_attached_data_network_output(mobile_network_data_network_name: O :param str mobile_network_data_network_name: The Name of the `mobile.NetworkDataNetwork` this resource belongs to. :param str mobile_network_packet_core_data_plane_id: The ID of the `mobile.NetworkPacketCoreDataPlane` which the Mobile Network Attached Data Network belongs to. """ - ... + __args__ = dict() + __args__['mobileNetworkDataNetworkName'] = mobile_network_data_network_name + __args__['mobileNetworkPacketCoreDataPlaneId'] = mobile_network_packet_core_data_plane_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkAttachedDataNetwork:getNetworkAttachedDataNetwork', __args__, opts=opts, typ=GetNetworkAttachedDataNetworkResult) + return __ret__.apply(lambda __response__: GetNetworkAttachedDataNetworkResult( + dns_addresses=pulumi.get(__response__, 'dns_addresses'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + mobile_network_data_network_name=pulumi.get(__response__, 'mobile_network_data_network_name'), + mobile_network_packet_core_data_plane_id=pulumi.get(__response__, 'mobile_network_packet_core_data_plane_id'), + network_address_port_translations=pulumi.get(__response__, 'network_address_port_translations'), + tags=pulumi.get(__response__, 'tags'), + user_equipment_address_pool_prefixes=pulumi.get(__response__, 'user_equipment_address_pool_prefixes'), + user_equipment_static_address_pool_prefixes=pulumi.get(__response__, 'user_equipment_static_address_pool_prefixes'), + user_plane_access_ipv4_address=pulumi.get(__response__, 'user_plane_access_ipv4_address'), + user_plane_access_ipv4_gateway=pulumi.get(__response__, 'user_plane_access_ipv4_gateway'), + user_plane_access_ipv4_subnet=pulumi.get(__response__, 'user_plane_access_ipv4_subnet'), + user_plane_access_name=pulumi.get(__response__, 'user_plane_access_name'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_data_network.py b/sdk/python/pulumi_azure/mobile/get_network_data_network.py index 766060a89b..7682f9a359 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_data_network.py +++ b/sdk/python/pulumi_azure/mobile/get_network_data_network.py @@ -138,9 +138,6 @@ def get_network_data_network(mobile_network_id: Optional[str] = None, mobile_network_id=pulumi.get(__ret__, 'mobile_network_id'), name=pulumi.get(__ret__, 'name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network_data_network) def get_network_data_network_output(mobile_network_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkDataNetworkResult]: @@ -163,4 +160,15 @@ def get_network_data_network_output(mobile_network_id: Optional[pulumi.Input[str :param str mobile_network_id: Specifies the ID of the Mobile Network. :param str name: Specifies the name which should be used for this Mobile Network Data Network. """ - ... + __args__ = dict() + __args__['mobileNetworkId'] = mobile_network_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkDataNetwork:getNetworkDataNetwork', __args__, opts=opts, typ=GetNetworkDataNetworkResult) + return __ret__.apply(lambda __response__: GetNetworkDataNetworkResult( + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + mobile_network_id=pulumi.get(__response__, 'mobile_network_id'), + name=pulumi.get(__response__, 'name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_packet_core_control_plane.py b/sdk/python/pulumi_azure/mobile/get_network_packet_core_control_plane.py index e1c692e566..2ea8cc9bab 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_packet_core_control_plane.py +++ b/sdk/python/pulumi_azure/mobile/get_network_packet_core_control_plane.py @@ -284,9 +284,6 @@ def get_network_packet_core_control_plane(name: Optional[str] = None, software_version=pulumi.get(__ret__, 'software_version'), tags=pulumi.get(__ret__, 'tags'), user_equipment_mtu_in_bytes=pulumi.get(__ret__, 'user_equipment_mtu_in_bytes')) - - -@_utilities.lift_output_func(get_network_packet_core_control_plane) def get_network_packet_core_control_plane_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkPacketCoreControlPlaneResult]: @@ -307,4 +304,27 @@ def get_network_packet_core_control_plane_output(name: Optional[pulumi.Input[str :param str name: The name of the Mobile Network Packet Core Control Plane. :param str resource_group_name: The name of the Resource Group where the Mobile Network Packet Core Control Plane exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkPacketCoreControlPlane:getNetworkPacketCoreControlPlane', __args__, opts=opts, typ=GetNetworkPacketCoreControlPlaneResult) + return __ret__.apply(lambda __response__: GetNetworkPacketCoreControlPlaneResult( + control_plane_access_ipv4_address=pulumi.get(__response__, 'control_plane_access_ipv4_address'), + control_plane_access_ipv4_gateway=pulumi.get(__response__, 'control_plane_access_ipv4_gateway'), + control_plane_access_ipv4_subnet=pulumi.get(__response__, 'control_plane_access_ipv4_subnet'), + control_plane_access_name=pulumi.get(__response__, 'control_plane_access_name'), + core_network_technology=pulumi.get(__response__, 'core_network_technology'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + interoperability_settings_json=pulumi.get(__response__, 'interoperability_settings_json'), + local_diagnostics_accesses=pulumi.get(__response__, 'local_diagnostics_accesses'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + platforms=pulumi.get(__response__, 'platforms'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + site_ids=pulumi.get(__response__, 'site_ids'), + sku=pulumi.get(__response__, 'sku'), + software_version=pulumi.get(__response__, 'software_version'), + tags=pulumi.get(__response__, 'tags'), + user_equipment_mtu_in_bytes=pulumi.get(__response__, 'user_equipment_mtu_in_bytes'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_packet_core_data_plane.py b/sdk/python/pulumi_azure/mobile/get_network_packet_core_data_plane.py index 9deb3741fa..e1e85497a0 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_packet_core_data_plane.py +++ b/sdk/python/pulumi_azure/mobile/get_network_packet_core_data_plane.py @@ -177,9 +177,6 @@ def get_network_packet_core_data_plane(mobile_network_packet_core_control_plane_ user_plane_access_ipv4_gateway=pulumi.get(__ret__, 'user_plane_access_ipv4_gateway'), user_plane_access_ipv4_subnet=pulumi.get(__ret__, 'user_plane_access_ipv4_subnet'), user_plane_access_name=pulumi.get(__ret__, 'user_plane_access_name')) - - -@_utilities.lift_output_func(get_network_packet_core_data_plane) def get_network_packet_core_data_plane_output(mobile_network_packet_core_control_plane_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkPacketCoreDataPlaneResult]: @@ -202,4 +199,18 @@ def get_network_packet_core_data_plane_output(mobile_network_packet_core_control :param str mobile_network_packet_core_control_plane_id: The ID of the Mobile Network Packet Core Data Plane. :param str name: The name of the Mobile Network Packet Core Data Plane. """ - ... + __args__ = dict() + __args__['mobileNetworkPacketCoreControlPlaneId'] = mobile_network_packet_core_control_plane_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkPacketCoreDataPlane:getNetworkPacketCoreDataPlane', __args__, opts=opts, typ=GetNetworkPacketCoreDataPlaneResult) + return __ret__.apply(lambda __response__: GetNetworkPacketCoreDataPlaneResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + mobile_network_packet_core_control_plane_id=pulumi.get(__response__, 'mobile_network_packet_core_control_plane_id'), + name=pulumi.get(__response__, 'name'), + tags=pulumi.get(__response__, 'tags'), + user_plane_access_ipv4_address=pulumi.get(__response__, 'user_plane_access_ipv4_address'), + user_plane_access_ipv4_gateway=pulumi.get(__response__, 'user_plane_access_ipv4_gateway'), + user_plane_access_ipv4_subnet=pulumi.get(__response__, 'user_plane_access_ipv4_subnet'), + user_plane_access_name=pulumi.get(__response__, 'user_plane_access_name'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_service.py b/sdk/python/pulumi_azure/mobile/get_network_service.py index 8bb3fbe1cb..b61ced7836 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_service.py +++ b/sdk/python/pulumi_azure/mobile/get_network_service.py @@ -169,9 +169,6 @@ def get_network_service(mobile_network_id: Optional[str] = None, service_precedence=pulumi.get(__ret__, 'service_precedence'), service_qos_policies=pulumi.get(__ret__, 'service_qos_policies'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network_service) def get_network_service_output(mobile_network_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkServiceResult]: @@ -195,4 +192,17 @@ def get_network_service_output(mobile_network_id: Optional[pulumi.Input[str]] = :param str mobile_network_id: Specifies the ID of the Mobile Network Service. :param str name: Specifies the name which should be used for this Mobile Network Service. """ - ... + __args__ = dict() + __args__['mobileNetworkId'] = mobile_network_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkService:getNetworkService', __args__, opts=opts, typ=GetNetworkServiceResult) + return __ret__.apply(lambda __response__: GetNetworkServiceResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + mobile_network_id=pulumi.get(__response__, 'mobile_network_id'), + name=pulumi.get(__response__, 'name'), + pcc_rules=pulumi.get(__response__, 'pcc_rules'), + service_precedence=pulumi.get(__response__, 'service_precedence'), + service_qos_policies=pulumi.get(__response__, 'service_qos_policies'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_sim.py b/sdk/python/pulumi_azure/mobile/get_network_sim.py index c90ecff294..5dc2f03249 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_sim.py +++ b/sdk/python/pulumi_azure/mobile/get_network_sim.py @@ -192,9 +192,6 @@ def get_network_sim(mobile_network_sim_group_id: Optional[str] = None, static_ip_configurations=pulumi.get(__ret__, 'static_ip_configurations'), vendor_key_fingerprint=pulumi.get(__ret__, 'vendor_key_fingerprint'), vendor_name=pulumi.get(__ret__, 'vendor_name')) - - -@_utilities.lift_output_func(get_network_sim) def get_network_sim_output(mobile_network_sim_group_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkSimResult]: @@ -205,4 +202,20 @@ def get_network_sim_output(mobile_network_sim_group_id: Optional[pulumi.Input[st :param str mobile_network_sim_group_id: The ID of the Mobile Network which the Mobile Network Sim belongs to. :param str name: The name which should be used for this Mobile Network Sim. """ - ... + __args__ = dict() + __args__['mobileNetworkSimGroupId'] = mobile_network_sim_group_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkSim:getNetworkSim', __args__, opts=opts, typ=GetNetworkSimResult) + return __ret__.apply(lambda __response__: GetNetworkSimResult( + device_type=pulumi.get(__response__, 'device_type'), + id=pulumi.get(__response__, 'id'), + integrated_circuit_card_identifier=pulumi.get(__response__, 'integrated_circuit_card_identifier'), + international_mobile_subscriber_identity=pulumi.get(__response__, 'international_mobile_subscriber_identity'), + mobile_network_sim_group_id=pulumi.get(__response__, 'mobile_network_sim_group_id'), + name=pulumi.get(__response__, 'name'), + sim_policy_id=pulumi.get(__response__, 'sim_policy_id'), + sim_state=pulumi.get(__response__, 'sim_state'), + static_ip_configurations=pulumi.get(__response__, 'static_ip_configurations'), + vendor_key_fingerprint=pulumi.get(__response__, 'vendor_key_fingerprint'), + vendor_name=pulumi.get(__response__, 'vendor_name'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_sim_group.py b/sdk/python/pulumi_azure/mobile/get_network_sim_group.py index 585ce7e99e..c13a7be731 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_sim_group.py +++ b/sdk/python/pulumi_azure/mobile/get_network_sim_group.py @@ -152,9 +152,6 @@ def get_network_sim_group(mobile_network_id: Optional[str] = None, mobile_network_id=pulumi.get(__ret__, 'mobile_network_id'), name=pulumi.get(__ret__, 'name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network_sim_group) def get_network_sim_group_output(mobile_network_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkSimGroupResult]: @@ -177,4 +174,16 @@ def get_network_sim_group_output(mobile_network_id: Optional[pulumi.Input[str]] :param str mobile_network_id: The ID of Mobile Network which the Mobile Network Sim Group belongs to. :param str name: Specifies the name which should be used for this Mobile Network Sim Groups. """ - ... + __args__ = dict() + __args__['mobileNetworkId'] = mobile_network_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkSimGroup:getNetworkSimGroup', __args__, opts=opts, typ=GetNetworkSimGroupResult) + return __ret__.apply(lambda __response__: GetNetworkSimGroupResult( + encryption_key_url=pulumi.get(__response__, 'encryption_key_url'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + mobile_network_id=pulumi.get(__response__, 'mobile_network_id'), + name=pulumi.get(__response__, 'name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_sim_policy.py b/sdk/python/pulumi_azure/mobile/get_network_sim_policy.py index ecc7381b2b..7c417956ca 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_sim_policy.py +++ b/sdk/python/pulumi_azure/mobile/get_network_sim_policy.py @@ -191,9 +191,6 @@ def get_network_sim_policy(mobile_network_id: Optional[str] = None, slices=pulumi.get(__ret__, 'slices'), tags=pulumi.get(__ret__, 'tags'), user_equipment_aggregate_maximum_bit_rates=pulumi.get(__ret__, 'user_equipment_aggregate_maximum_bit_rates')) - - -@_utilities.lift_output_func(get_network_sim_policy) def get_network_sim_policy_output(mobile_network_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkSimPolicyResult]: @@ -216,4 +213,19 @@ def get_network_sim_policy_output(mobile_network_id: Optional[pulumi.Input[str]] :param str mobile_network_id: The ID of the Mobile Network which the Sim Policy belongs to. :param str name: The name which should be used for this Mobile Network Sim Policies. """ - ... + __args__ = dict() + __args__['mobileNetworkId'] = mobile_network_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkSimPolicy:getNetworkSimPolicy', __args__, opts=opts, typ=GetNetworkSimPolicyResult) + return __ret__.apply(lambda __response__: GetNetworkSimPolicyResult( + default_slice_id=pulumi.get(__response__, 'default_slice_id'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + mobile_network_id=pulumi.get(__response__, 'mobile_network_id'), + name=pulumi.get(__response__, 'name'), + rat_frequency_selection_priority_index=pulumi.get(__response__, 'rat_frequency_selection_priority_index'), + registration_timer_in_seconds=pulumi.get(__response__, 'registration_timer_in_seconds'), + slices=pulumi.get(__response__, 'slices'), + tags=pulumi.get(__response__, 'tags'), + user_equipment_aggregate_maximum_bit_rates=pulumi.get(__response__, 'user_equipment_aggregate_maximum_bit_rates'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_site.py b/sdk/python/pulumi_azure/mobile/get_network_site.py index 3b861a7295..f57d4c3965 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_site.py +++ b/sdk/python/pulumi_azure/mobile/get_network_site.py @@ -138,9 +138,6 @@ def get_network_site(mobile_network_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), network_function_ids=pulumi.get(__ret__, 'network_function_ids'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network_site) def get_network_site_output(mobile_network_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkSiteResult]: @@ -163,4 +160,15 @@ def get_network_site_output(mobile_network_id: Optional[pulumi.Input[str]] = Non :param str mobile_network_id: the ID of the Mobile Network which the Mobile Network Site belongs to. :param str name: The name which should be used for this Mobile Network Site. """ - ... + __args__ = dict() + __args__['mobileNetworkId'] = mobile_network_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkSite:getNetworkSite', __args__, opts=opts, typ=GetNetworkSiteResult) + return __ret__.apply(lambda __response__: GetNetworkSiteResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + mobile_network_id=pulumi.get(__response__, 'mobile_network_id'), + name=pulumi.get(__response__, 'name'), + network_function_ids=pulumi.get(__response__, 'network_function_ids'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/mobile/get_network_slice.py b/sdk/python/pulumi_azure/mobile/get_network_slice.py index b0db6caa2b..1678b5d9b0 100644 --- a/sdk/python/pulumi_azure/mobile/get_network_slice.py +++ b/sdk/python/pulumi_azure/mobile/get_network_slice.py @@ -152,9 +152,6 @@ def get_network_slice(mobile_network_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), single_network_slice_selection_assistance_informations=pulumi.get(__ret__, 'single_network_slice_selection_assistance_informations'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network_slice) def get_network_slice_output(mobile_network_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkSliceResult]: @@ -177,4 +174,16 @@ def get_network_slice_output(mobile_network_id: Optional[pulumi.Input[str]] = No :param str mobile_network_id: The ID of Mobile Network which the Mobile Network Slice belongs to. :param str name: Specifies the name which should be used for this Mobile Network Slice. """ - ... + __args__ = dict() + __args__['mobileNetworkId'] = mobile_network_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mobile/getNetworkSlice:getNetworkSlice', __args__, opts=opts, typ=GetNetworkSliceResult) + return __ret__.apply(lambda __response__: GetNetworkSliceResult( + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + mobile_network_id=pulumi.get(__response__, 'mobile_network_id'), + name=pulumi.get(__response__, 'name'), + single_network_slice_selection_assistance_informations=pulumi.get(__response__, 'single_network_slice_selection_assistance_informations'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/monitoring/get_action_group.py b/sdk/python/pulumi_azure/monitoring/get_action_group.py index 5d53ef8a1d..ee001fa316 100644 --- a/sdk/python/pulumi_azure/monitoring/get_action_group.py +++ b/sdk/python/pulumi_azure/monitoring/get_action_group.py @@ -271,9 +271,6 @@ def get_action_group(name: Optional[str] = None, sms_receivers=pulumi.get(__ret__, 'sms_receivers'), voice_receivers=pulumi.get(__ret__, 'voice_receivers'), webhook_receivers=pulumi.get(__ret__, 'webhook_receivers')) - - -@_utilities.lift_output_func(get_action_group) def get_action_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetActionGroupResult]: @@ -295,4 +292,25 @@ def get_action_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Action Group. :param str resource_group_name: Specifies the name of the resource group the Action Group is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:monitoring/getActionGroup:getActionGroup', __args__, opts=opts, typ=GetActionGroupResult) + return __ret__.apply(lambda __response__: GetActionGroupResult( + arm_role_receivers=pulumi.get(__response__, 'arm_role_receivers'), + automation_runbook_receivers=pulumi.get(__response__, 'automation_runbook_receivers'), + azure_app_push_receivers=pulumi.get(__response__, 'azure_app_push_receivers'), + azure_function_receivers=pulumi.get(__response__, 'azure_function_receivers'), + email_receivers=pulumi.get(__response__, 'email_receivers'), + enabled=pulumi.get(__response__, 'enabled'), + event_hub_receivers=pulumi.get(__response__, 'event_hub_receivers'), + id=pulumi.get(__response__, 'id'), + itsm_receivers=pulumi.get(__response__, 'itsm_receivers'), + logic_app_receivers=pulumi.get(__response__, 'logic_app_receivers'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + short_name=pulumi.get(__response__, 'short_name'), + sms_receivers=pulumi.get(__response__, 'sms_receivers'), + voice_receivers=pulumi.get(__response__, 'voice_receivers'), + webhook_receivers=pulumi.get(__response__, 'webhook_receivers'))) diff --git a/sdk/python/pulumi_azure/monitoring/get_data_collection_endpoint.py b/sdk/python/pulumi_azure/monitoring/get_data_collection_endpoint.py index 610e9b8272..767c5a780d 100644 --- a/sdk/python/pulumi_azure/monitoring/get_data_collection_endpoint.py +++ b/sdk/python/pulumi_azure/monitoring/get_data_collection_endpoint.py @@ -202,9 +202,6 @@ def get_data_collection_endpoint(name: Optional[str] = None, public_network_access_enabled=pulumi.get(__ret__, 'public_network_access_enabled'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_data_collection_endpoint) def get_data_collection_endpoint_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDataCollectionEndpointResult]: @@ -226,4 +223,20 @@ def get_data_collection_endpoint_output(name: Optional[pulumi.Input[str]] = None :param str name: Specifies the name of the Data Collection Endpoint. :param str resource_group_name: Specifies the name of the resource group the Data Collection Endpoint is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:monitoring/getDataCollectionEndpoint:getDataCollectionEndpoint', __args__, opts=opts, typ=GetDataCollectionEndpointResult) + return __ret__.apply(lambda __response__: GetDataCollectionEndpointResult( + configuration_access_endpoint=pulumi.get(__response__, 'configuration_access_endpoint'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + immutable_id=pulumi.get(__response__, 'immutable_id'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + logs_ingestion_endpoint=pulumi.get(__response__, 'logs_ingestion_endpoint'), + name=pulumi.get(__response__, 'name'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/monitoring/get_data_collection_rule.py b/sdk/python/pulumi_azure/monitoring/get_data_collection_rule.py index f891eccaad..a8e9c9a937 100644 --- a/sdk/python/pulumi_azure/monitoring/get_data_collection_rule.py +++ b/sdk/python/pulumi_azure/monitoring/get_data_collection_rule.py @@ -242,9 +242,6 @@ def get_data_collection_rule(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), stream_declarations=pulumi.get(__ret__, 'stream_declarations'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_data_collection_rule) def get_data_collection_rule_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDataCollectionRuleResult]: @@ -266,4 +263,23 @@ def get_data_collection_rule_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Data Collection Rule. :param str resource_group_name: Specifies the name of the resource group the Data Collection Rule is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:monitoring/getDataCollectionRule:getDataCollectionRule', __args__, opts=opts, typ=GetDataCollectionRuleResult) + return __ret__.apply(lambda __response__: GetDataCollectionRuleResult( + data_collection_endpoint_id=pulumi.get(__response__, 'data_collection_endpoint_id'), + data_flows=pulumi.get(__response__, 'data_flows'), + data_sources=pulumi.get(__response__, 'data_sources'), + description=pulumi.get(__response__, 'description'), + destinations=pulumi.get(__response__, 'destinations'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + immutable_id=pulumi.get(__response__, 'immutable_id'), + kind=pulumi.get(__response__, 'kind'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + stream_declarations=pulumi.get(__response__, 'stream_declarations'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/monitoring/get_diagnostic_categories.py b/sdk/python/pulumi_azure/monitoring/get_diagnostic_categories.py index f715ce9d54..aa1c5aed55 100644 --- a/sdk/python/pulumi_azure/monitoring/get_diagnostic_categories.py +++ b/sdk/python/pulumi_azure/monitoring/get_diagnostic_categories.py @@ -124,9 +124,6 @@ def get_diagnostic_categories(resource_id: Optional[str] = None, log_category_types=pulumi.get(__ret__, 'log_category_types'), metrics=pulumi.get(__ret__, 'metrics'), resource_id=pulumi.get(__ret__, 'resource_id')) - - -@_utilities.lift_output_func(get_diagnostic_categories) def get_diagnostic_categories_output(resource_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDiagnosticCategoriesResult]: """ @@ -146,4 +143,13 @@ def get_diagnostic_categories_output(resource_id: Optional[pulumi.Input[str]] = :param str resource_id: The ID of an existing Resource which Monitor Diagnostics Categories should be retrieved for. """ - ... + __args__ = dict() + __args__['resourceId'] = resource_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:monitoring/getDiagnosticCategories:getDiagnosticCategories', __args__, opts=opts, typ=GetDiagnosticCategoriesResult) + return __ret__.apply(lambda __response__: GetDiagnosticCategoriesResult( + id=pulumi.get(__response__, 'id'), + log_category_groups=pulumi.get(__response__, 'log_category_groups'), + log_category_types=pulumi.get(__response__, 'log_category_types'), + metrics=pulumi.get(__response__, 'metrics'), + resource_id=pulumi.get(__response__, 'resource_id'))) diff --git a/sdk/python/pulumi_azure/monitoring/get_scheduled_query_rules_alert.py b/sdk/python/pulumi_azure/monitoring/get_scheduled_query_rules_alert.py index 14bb176242..80e9823fe0 100644 --- a/sdk/python/pulumi_azure/monitoring/get_scheduled_query_rules_alert.py +++ b/sdk/python/pulumi_azure/monitoring/get_scheduled_query_rules_alert.py @@ -278,9 +278,6 @@ def get_scheduled_query_rules_alert(name: Optional[str] = None, throttling=pulumi.get(__ret__, 'throttling'), time_window=pulumi.get(__ret__, 'time_window'), triggers=pulumi.get(__ret__, 'triggers')) - - -@_utilities.lift_output_func(get_scheduled_query_rules_alert) def get_scheduled_query_rules_alert_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetScheduledQueryRulesAlertResult]: @@ -302,4 +299,26 @@ def get_scheduled_query_rules_alert_output(name: Optional[pulumi.Input[str]] = N :param str name: Specifies the name of the scheduled query rule. :param str resource_group_name: Specifies the name of the resource group where the scheduled query rule is located. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:monitoring/getScheduledQueryRulesAlert:getScheduledQueryRulesAlert', __args__, opts=opts, typ=GetScheduledQueryRulesAlertResult) + return __ret__.apply(lambda __response__: GetScheduledQueryRulesAlertResult( + actions=pulumi.get(__response__, 'actions'), + authorized_resource_ids=pulumi.get(__response__, 'authorized_resource_ids'), + data_source_id=pulumi.get(__response__, 'data_source_id'), + description=pulumi.get(__response__, 'description'), + enabled=pulumi.get(__response__, 'enabled'), + frequency=pulumi.get(__response__, 'frequency'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + query=pulumi.get(__response__, 'query'), + query_type=pulumi.get(__response__, 'query_type'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + severity=pulumi.get(__response__, 'severity'), + tags=pulumi.get(__response__, 'tags'), + throttling=pulumi.get(__response__, 'throttling'), + time_window=pulumi.get(__response__, 'time_window'), + triggers=pulumi.get(__response__, 'triggers'))) diff --git a/sdk/python/pulumi_azure/monitoring/get_scheduled_query_rules_log.py b/sdk/python/pulumi_azure/monitoring/get_scheduled_query_rules_log.py index ee2d243e1f..139cbfdb86 100644 --- a/sdk/python/pulumi_azure/monitoring/get_scheduled_query_rules_log.py +++ b/sdk/python/pulumi_azure/monitoring/get_scheduled_query_rules_log.py @@ -190,9 +190,6 @@ def get_scheduled_query_rules_log(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_scheduled_query_rules_log) def get_scheduled_query_rules_log_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetScheduledQueryRulesLogResult]: @@ -214,4 +211,19 @@ def get_scheduled_query_rules_log_output(name: Optional[pulumi.Input[str]] = Non :param str name: Specifies the name of the scheduled query rule. :param str resource_group_name: Specifies the name of the resource group where the scheduled query rule is located. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:monitoring/getScheduledQueryRulesLog:getScheduledQueryRulesLog', __args__, opts=opts, typ=GetScheduledQueryRulesLogResult) + return __ret__.apply(lambda __response__: GetScheduledQueryRulesLogResult( + authorized_resource_ids=pulumi.get(__response__, 'authorized_resource_ids'), + criterias=pulumi.get(__response__, 'criterias'), + data_source_id=pulumi.get(__response__, 'data_source_id'), + description=pulumi.get(__response__, 'description'), + enabled=pulumi.get(__response__, 'enabled'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/monitoring/get_workspace.py b/sdk/python/pulumi_azure/monitoring/get_workspace.py index 8f3f0aefff..ad80ebc629 100644 --- a/sdk/python/pulumi_azure/monitoring/get_workspace.py +++ b/sdk/python/pulumi_azure/monitoring/get_workspace.py @@ -176,9 +176,6 @@ def get_workspace(name: Optional[str] = None, query_endpoint=pulumi.get(__ret__, 'query_endpoint'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_workspace) def get_workspace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWorkspaceResult]: @@ -200,4 +197,18 @@ def get_workspace_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Workspace. :param str resource_group_name: Specifies the name of the resource group the Workspace is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:monitoring/getWorkspace:getWorkspace', __args__, opts=opts, typ=GetWorkspaceResult) + return __ret__.apply(lambda __response__: GetWorkspaceResult( + default_data_collection_endpoint_id=pulumi.get(__response__, 'default_data_collection_endpoint_id'), + default_data_collection_rule_id=pulumi.get(__response__, 'default_data_collection_rule_id'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + query_endpoint=pulumi.get(__response__, 'query_endpoint'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/mssql/get_database.py b/sdk/python/pulumi_azure/mssql/get_database.py index e84969ac4e..172b4117ed 100644 --- a/sdk/python/pulumi_azure/mssql/get_database.py +++ b/sdk/python/pulumi_azure/mssql/get_database.py @@ -304,9 +304,6 @@ def get_database(name: Optional[str] = None, transparent_data_encryption_key_automatic_rotation_enabled=pulumi.get(__ret__, 'transparent_data_encryption_key_automatic_rotation_enabled'), transparent_data_encryption_key_vault_key_id=pulumi.get(__ret__, 'transparent_data_encryption_key_vault_key_id'), zone_redundant=pulumi.get(__ret__, 'zone_redundant')) - - -@_utilities.lift_output_func(get_database) def get_database_output(name: Optional[pulumi.Input[str]] = None, server_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDatabaseResult]: @@ -338,4 +335,27 @@ def get_database_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the MS SQL Database. :param str server_id: The id of the MS SQL Server on which to read the database. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['serverId'] = server_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mssql/getDatabase:getDatabase', __args__, opts=opts, typ=GetDatabaseResult) + return __ret__.apply(lambda __response__: GetDatabaseResult( + collation=pulumi.get(__response__, 'collation'), + elastic_pool_id=pulumi.get(__response__, 'elastic_pool_id'), + enclave_type=pulumi.get(__response__, 'enclave_type'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + license_type=pulumi.get(__response__, 'license_type'), + max_size_gb=pulumi.get(__response__, 'max_size_gb'), + name=pulumi.get(__response__, 'name'), + read_replica_count=pulumi.get(__response__, 'read_replica_count'), + read_scale=pulumi.get(__response__, 'read_scale'), + server_id=pulumi.get(__response__, 'server_id'), + sku_name=pulumi.get(__response__, 'sku_name'), + storage_account_type=pulumi.get(__response__, 'storage_account_type'), + tags=pulumi.get(__response__, 'tags'), + transparent_data_encryption_enabled=pulumi.get(__response__, 'transparent_data_encryption_enabled'), + transparent_data_encryption_key_automatic_rotation_enabled=pulumi.get(__response__, 'transparent_data_encryption_key_automatic_rotation_enabled'), + transparent_data_encryption_key_vault_key_id=pulumi.get(__response__, 'transparent_data_encryption_key_vault_key_id'), + zone_redundant=pulumi.get(__response__, 'zone_redundant'))) diff --git a/sdk/python/pulumi_azure/mssql/get_elastic_pool.py b/sdk/python/pulumi_azure/mssql/get_elastic_pool.py index 8a4a327046..2bdb53ef6c 100644 --- a/sdk/python/pulumi_azure/mssql/get_elastic_pool.py +++ b/sdk/python/pulumi_azure/mssql/get_elastic_pool.py @@ -246,9 +246,6 @@ def get_elastic_pool(name: Optional[str] = None, skus=pulumi.get(__ret__, 'skus'), tags=pulumi.get(__ret__, 'tags'), zone_redundant=pulumi.get(__ret__, 'zone_redundant')) - - -@_utilities.lift_output_func(get_elastic_pool) def get_elastic_pool_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, server_name: Optional[pulumi.Input[str]] = None, @@ -273,4 +270,24 @@ def get_elastic_pool_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The name of the resource group which contains the elastic pool. :param str server_name: The name of the SQL Server which contains the elastic pool. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['serverName'] = server_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mssql/getElasticPool:getElasticPool', __args__, opts=opts, typ=GetElasticPoolResult) + return __ret__.apply(lambda __response__: GetElasticPoolResult( + enclave_type=pulumi.get(__response__, 'enclave_type'), + id=pulumi.get(__response__, 'id'), + license_type=pulumi.get(__response__, 'license_type'), + location=pulumi.get(__response__, 'location'), + max_size_bytes=pulumi.get(__response__, 'max_size_bytes'), + max_size_gb=pulumi.get(__response__, 'max_size_gb'), + name=pulumi.get(__response__, 'name'), + per_db_max_capacity=pulumi.get(__response__, 'per_db_max_capacity'), + per_db_min_capacity=pulumi.get(__response__, 'per_db_min_capacity'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + server_name=pulumi.get(__response__, 'server_name'), + skus=pulumi.get(__response__, 'skus'), + tags=pulumi.get(__response__, 'tags'), + zone_redundant=pulumi.get(__response__, 'zone_redundant'))) diff --git a/sdk/python/pulumi_azure/mssql/get_managed_instance.py b/sdk/python/pulumi_azure/mssql/get_managed_instance.py index 1c2278f23f..1a554e3630 100644 --- a/sdk/python/pulumi_azure/mssql/get_managed_instance.py +++ b/sdk/python/pulumi_azure/mssql/get_managed_instance.py @@ -342,9 +342,6 @@ def get_managed_instance(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), timezone_id=pulumi.get(__ret__, 'timezone_id'), vcores=pulumi.get(__ret__, 'vcores')) - - -@_utilities.lift_output_func(get_managed_instance) def get_managed_instance_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetManagedInstanceResult]: @@ -365,4 +362,31 @@ def get_managed_instance_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the SQL Managed Instance. :param str resource_group_name: The name of the resource group where the SQL Managed Instance exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mssql/getManagedInstance:getManagedInstance', __args__, opts=opts, typ=GetManagedInstanceResult) + return __ret__.apply(lambda __response__: GetManagedInstanceResult( + administrator_login=pulumi.get(__response__, 'administrator_login'), + collation=pulumi.get(__response__, 'collation'), + customer_managed_key_id=pulumi.get(__response__, 'customer_managed_key_id'), + dns_zone=pulumi.get(__response__, 'dns_zone'), + dns_zone_partner_id=pulumi.get(__response__, 'dns_zone_partner_id'), + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + license_type=pulumi.get(__response__, 'license_type'), + location=pulumi.get(__response__, 'location'), + minimum_tls_version=pulumi.get(__response__, 'minimum_tls_version'), + name=pulumi.get(__response__, 'name'), + proxy_override=pulumi.get(__response__, 'proxy_override'), + public_data_endpoint_enabled=pulumi.get(__response__, 'public_data_endpoint_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + storage_account_type=pulumi.get(__response__, 'storage_account_type'), + storage_size_in_gb=pulumi.get(__response__, 'storage_size_in_gb'), + subnet_id=pulumi.get(__response__, 'subnet_id'), + tags=pulumi.get(__response__, 'tags'), + timezone_id=pulumi.get(__response__, 'timezone_id'), + vcores=pulumi.get(__response__, 'vcores'))) diff --git a/sdk/python/pulumi_azure/mssql/get_server.py b/sdk/python/pulumi_azure/mssql/get_server.py index 8f7db79425..1756f4ddac 100644 --- a/sdk/python/pulumi_azure/mssql/get_server.py +++ b/sdk/python/pulumi_azure/mssql/get_server.py @@ -203,9 +203,6 @@ def get_server(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), transparent_data_encryption_key_vault_key_id=pulumi.get(__ret__, 'transparent_data_encryption_key_vault_key_id'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_server) def get_server_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServerResult]: @@ -227,4 +224,20 @@ def get_server_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Microsoft SQL Server. :param str resource_group_name: The name of the Resource Group where the Microsoft SQL Server exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mssql/getServer:getServer', __args__, opts=opts, typ=GetServerResult) + return __ret__.apply(lambda __response__: GetServerResult( + administrator_login=pulumi.get(__response__, 'administrator_login'), + fully_qualified_domain_name=pulumi.get(__response__, 'fully_qualified_domain_name'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + restorable_dropped_database_ids=pulumi.get(__response__, 'restorable_dropped_database_ids'), + tags=pulumi.get(__response__, 'tags'), + transparent_data_encryption_key_vault_key_id=pulumi.get(__response__, 'transparent_data_encryption_key_vault_key_id'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_azure/mysql/get_flexible_server.py b/sdk/python/pulumi_azure/mysql/get_flexible_server.py index 93e4834bb7..39e1ef21e7 100644 --- a/sdk/python/pulumi_azure/mysql/get_flexible_server.py +++ b/sdk/python/pulumi_azure/mysql/get_flexible_server.py @@ -330,9 +330,6 @@ def get_flexible_server(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), version=pulumi.get(__ret__, 'version'), zone=pulumi.get(__ret__, 'zone')) - - -@_utilities.lift_output_func(get_flexible_server) def get_flexible_server_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetFlexibleServerResult]: @@ -354,4 +351,30 @@ def get_flexible_server_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the MySQL Flexible Server. :param str resource_group_name: The name of the resource group for the MySQL Flexible Server. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:mysql/getFlexibleServer:getFlexibleServer', __args__, opts=opts, typ=GetFlexibleServerResult) + return __ret__.apply(lambda __response__: GetFlexibleServerResult( + administrator_login=pulumi.get(__response__, 'administrator_login'), + backup_retention_days=pulumi.get(__response__, 'backup_retention_days'), + delegated_subnet_id=pulumi.get(__response__, 'delegated_subnet_id'), + fqdn=pulumi.get(__response__, 'fqdn'), + geo_redundant_backup_enabled=pulumi.get(__response__, 'geo_redundant_backup_enabled'), + high_availabilities=pulumi.get(__response__, 'high_availabilities'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + maintenance_windows=pulumi.get(__response__, 'maintenance_windows'), + name=pulumi.get(__response__, 'name'), + private_dns_zone_id=pulumi.get(__response__, 'private_dns_zone_id'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + replica_capacity=pulumi.get(__response__, 'replica_capacity'), + replication_role=pulumi.get(__response__, 'replication_role'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + restore_point_in_time=pulumi.get(__response__, 'restore_point_in_time'), + sku_name=pulumi.get(__response__, 'sku_name'), + storages=pulumi.get(__response__, 'storages'), + tags=pulumi.get(__response__, 'tags'), + version=pulumi.get(__response__, 'version'), + zone=pulumi.get(__response__, 'zone'))) diff --git a/sdk/python/pulumi_azure/netapp/get_account.py b/sdk/python/pulumi_azure/netapp/get_account.py index 02cd279968..7038d85d9a 100644 --- a/sdk/python/pulumi_azure/netapp/get_account.py +++ b/sdk/python/pulumi_azure/netapp/get_account.py @@ -135,9 +135,6 @@ def get_account(identity: Optional[Union['GetAccountIdentityArgs', 'GetAccountId name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_account) def get_account_output(identity: Optional[pulumi.Input[Optional[Union['GetAccountIdentityArgs', 'GetAccountIdentityArgsDict']]]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -160,4 +157,16 @@ def get_account_output(identity: Optional[pulumi.Input[Optional[Union['GetAccoun :param str name: The name of the NetApp Account. :param str resource_group_name: The Name of the Resource Group where the NetApp Account exists. """ - ... + __args__ = dict() + __args__['identity'] = identity + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:netapp/getAccount:getAccount', __args__, opts=opts, typ=GetAccountResult) + return __ret__.apply(lambda __response__: GetAccountResult( + id=pulumi.get(__response__, 'id'), + identity=pulumi.get(__response__, 'identity'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/netapp/get_account_encryption.py b/sdk/python/pulumi_azure/netapp/get_account_encryption.py index 3e9c724ebd..49ffdfa4b1 100644 --- a/sdk/python/pulumi_azure/netapp/get_account_encryption.py +++ b/sdk/python/pulumi_azure/netapp/get_account_encryption.py @@ -123,9 +123,6 @@ def get_account_encryption(encryption_key: Optional[str] = None, netapp_account_id=pulumi.get(__ret__, 'netapp_account_id'), system_assigned_identity_principal_id=pulumi.get(__ret__, 'system_assigned_identity_principal_id'), user_assigned_identity_id=pulumi.get(__ret__, 'user_assigned_identity_id')) - - -@_utilities.lift_output_func(get_account_encryption) def get_account_encryption_output(encryption_key: Optional[pulumi.Input[Optional[str]]] = None, netapp_account_id: Optional[pulumi.Input[str]] = None, system_assigned_identity_principal_id: Optional[pulumi.Input[Optional[str]]] = None, @@ -150,4 +147,16 @@ def get_account_encryption_output(encryption_key: Optional[pulumi.Input[Optional :param str system_assigned_identity_principal_id: The ID of the System Assigned Manged Identity. :param str user_assigned_identity_id: The ID of the User Assigned Managed Identity. """ - ... + __args__ = dict() + __args__['encryptionKey'] = encryption_key + __args__['netappAccountId'] = netapp_account_id + __args__['systemAssignedIdentityPrincipalId'] = system_assigned_identity_principal_id + __args__['userAssignedIdentityId'] = user_assigned_identity_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:netapp/getAccountEncryption:getAccountEncryption', __args__, opts=opts, typ=GetAccountEncryptionResult) + return __ret__.apply(lambda __response__: GetAccountEncryptionResult( + encryption_key=pulumi.get(__response__, 'encryption_key'), + id=pulumi.get(__response__, 'id'), + netapp_account_id=pulumi.get(__response__, 'netapp_account_id'), + system_assigned_identity_principal_id=pulumi.get(__response__, 'system_assigned_identity_principal_id'), + user_assigned_identity_id=pulumi.get(__response__, 'user_assigned_identity_id'))) diff --git a/sdk/python/pulumi_azure/netapp/get_pool.py b/sdk/python/pulumi_azure/netapp/get_pool.py index d59774e95b..ed7fc7a90f 100644 --- a/sdk/python/pulumi_azure/netapp/get_pool.py +++ b/sdk/python/pulumi_azure/netapp/get_pool.py @@ -164,9 +164,6 @@ def get_pool(account_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), service_level=pulumi.get(__ret__, 'service_level'), size_in_tb=pulumi.get(__ret__, 'size_in_tb')) - - -@_utilities.lift_output_func(get_pool) def get_pool_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -191,4 +188,18 @@ def get_pool_output(account_name: Optional[pulumi.Input[str]] = None, :param str name: The name of the NetApp Pool. :param str resource_group_name: The Name of the Resource Group where the NetApp Pool exists. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:netapp/getPool:getPool', __args__, opts=opts, typ=GetPoolResult) + return __ret__.apply(lambda __response__: GetPoolResult( + account_name=pulumi.get(__response__, 'account_name'), + encryption_type=pulumi.get(__response__, 'encryption_type'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_level=pulumi.get(__response__, 'service_level'), + size_in_tb=pulumi.get(__response__, 'size_in_tb'))) diff --git a/sdk/python/pulumi_azure/netapp/get_snapshot.py b/sdk/python/pulumi_azure/netapp/get_snapshot.py index a5f96d290c..bdf07d2b59 100644 --- a/sdk/python/pulumi_azure/netapp/get_snapshot.py +++ b/sdk/python/pulumi_azure/netapp/get_snapshot.py @@ -153,9 +153,6 @@ def get_snapshot(account_name: Optional[str] = None, pool_name=pulumi.get(__ret__, 'pool_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), volume_name=pulumi.get(__ret__, 'volume_name')) - - -@_utilities.lift_output_func(get_snapshot) def get_snapshot_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, pool_name: Optional[pulumi.Input[str]] = None, @@ -186,4 +183,19 @@ def get_snapshot_output(account_name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group where the NetApp Snapshot exists. :param str volume_name: The name of the NetApp Volume where the NetApp Snapshot exists. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['poolName'] = pool_name + __args__['resourceGroupName'] = resource_group_name + __args__['volumeName'] = volume_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:netapp/getSnapshot:getSnapshot', __args__, opts=opts, typ=GetSnapshotResult) + return __ret__.apply(lambda __response__: GetSnapshotResult( + account_name=pulumi.get(__response__, 'account_name'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + pool_name=pulumi.get(__response__, 'pool_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + volume_name=pulumi.get(__response__, 'volume_name'))) diff --git a/sdk/python/pulumi_azure/netapp/get_snapshot_policy.py b/sdk/python/pulumi_azure/netapp/get_snapshot_policy.py index ec5f1423de..d76fbc5f18 100644 --- a/sdk/python/pulumi_azure/netapp/get_snapshot_policy.py +++ b/sdk/python/pulumi_azure/netapp/get_snapshot_policy.py @@ -216,9 +216,6 @@ def get_snapshot_policy(account_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), weekly_schedules=pulumi.get(__ret__, 'weekly_schedules')) - - -@_utilities.lift_output_func(get_snapshot_policy) def get_snapshot_policy_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -249,4 +246,21 @@ def get_snapshot_policy_output(account_name: Optional[pulumi.Input[str]] = None, :param str name: The name of the NetApp Snapshot Policy. :param str resource_group_name: The Name of the Resource Group where the NetApp Snapshot Policy exists. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:netapp/getSnapshotPolicy:getSnapshotPolicy', __args__, opts=opts, typ=GetSnapshotPolicyResult) + return __ret__.apply(lambda __response__: GetSnapshotPolicyResult( + account_name=pulumi.get(__response__, 'account_name'), + daily_schedules=pulumi.get(__response__, 'daily_schedules'), + enabled=pulumi.get(__response__, 'enabled'), + hourly_schedules=pulumi.get(__response__, 'hourly_schedules'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + monthly_schedules=pulumi.get(__response__, 'monthly_schedules'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + weekly_schedules=pulumi.get(__response__, 'weekly_schedules'))) diff --git a/sdk/python/pulumi_azure/netapp/get_volume.py b/sdk/python/pulumi_azure/netapp/get_volume.py index c71d0c6766..b13e55020e 100644 --- a/sdk/python/pulumi_azure/netapp/get_volume.py +++ b/sdk/python/pulumi_azure/netapp/get_volume.py @@ -319,9 +319,6 @@ def get_volume(account_name: Optional[str] = None, subnet_id=pulumi.get(__ret__, 'subnet_id'), volume_path=pulumi.get(__ret__, 'volume_path'), zone=pulumi.get(__ret__, 'zone')) - - -@_utilities.lift_output_func(get_volume) def get_volume_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, pool_name: Optional[pulumi.Input[str]] = None, @@ -351,4 +348,32 @@ def get_volume_output(account_name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group where the NetApp Volume exists. :param str security_style: Volume security style """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['poolName'] = pool_name + __args__['resourceGroupName'] = resource_group_name + __args__['securityStyle'] = security_style + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:netapp/getVolume:getVolume', __args__, opts=opts, typ=GetVolumeResult) + return __ret__.apply(lambda __response__: GetVolumeResult( + account_name=pulumi.get(__response__, 'account_name'), + data_protection_replications=pulumi.get(__response__, 'data_protection_replications'), + encryption_key_source=pulumi.get(__response__, 'encryption_key_source'), + id=pulumi.get(__response__, 'id'), + key_vault_private_endpoint_id=pulumi.get(__response__, 'key_vault_private_endpoint_id'), + location=pulumi.get(__response__, 'location'), + mount_ip_addresses=pulumi.get(__response__, 'mount_ip_addresses'), + name=pulumi.get(__response__, 'name'), + network_features=pulumi.get(__response__, 'network_features'), + pool_name=pulumi.get(__response__, 'pool_name'), + protocols=pulumi.get(__response__, 'protocols'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + security_style=pulumi.get(__response__, 'security_style'), + service_level=pulumi.get(__response__, 'service_level'), + smb_access_based_enumeration_enabled=pulumi.get(__response__, 'smb_access_based_enumeration_enabled'), + smb_non_browsable_enabled=pulumi.get(__response__, 'smb_non_browsable_enabled'), + storage_quota_in_gb=pulumi.get(__response__, 'storage_quota_in_gb'), + subnet_id=pulumi.get(__response__, 'subnet_id'), + volume_path=pulumi.get(__response__, 'volume_path'), + zone=pulumi.get(__response__, 'zone'))) diff --git a/sdk/python/pulumi_azure/netapp/get_volume_group_sap_hana.py b/sdk/python/pulumi_azure/netapp/get_volume_group_sap_hana.py index 6b90da5d7d..9213df4750 100644 --- a/sdk/python/pulumi_azure/netapp/get_volume_group_sap_hana.py +++ b/sdk/python/pulumi_azure/netapp/get_volume_group_sap_hana.py @@ -168,9 +168,6 @@ def get_volume_group_sap_hana(account_name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), volumes=pulumi.get(__ret__, 'volumes')) - - -@_utilities.lift_output_func(get_volume_group_sap_hana) def get_volume_group_sap_hana_output(account_name: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -195,4 +192,18 @@ def get_volume_group_sap_hana_output(account_name: Optional[pulumi.Input[str]] = :param str name: The name of this Application Volume Group for SAP HANA application. :param str resource_group_name: The name of the Resource Group where the Application Volume Group exists. """ - ... + __args__ = dict() + __args__['accountName'] = account_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:netapp/getVolumeGroupSapHana:getVolumeGroupSapHana', __args__, opts=opts, typ=GetVolumeGroupSapHanaResult) + return __ret__.apply(lambda __response__: GetVolumeGroupSapHanaResult( + account_name=pulumi.get(__response__, 'account_name'), + application_identifier=pulumi.get(__response__, 'application_identifier'), + group_description=pulumi.get(__response__, 'group_description'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + volumes=pulumi.get(__response__, 'volumes'))) diff --git a/sdk/python/pulumi_azure/netapp/get_volume_quota_rule.py b/sdk/python/pulumi_azure/netapp/get_volume_quota_rule.py index 58e61951af..65b847554d 100644 --- a/sdk/python/pulumi_azure/netapp/get_volume_quota_rule.py +++ b/sdk/python/pulumi_azure/netapp/get_volume_quota_rule.py @@ -150,9 +150,6 @@ def get_volume_quota_rule(name: Optional[str] = None, quota_target=pulumi.get(__ret__, 'quota_target'), quota_type=pulumi.get(__ret__, 'quota_type'), volume_id=pulumi.get(__ret__, 'volume_id')) - - -@_utilities.lift_output_func(get_volume_quota_rule) def get_volume_quota_rule_output(name: Optional[pulumi.Input[str]] = None, volume_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVolumeQuotaRuleResult]: @@ -174,4 +171,16 @@ def get_volume_quota_rule_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Volume Quota Rule. :param str volume_id: The NetApp volume ID where the Volume Quota Rule is assigned to. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['volumeId'] = volume_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:netapp/getVolumeQuotaRule:getVolumeQuotaRule', __args__, opts=opts, typ=GetVolumeQuotaRuleResult) + return __ret__.apply(lambda __response__: GetVolumeQuotaRuleResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + quota_size_in_kib=pulumi.get(__response__, 'quota_size_in_kib'), + quota_target=pulumi.get(__response__, 'quota_target'), + quota_type=pulumi.get(__response__, 'quota_type'), + volume_id=pulumi.get(__response__, 'volume_id'))) diff --git a/sdk/python/pulumi_azure/network/get_application_gateway.py b/sdk/python/pulumi_azure/network/get_application_gateway.py index d16bcbac10..bfe4016a79 100644 --- a/sdk/python/pulumi_azure/network/get_application_gateway.py +++ b/sdk/python/pulumi_azure/network/get_application_gateway.py @@ -515,9 +515,6 @@ def get_application_gateway(name: Optional[str] = None, url_path_maps=pulumi.get(__ret__, 'url_path_maps'), waf_configurations=pulumi.get(__ret__, 'waf_configurations'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_application_gateway) def get_application_gateway_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetApplicationGatewayResult]: @@ -539,4 +536,44 @@ def get_application_gateway_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Application Gateway. :param str resource_group_name: The name of the Resource Group where the Application Gateway exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getApplicationGateway:getApplicationGateway', __args__, opts=opts, typ=GetApplicationGatewayResult) + return __ret__.apply(lambda __response__: GetApplicationGatewayResult( + authentication_certificates=pulumi.get(__response__, 'authentication_certificates'), + autoscale_configurations=pulumi.get(__response__, 'autoscale_configurations'), + backend_address_pools=pulumi.get(__response__, 'backend_address_pools'), + backend_http_settings=pulumi.get(__response__, 'backend_http_settings'), + custom_error_configurations=pulumi.get(__response__, 'custom_error_configurations'), + fips_enabled=pulumi.get(__response__, 'fips_enabled'), + firewall_policy_id=pulumi.get(__response__, 'firewall_policy_id'), + force_firewall_policy_association=pulumi.get(__response__, 'force_firewall_policy_association'), + frontend_ip_configurations=pulumi.get(__response__, 'frontend_ip_configurations'), + frontend_ports=pulumi.get(__response__, 'frontend_ports'), + gateway_ip_configurations=pulumi.get(__response__, 'gateway_ip_configurations'), + globals=pulumi.get(__response__, 'globals'), + http2_enabled=pulumi.get(__response__, 'http2_enabled'), + http_listeners=pulumi.get(__response__, 'http_listeners'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + private_endpoint_connections=pulumi.get(__response__, 'private_endpoint_connections'), + private_link_configurations=pulumi.get(__response__, 'private_link_configurations'), + probes=pulumi.get(__response__, 'probes'), + redirect_configurations=pulumi.get(__response__, 'redirect_configurations'), + request_routing_rules=pulumi.get(__response__, 'request_routing_rules'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + rewrite_rule_sets=pulumi.get(__response__, 'rewrite_rule_sets'), + skus=pulumi.get(__response__, 'skus'), + ssl_certificates=pulumi.get(__response__, 'ssl_certificates'), + ssl_policies=pulumi.get(__response__, 'ssl_policies'), + ssl_profiles=pulumi.get(__response__, 'ssl_profiles'), + tags=pulumi.get(__response__, 'tags'), + trusted_client_certificates=pulumi.get(__response__, 'trusted_client_certificates'), + trusted_root_certificates=pulumi.get(__response__, 'trusted_root_certificates'), + url_path_maps=pulumi.get(__response__, 'url_path_maps'), + waf_configurations=pulumi.get(__response__, 'waf_configurations'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/network/get_application_security_group.py b/sdk/python/pulumi_azure/network/get_application_security_group.py index 4167b14eb3..71a26d3c69 100644 --- a/sdk/python/pulumi_azure/network/get_application_security_group.py +++ b/sdk/python/pulumi_azure/network/get_application_security_group.py @@ -124,9 +124,6 @@ def get_application_security_group(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_application_security_group) def get_application_security_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetApplicationSecurityGroupResult]: @@ -148,4 +145,14 @@ def get_application_security_group_output(name: Optional[pulumi.Input[str]] = No :param str name: The name of the Application Security Group. :param str resource_group_name: The name of the resource group in which the Application Security Group exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getApplicationSecurityGroup:getApplicationSecurityGroup', __args__, opts=opts, typ=GetApplicationSecurityGroupResult) + return __ret__.apply(lambda __response__: GetApplicationSecurityGroupResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_express_route_circuit.py b/sdk/python/pulumi_azure/network/get_express_route_circuit.py index 2e6f4fbe0e..0c91642e5b 100644 --- a/sdk/python/pulumi_azure/network/get_express_route_circuit.py +++ b/sdk/python/pulumi_azure/network/get_express_route_circuit.py @@ -178,9 +178,6 @@ def get_express_route_circuit(name: Optional[str] = None, service_provider_properties=pulumi.get(__ret__, 'service_provider_properties'), service_provider_provisioning_state=pulumi.get(__ret__, 'service_provider_provisioning_state'), sku=pulumi.get(__ret__, 'sku')) - - -@_utilities.lift_output_func(get_express_route_circuit) def get_express_route_circuit_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetExpressRouteCircuitResult]: @@ -203,4 +200,18 @@ def get_express_route_circuit_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the ExpressRoute circuit. :param str resource_group_name: The Name of the Resource Group where the ExpressRoute circuit exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getExpressRouteCircuit:getExpressRouteCircuit', __args__, opts=opts, typ=GetExpressRouteCircuitResult) + return __ret__.apply(lambda __response__: GetExpressRouteCircuitResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + peerings=pulumi.get(__response__, 'peerings'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_key=pulumi.get(__response__, 'service_key'), + service_provider_properties=pulumi.get(__response__, 'service_provider_properties'), + service_provider_provisioning_state=pulumi.get(__response__, 'service_provider_provisioning_state'), + sku=pulumi.get(__response__, 'sku'))) diff --git a/sdk/python/pulumi_azure/network/get_firewall.py b/sdk/python/pulumi_azure/network/get_firewall.py index 48eb1ce8fc..81b6d8acd7 100644 --- a/sdk/python/pulumi_azure/network/get_firewall.py +++ b/sdk/python/pulumi_azure/network/get_firewall.py @@ -258,9 +258,6 @@ def get_firewall(dns_proxy_enabled: Optional[bool] = None, threat_intel_mode=pulumi.get(__ret__, 'threat_intel_mode'), virtual_hubs=pulumi.get(__ret__, 'virtual_hubs'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_firewall) def get_firewall_output(dns_proxy_enabled: Optional[pulumi.Input[Optional[bool]]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -284,4 +281,25 @@ def get_firewall_output(dns_proxy_enabled: Optional[pulumi.Input[Optional[bool]] :param str name: The name of the Azure Firewall. :param str resource_group_name: The name of the Resource Group in which the Azure Firewall exists. """ - ... + __args__ = dict() + __args__['dnsProxyEnabled'] = dns_proxy_enabled + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getFirewall:getFirewall', __args__, opts=opts, typ=GetFirewallResult) + return __ret__.apply(lambda __response__: GetFirewallResult( + dns_proxy_enabled=pulumi.get(__response__, 'dns_proxy_enabled'), + dns_servers=pulumi.get(__response__, 'dns_servers'), + firewall_policy_id=pulumi.get(__response__, 'firewall_policy_id'), + id=pulumi.get(__response__, 'id'), + ip_configurations=pulumi.get(__response__, 'ip_configurations'), + location=pulumi.get(__response__, 'location'), + management_ip_configurations=pulumi.get(__response__, 'management_ip_configurations'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + sku_tier=pulumi.get(__response__, 'sku_tier'), + tags=pulumi.get(__response__, 'tags'), + threat_intel_mode=pulumi.get(__response__, 'threat_intel_mode'), + virtual_hubs=pulumi.get(__response__, 'virtual_hubs'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/network/get_firewall_policy.py b/sdk/python/pulumi_azure/network/get_firewall_policy.py index a77e9e3a75..a7c95793b4 100644 --- a/sdk/python/pulumi_azure/network/get_firewall_policy.py +++ b/sdk/python/pulumi_azure/network/get_firewall_policy.py @@ -192,9 +192,6 @@ def get_firewall_policy(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), threat_intelligence_allowlists=pulumi.get(__ret__, 'threat_intelligence_allowlists'), threat_intelligence_mode=pulumi.get(__ret__, 'threat_intelligence_mode')) - - -@_utilities.lift_output_func(get_firewall_policy) def get_firewall_policy_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetFirewallPolicyResult]: @@ -216,4 +213,21 @@ def get_firewall_policy_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Firewall Policy. :param str resource_group_name: The name of the Resource Group where the Firewall Policy exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getFirewallPolicy:getFirewallPolicy', __args__, opts=opts, typ=GetFirewallPolicyResult) + return __ret__.apply(lambda __response__: GetFirewallPolicyResult( + base_policy_id=pulumi.get(__response__, 'base_policy_id'), + child_policies=pulumi.get(__response__, 'child_policies'), + dns=pulumi.get(__response__, 'dns'), + firewalls=pulumi.get(__response__, 'firewalls'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + rule_collection_groups=pulumi.get(__response__, 'rule_collection_groups'), + tags=pulumi.get(__response__, 'tags'), + threat_intelligence_allowlists=pulumi.get(__response__, 'threat_intelligence_allowlists'), + threat_intelligence_mode=pulumi.get(__response__, 'threat_intelligence_mode'))) diff --git a/sdk/python/pulumi_azure/network/get_gateway_connection.py b/sdk/python/pulumi_azure/network/get_gateway_connection.py index 8cdb1f2811..c95684039b 100644 --- a/sdk/python/pulumi_azure/network/get_gateway_connection.py +++ b/sdk/python/pulumi_azure/network/get_gateway_connection.py @@ -390,9 +390,6 @@ def get_gateway_connection(name: Optional[str] = None, type=pulumi.get(__ret__, 'type'), use_policy_based_traffic_selectors=pulumi.get(__ret__, 'use_policy_based_traffic_selectors'), virtual_network_gateway_id=pulumi.get(__ret__, 'virtual_network_gateway_id')) - - -@_utilities.lift_output_func(get_gateway_connection) def get_gateway_connection_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGatewayConnectionResult]: @@ -414,4 +411,34 @@ def get_gateway_connection_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Virtual Network Gateway Connection. :param str resource_group_name: Specifies the name of the resource group the Virtual Network Gateway Connection is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getGatewayConnection:getGatewayConnection', __args__, opts=opts, typ=GetGatewayConnectionResult) + return __ret__.apply(lambda __response__: GetGatewayConnectionResult( + authorization_key=pulumi.get(__response__, 'authorization_key'), + connection_protocol=pulumi.get(__response__, 'connection_protocol'), + dpd_timeout_seconds=pulumi.get(__response__, 'dpd_timeout_seconds'), + egress_bytes_transferred=pulumi.get(__response__, 'egress_bytes_transferred'), + enable_bgp=pulumi.get(__response__, 'enable_bgp'), + express_route_circuit_id=pulumi.get(__response__, 'express_route_circuit_id'), + express_route_gateway_bypass=pulumi.get(__response__, 'express_route_gateway_bypass'), + id=pulumi.get(__response__, 'id'), + ingress_bytes_transferred=pulumi.get(__response__, 'ingress_bytes_transferred'), + ipsec_policies=pulumi.get(__response__, 'ipsec_policies'), + local_azure_ip_address_enabled=pulumi.get(__response__, 'local_azure_ip_address_enabled'), + local_network_gateway_id=pulumi.get(__response__, 'local_network_gateway_id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + peer_virtual_network_gateway_id=pulumi.get(__response__, 'peer_virtual_network_gateway_id'), + private_link_fast_path_enabled=pulumi.get(__response__, 'private_link_fast_path_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + resource_guid=pulumi.get(__response__, 'resource_guid'), + routing_weight=pulumi.get(__response__, 'routing_weight'), + shared_key=pulumi.get(__response__, 'shared_key'), + tags=pulumi.get(__response__, 'tags'), + traffic_selector_policies=pulumi.get(__response__, 'traffic_selector_policies'), + type=pulumi.get(__response__, 'type'), + use_policy_based_traffic_selectors=pulumi.get(__response__, 'use_policy_based_traffic_selectors'), + virtual_network_gateway_id=pulumi.get(__response__, 'virtual_network_gateway_id'))) diff --git a/sdk/python/pulumi_azure/network/get_ip_group.py b/sdk/python/pulumi_azure/network/get_ip_group.py index 9e27e5a28d..efa9eb988a 100644 --- a/sdk/python/pulumi_azure/network/get_ip_group.py +++ b/sdk/python/pulumi_azure/network/get_ip_group.py @@ -137,9 +137,6 @@ def get_ip_group(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_ip_group) def get_ip_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetIpGroupResult]: @@ -161,4 +158,15 @@ def get_ip_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the Name of the IP Group. :param str resource_group_name: Specifies the Name of the Resource Group within which the IP Group exists """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getIpGroup:getIpGroup', __args__, opts=opts, typ=GetIpGroupResult) + return __ret__.apply(lambda __response__: GetIpGroupResult( + cidrs=pulumi.get(__response__, 'cidrs'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_ip_groups.py b/sdk/python/pulumi_azure/network/get_ip_groups.py index d2d1462597..d8f171b15c 100644 --- a/sdk/python/pulumi_azure/network/get_ip_groups.py +++ b/sdk/python/pulumi_azure/network/get_ip_groups.py @@ -144,9 +144,6 @@ def get_ip_groups(name: Optional[str] = None, names=pulumi.get(__ret__, 'names'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_ip_groups) def get_ip_groups_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetIpGroupsResult]: @@ -168,4 +165,16 @@ def get_ip_groups_output(name: Optional[pulumi.Input[str]] = None, :param str name: A substring to match some number of IP Groups. :param str resource_group_name: The name of the Resource Group where the IP Groups exist. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getIpGroups:getIpGroups', __args__, opts=opts, typ=GetIpGroupsResult) + return __ret__.apply(lambda __response__: GetIpGroupsResult( + id=pulumi.get(__response__, 'id'), + ids=pulumi.get(__response__, 'ids'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + names=pulumi.get(__response__, 'names'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_local_network_gateway.py b/sdk/python/pulumi_azure/network/get_local_network_gateway.py index b8be8a2506..50c27f2dae 100644 --- a/sdk/python/pulumi_azure/network/get_local_network_gateway.py +++ b/sdk/python/pulumi_azure/network/get_local_network_gateway.py @@ -177,9 +177,6 @@ def get_local_network_gateway(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_local_network_gateway) def get_local_network_gateway_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLocalNetworkGatewayResult]: @@ -201,4 +198,18 @@ def get_local_network_gateway_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Local Network Gateway. :param str resource_group_name: The name of the Resource Group where the Local Network Gateway exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getLocalNetworkGateway:getLocalNetworkGateway', __args__, opts=opts, typ=GetLocalNetworkGatewayResult) + return __ret__.apply(lambda __response__: GetLocalNetworkGatewayResult( + address_spaces=pulumi.get(__response__, 'address_spaces'), + bgp_settings=pulumi.get(__response__, 'bgp_settings'), + gateway_address=pulumi.get(__response__, 'gateway_address'), + gateway_fqdn=pulumi.get(__response__, 'gateway_fqdn'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_nat_gateway.py b/sdk/python/pulumi_azure/network/get_nat_gateway.py index dcbaef4f2c..519de64b5f 100644 --- a/sdk/python/pulumi_azure/network/get_nat_gateway.py +++ b/sdk/python/pulumi_azure/network/get_nat_gateway.py @@ -197,9 +197,6 @@ def get_nat_gateway(name: Optional[str] = None, sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_nat_gateway) def get_nat_gateway_output(name: Optional[pulumi.Input[str]] = None, public_ip_address_ids: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, public_ip_prefix_ids: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, @@ -214,4 +211,22 @@ def get_nat_gateway_output(name: Optional[pulumi.Input[str]] = None, :param Sequence[str] public_ip_prefix_ids: A list of existing Public IP Prefix resource IDs which the NAT Gateway is using. :param str resource_group_name: Specifies the name of the Resource Group where the NAT Gateway exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['publicIpAddressIds'] = public_ip_address_ids + __args__['publicIpPrefixIds'] = public_ip_prefix_ids + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getNatGateway:getNatGateway', __args__, opts=opts, typ=GetNatGatewayResult) + return __ret__.apply(lambda __response__: GetNatGatewayResult( + id=pulumi.get(__response__, 'id'), + idle_timeout_in_minutes=pulumi.get(__response__, 'idle_timeout_in_minutes'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + public_ip_address_ids=pulumi.get(__response__, 'public_ip_address_ids'), + public_ip_prefix_ids=pulumi.get(__response__, 'public_ip_prefix_ids'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + resource_guid=pulumi.get(__response__, 'resource_guid'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/network/get_network_ddos_protection_plan.py b/sdk/python/pulumi_azure/network/get_network_ddos_protection_plan.py index 3c558b5a27..6a620801b8 100644 --- a/sdk/python/pulumi_azure/network/get_network_ddos_protection_plan.py +++ b/sdk/python/pulumi_azure/network/get_network_ddos_protection_plan.py @@ -137,9 +137,6 @@ def get_network_ddos_protection_plan(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), virtual_network_ids=pulumi.get(__ret__, 'virtual_network_ids')) - - -@_utilities.lift_output_func(get_network_ddos_protection_plan) def get_network_ddos_protection_plan_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkDdosProtectionPlanResult]: @@ -161,4 +158,15 @@ def get_network_ddos_protection_plan_output(name: Optional[pulumi.Input[str]] = :param str name: The name of the Network DDoS Protection Plan. :param str resource_group_name: The name of the resource group where the Network DDoS Protection Plan exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getNetworkDdosProtectionPlan:getNetworkDdosProtectionPlan', __args__, opts=opts, typ=GetNetworkDdosProtectionPlanResult) + return __ret__.apply(lambda __response__: GetNetworkDdosProtectionPlanResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + virtual_network_ids=pulumi.get(__response__, 'virtual_network_ids'))) diff --git a/sdk/python/pulumi_azure/network/get_network_interface.py b/sdk/python/pulumi_azure/network/get_network_interface.py index a48bc84d82..72b99cee9a 100644 --- a/sdk/python/pulumi_azure/network/get_network_interface.py +++ b/sdk/python/pulumi_azure/network/get_network_interface.py @@ -271,9 +271,6 @@ def get_network_interface(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), virtual_machine_id=pulumi.get(__ret__, 'virtual_machine_id')) - - -@_utilities.lift_output_func(get_network_interface) def get_network_interface_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkInterfaceResult]: @@ -295,4 +292,25 @@ def get_network_interface_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Network Interface. :param str resource_group_name: Specifies the name of the resource group the Network Interface is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getNetworkInterface:getNetworkInterface', __args__, opts=opts, typ=GetNetworkInterfaceResult) + return __ret__.apply(lambda __response__: GetNetworkInterfaceResult( + accelerated_networking_enabled=pulumi.get(__response__, 'accelerated_networking_enabled'), + applied_dns_servers=pulumi.get(__response__, 'applied_dns_servers'), + dns_servers=pulumi.get(__response__, 'dns_servers'), + id=pulumi.get(__response__, 'id'), + internal_dns_name_label=pulumi.get(__response__, 'internal_dns_name_label'), + ip_configurations=pulumi.get(__response__, 'ip_configurations'), + ip_forwarding_enabled=pulumi.get(__response__, 'ip_forwarding_enabled'), + location=pulumi.get(__response__, 'location'), + mac_address=pulumi.get(__response__, 'mac_address'), + name=pulumi.get(__response__, 'name'), + network_security_group_id=pulumi.get(__response__, 'network_security_group_id'), + private_ip_address=pulumi.get(__response__, 'private_ip_address'), + private_ip_addresses=pulumi.get(__response__, 'private_ip_addresses'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + virtual_machine_id=pulumi.get(__response__, 'virtual_machine_id'))) diff --git a/sdk/python/pulumi_azure/network/get_network_manager.py b/sdk/python/pulumi_azure/network/get_network_manager.py index e1830f0e5a..39a90bedfd 100644 --- a/sdk/python/pulumi_azure/network/get_network_manager.py +++ b/sdk/python/pulumi_azure/network/get_network_manager.py @@ -192,9 +192,6 @@ def get_network_manager(name: Optional[str] = None, scope_accesses=pulumi.get(__ret__, 'scope_accesses'), scopes=pulumi.get(__ret__, 'scopes'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network_manager) def get_network_manager_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkManagerResult]: @@ -231,4 +228,18 @@ def get_network_manager_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Network Manager. :param str resource_group_name: The Name of the Resource Group where the Network Manager exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getNetworkManager:getNetworkManager', __args__, opts=opts, typ=GetNetworkManagerResult) + return __ret__.apply(lambda __response__: GetNetworkManagerResult( + cross_tenant_scopes=pulumi.get(__response__, 'cross_tenant_scopes'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + scope_accesses=pulumi.get(__response__, 'scope_accesses'), + scopes=pulumi.get(__response__, 'scopes'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_network_manager_connectivity_configuration.py b/sdk/python/pulumi_azure/network/get_network_manager_connectivity_configuration.py index d63e3202bc..b035c60ef2 100644 --- a/sdk/python/pulumi_azure/network/get_network_manager_connectivity_configuration.py +++ b/sdk/python/pulumi_azure/network/get_network_manager_connectivity_configuration.py @@ -177,9 +177,6 @@ def get_network_manager_connectivity_configuration(name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), network_manager_id=pulumi.get(__ret__, 'network_manager_id')) - - -@_utilities.lift_output_func(get_network_manager_connectivity_configuration) def get_network_manager_connectivity_configuration_output(name: Optional[pulumi.Input[str]] = None, network_manager_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkManagerConnectivityConfigurationResult]: @@ -201,4 +198,18 @@ def get_network_manager_connectivity_configuration_output(name: Optional[pulumi. :param str name: The name of this Network Manager Connectivity Configuration. :param str network_manager_id: The ID of the Network Manager. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['networkManagerId'] = network_manager_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getNetworkManagerConnectivityConfiguration:getNetworkManagerConnectivityConfiguration', __args__, opts=opts, typ=GetNetworkManagerConnectivityConfigurationResult) + return __ret__.apply(lambda __response__: GetNetworkManagerConnectivityConfigurationResult( + applies_to_groups=pulumi.get(__response__, 'applies_to_groups'), + connectivity_topology=pulumi.get(__response__, 'connectivity_topology'), + delete_existing_peering_enabled=pulumi.get(__response__, 'delete_existing_peering_enabled'), + description=pulumi.get(__response__, 'description'), + global_mesh_enabled=pulumi.get(__response__, 'global_mesh_enabled'), + hubs=pulumi.get(__response__, 'hubs'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + network_manager_id=pulumi.get(__response__, 'network_manager_id'))) diff --git a/sdk/python/pulumi_azure/network/get_network_manager_network_group.py b/sdk/python/pulumi_azure/network/get_network_manager_network_group.py index 1cc6780f9c..26a89ddfbf 100644 --- a/sdk/python/pulumi_azure/network/get_network_manager_network_group.py +++ b/sdk/python/pulumi_azure/network/get_network_manager_network_group.py @@ -129,9 +129,6 @@ def get_network_manager_network_group(name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), network_manager_id=pulumi.get(__ret__, 'network_manager_id')) - - -@_utilities.lift_output_func(get_network_manager_network_group) def get_network_manager_network_group_output(name: Optional[pulumi.Input[str]] = None, network_manager_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkManagerNetworkGroupResult]: @@ -171,4 +168,13 @@ def get_network_manager_network_group_output(name: Optional[pulumi.Input[str]] = :param str name: Specifies the name of the Network Manager Network Group. :param str network_manager_id: Specifies the ID of the Network Manager. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['networkManagerId'] = network_manager_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getNetworkManagerNetworkGroup:getNetworkManagerNetworkGroup', __args__, opts=opts, typ=GetNetworkManagerNetworkGroupResult) + return __ret__.apply(lambda __response__: GetNetworkManagerNetworkGroupResult( + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + network_manager_id=pulumi.get(__response__, 'network_manager_id'))) diff --git a/sdk/python/pulumi_azure/network/get_network_security_group.py b/sdk/python/pulumi_azure/network/get_network_security_group.py index ccd3b388ea..4ddf150654 100644 --- a/sdk/python/pulumi_azure/network/get_network_security_group.py +++ b/sdk/python/pulumi_azure/network/get_network_security_group.py @@ -141,9 +141,6 @@ def get_network_security_group(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), security_rules=pulumi.get(__ret__, 'security_rules'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network_security_group) def get_network_security_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkSecurityGroupResult]: @@ -165,4 +162,15 @@ def get_network_security_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the Name of the Network Security Group. :param str resource_group_name: Specifies the Name of the Resource Group within which the Network Security Group exists """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getNetworkSecurityGroup:getNetworkSecurityGroup', __args__, opts=opts, typ=GetNetworkSecurityGroupResult) + return __ret__.apply(lambda __response__: GetNetworkSecurityGroupResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + security_rules=pulumi.get(__response__, 'security_rules'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_network_watcher.py b/sdk/python/pulumi_azure/network/get_network_watcher.py index b4512b1618..b0d424cf98 100644 --- a/sdk/python/pulumi_azure/network/get_network_watcher.py +++ b/sdk/python/pulumi_azure/network/get_network_watcher.py @@ -124,9 +124,6 @@ def get_network_watcher(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_network_watcher) def get_network_watcher_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkWatcherResult]: @@ -148,4 +145,14 @@ def get_network_watcher_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the Name of the Network Watcher. :param str resource_group_name: Specifies the Name of the Resource Group within which the Network Watcher exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getNetworkWatcher:getNetworkWatcher', __args__, opts=opts, typ=GetNetworkWatcherResult) + return __ret__.apply(lambda __response__: GetNetworkWatcherResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_public_i_ps.py b/sdk/python/pulumi_azure/network/get_public_i_ps.py index ec1298a9c7..9177d679eb 100644 --- a/sdk/python/pulumi_azure/network/get_public_i_ps.py +++ b/sdk/python/pulumi_azure/network/get_public_i_ps.py @@ -137,9 +137,6 @@ def get_public_i_ps(allocation_type: Optional[str] = None, name_prefix=pulumi.get(__ret__, 'name_prefix'), public_ips=pulumi.get(__ret__, 'public_ips'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_public_i_ps) def get_public_i_ps_output(allocation_type: Optional[pulumi.Input[Optional[str]]] = None, attachment_status: Optional[pulumi.Input[Optional[str]]] = None, name_prefix: Optional[pulumi.Input[Optional[str]]] = None, @@ -164,4 +161,17 @@ def get_public_i_ps_output(allocation_type: Optional[pulumi.Input[Optional[str]] :param str name_prefix: A prefix match used for the IP Addresses `name` field, case sensitive. :param str resource_group_name: Specifies the name of the resource group. """ - ... + __args__ = dict() + __args__['allocationType'] = allocation_type + __args__['attachmentStatus'] = attachment_status + __args__['namePrefix'] = name_prefix + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getPublicIPs:getPublicIPs', __args__, opts=opts, typ=GetPublicIPsResult) + return __ret__.apply(lambda __response__: GetPublicIPsResult( + allocation_type=pulumi.get(__response__, 'allocation_type'), + attachment_status=pulumi.get(__response__, 'attachment_status'), + id=pulumi.get(__response__, 'id'), + name_prefix=pulumi.get(__response__, 'name_prefix'), + public_ips=pulumi.get(__response__, 'public_ips'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/network/get_public_ip.py b/sdk/python/pulumi_azure/network/get_public_ip.py index aa62a82a4f..74e3ea55a4 100644 --- a/sdk/python/pulumi_azure/network/get_public_ip.py +++ b/sdk/python/pulumi_azure/network/get_public_ip.py @@ -332,9 +332,6 @@ def get_public_ip(name: Optional[str] = None, sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_public_ip) def get_public_ip_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPublicIPResult]: @@ -408,4 +405,26 @@ def get_public_ip_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the public IP address. :param str resource_group_name: Specifies the name of the resource group. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getPublicIP:getPublicIP', __args__, opts=opts, typ=GetPublicIPResult) + return __ret__.apply(lambda __response__: GetPublicIPResult( + allocation_method=pulumi.get(__response__, 'allocation_method'), + ddos_protection_mode=pulumi.get(__response__, 'ddos_protection_mode'), + ddos_protection_plan_id=pulumi.get(__response__, 'ddos_protection_plan_id'), + domain_name_label=pulumi.get(__response__, 'domain_name_label'), + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + idle_timeout_in_minutes=pulumi.get(__response__, 'idle_timeout_in_minutes'), + ip_address=pulumi.get(__response__, 'ip_address'), + ip_tags=pulumi.get(__response__, 'ip_tags'), + ip_version=pulumi.get(__response__, 'ip_version'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + reverse_fqdn=pulumi.get(__response__, 'reverse_fqdn'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/network/get_public_ip_prefix.py b/sdk/python/pulumi_azure/network/get_public_ip_prefix.py index a84e4c02d5..29368e5a93 100644 --- a/sdk/python/pulumi_azure/network/get_public_ip_prefix.py +++ b/sdk/python/pulumi_azure/network/get_public_ip_prefix.py @@ -178,9 +178,6 @@ def get_public_ip_prefix(name: Optional[str] = None, sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_public_ip_prefix) def get_public_ip_prefix_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPublicIpPrefixResult]: @@ -204,4 +201,18 @@ def get_public_ip_prefix_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the public IP prefix. :param str resource_group_name: Specifies the name of the resource group. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getPublicIpPrefix:getPublicIpPrefix', __args__, opts=opts, typ=GetPublicIpPrefixResult) + return __ret__.apply(lambda __response__: GetPublicIpPrefixResult( + id=pulumi.get(__response__, 'id'), + ip_prefix=pulumi.get(__response__, 'ip_prefix'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + prefix_length=pulumi.get(__response__, 'prefix_length'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/network/get_route_filter.py b/sdk/python/pulumi_azure/network/get_route_filter.py index 336556daa8..57ef3a0ff3 100644 --- a/sdk/python/pulumi_azure/network/get_route_filter.py +++ b/sdk/python/pulumi_azure/network/get_route_filter.py @@ -141,9 +141,6 @@ def get_route_filter(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), rules=pulumi.get(__ret__, 'rules'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_route_filter) def get_route_filter_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRouteFilterResult]: @@ -165,4 +162,15 @@ def get_route_filter_output(name: Optional[pulumi.Input[str]] = None, :param str name: The Name of this Route Filter. :param str resource_group_name: The name of the Resource Group where the Route Filter exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getRouteFilter:getRouteFilter', __args__, opts=opts, typ=GetRouteFilterResult) + return __ret__.apply(lambda __response__: GetRouteFilterResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + rules=pulumi.get(__response__, 'rules'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_route_table.py b/sdk/python/pulumi_azure/network/get_route_table.py index 002badefce..8ccfc46173 100644 --- a/sdk/python/pulumi_azure/network/get_route_table.py +++ b/sdk/python/pulumi_azure/network/get_route_table.py @@ -166,9 +166,6 @@ def get_route_table(name: Optional[str] = None, routes=pulumi.get(__ret__, 'routes'), subnets=pulumi.get(__ret__, 'subnets'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_route_table) def get_route_table_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRouteTableResult]: @@ -189,4 +186,17 @@ def get_route_table_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Route Table. :param str resource_group_name: The name of the Resource Group in which the Route Table exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getRouteTable:getRouteTable', __args__, opts=opts, typ=GetRouteTableResult) + return __ret__.apply(lambda __response__: GetRouteTableResult( + bgp_route_propagation_enabled=pulumi.get(__response__, 'bgp_route_propagation_enabled'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + routes=pulumi.get(__response__, 'routes'), + subnets=pulumi.get(__response__, 'subnets'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/network/get_service_tags.py b/sdk/python/pulumi_azure/network/get_service_tags.py index a7b324b9a1..8dbee87444 100644 --- a/sdk/python/pulumi_azure/network/get_service_tags.py +++ b/sdk/python/pulumi_azure/network/get_service_tags.py @@ -165,9 +165,6 @@ def get_service_tags(location: Optional[str] = None, location_filter=pulumi.get(__ret__, 'location_filter'), name=pulumi.get(__ret__, 'name'), service=pulumi.get(__ret__, 'service')) - - -@_utilities.lift_output_func(get_service_tags) def get_service_tags_output(location: Optional[pulumi.Input[str]] = None, location_filter: Optional[pulumi.Input[Optional[str]]] = None, service: Optional[pulumi.Input[str]] = None, @@ -193,4 +190,18 @@ def get_service_tags_output(location: Optional[pulumi.Input[str]] = None, :param str location_filter: Changes the scope of the service tags. Can be any value that is also valid for `location`. If this field is empty then all address prefixes are considered instead of only location specific ones. :param str service: The type of the service for which address prefixes will be fetched. Available service tags can be found here: [Available service tags](https://docs.microsoft.com/azure/virtual-network/service-tags-overview#available-service-tags). """ - ... + __args__ = dict() + __args__['location'] = location + __args__['locationFilter'] = location_filter + __args__['service'] = service + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getServiceTags:getServiceTags', __args__, opts=opts, typ=GetServiceTagsResult) + return __ret__.apply(lambda __response__: GetServiceTagsResult( + address_prefixes=pulumi.get(__response__, 'address_prefixes'), + id=pulumi.get(__response__, 'id'), + ipv4_cidrs=pulumi.get(__response__, 'ipv4_cidrs'), + ipv6_cidrs=pulumi.get(__response__, 'ipv6_cidrs'), + location=pulumi.get(__response__, 'location'), + location_filter=pulumi.get(__response__, 'location_filter'), + name=pulumi.get(__response__, 'name'), + service=pulumi.get(__response__, 'service'))) diff --git a/sdk/python/pulumi_azure/network/get_subnet.py b/sdk/python/pulumi_azure/network/get_subnet.py index 5dbf54263d..61ef107d12 100644 --- a/sdk/python/pulumi_azure/network/get_subnet.py +++ b/sdk/python/pulumi_azure/network/get_subnet.py @@ -213,9 +213,6 @@ def get_subnet(name: Optional[str] = None, route_table_id=pulumi.get(__ret__, 'route_table_id'), service_endpoints=pulumi.get(__ret__, 'service_endpoints'), virtual_network_name=pulumi.get(__ret__, 'virtual_network_name')) - - -@_utilities.lift_output_func(get_subnet) def get_subnet_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, virtual_network_name: Optional[pulumi.Input[str]] = None, @@ -240,4 +237,22 @@ def get_subnet_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the name of the resource group the Virtual Network is located in. :param str virtual_network_name: Specifies the name of the Virtual Network this Subnet is located within. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['virtualNetworkName'] = virtual_network_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getSubnet:getSubnet', __args__, opts=opts, typ=GetSubnetResult) + return __ret__.apply(lambda __response__: GetSubnetResult( + address_prefix=pulumi.get(__response__, 'address_prefix'), + address_prefixes=pulumi.get(__response__, 'address_prefixes'), + default_outbound_access_enabled=pulumi.get(__response__, 'default_outbound_access_enabled'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + network_security_group_id=pulumi.get(__response__, 'network_security_group_id'), + private_endpoint_network_policies=pulumi.get(__response__, 'private_endpoint_network_policies'), + private_link_service_network_policies_enabled=pulumi.get(__response__, 'private_link_service_network_policies_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + route_table_id=pulumi.get(__response__, 'route_table_id'), + service_endpoints=pulumi.get(__response__, 'service_endpoints'), + virtual_network_name=pulumi.get(__response__, 'virtual_network_name'))) diff --git a/sdk/python/pulumi_azure/network/get_traffic_manager.py b/sdk/python/pulumi_azure/network/get_traffic_manager.py index 528b9da905..19eb68f68f 100644 --- a/sdk/python/pulumi_azure/network/get_traffic_manager.py +++ b/sdk/python/pulumi_azure/network/get_traffic_manager.py @@ -86,9 +86,6 @@ def get_traffic_manager(name: Optional[str] = None, return AwaitableGetTrafficManagerResult( id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name')) - - -@_utilities.lift_output_func(get_traffic_manager) def get_traffic_manager_output(name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetTrafficManagerResult]: """ @@ -109,4 +106,10 @@ def get_traffic_manager_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Location, for example `World`, `Europe` or `Germany`. """ - ... + __args__ = dict() + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getTrafficManager:getTrafficManager', __args__, opts=opts, typ=GetTrafficManagerResult) + return __ret__.apply(lambda __response__: GetTrafficManagerResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'))) diff --git a/sdk/python/pulumi_azure/network/get_traffic_manager_profile.py b/sdk/python/pulumi_azure/network/get_traffic_manager_profile.py index 3e109ca4a9..226e61cf9e 100644 --- a/sdk/python/pulumi_azure/network/get_traffic_manager_profile.py +++ b/sdk/python/pulumi_azure/network/get_traffic_manager_profile.py @@ -199,9 +199,6 @@ def get_traffic_manager_profile(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), traffic_routing_method=pulumi.get(__ret__, 'traffic_routing_method'), traffic_view_enabled=pulumi.get(__ret__, 'traffic_view_enabled')) - - -@_utilities.lift_output_func(get_traffic_manager_profile) def get_traffic_manager_profile_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -227,4 +224,21 @@ def get_traffic_manager_profile_output(name: Optional[pulumi.Input[str]] = None, :param Mapping[str, str] tags: A mapping of tags to assign to the resource. :param bool traffic_view_enabled: Indicates whether Traffic View is enabled for the Traffic Manager profile. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + __args__['trafficViewEnabled'] = traffic_view_enabled + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getTrafficManagerProfile:getTrafficManagerProfile', __args__, opts=opts, typ=GetTrafficManagerProfileResult) + return __ret__.apply(lambda __response__: GetTrafficManagerProfileResult( + dns_configs=pulumi.get(__response__, 'dns_configs'), + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + monitor_configs=pulumi.get(__response__, 'monitor_configs'), + name=pulumi.get(__response__, 'name'), + profile_status=pulumi.get(__response__, 'profile_status'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + traffic_routing_method=pulumi.get(__response__, 'traffic_routing_method'), + traffic_view_enabled=pulumi.get(__response__, 'traffic_view_enabled'))) diff --git a/sdk/python/pulumi_azure/network/get_virtual_hub.py b/sdk/python/pulumi_azure/network/get_virtual_hub.py index 4928dcad71..f48fcfaff1 100644 --- a/sdk/python/pulumi_azure/network/get_virtual_hub.py +++ b/sdk/python/pulumi_azure/network/get_virtual_hub.py @@ -189,9 +189,6 @@ def get_virtual_hub(name: Optional[str] = None, virtual_router_asn=pulumi.get(__ret__, 'virtual_router_asn'), virtual_router_ips=pulumi.get(__ret__, 'virtual_router_ips'), virtual_wan_id=pulumi.get(__ret__, 'virtual_wan_id')) - - -@_utilities.lift_output_func(get_virtual_hub) def get_virtual_hub_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVirtualHubResult]: @@ -213,4 +210,19 @@ def get_virtual_hub_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Virtual Hub. :param str resource_group_name: The Name of the Resource Group where the Virtual Hub exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getVirtualHub:getVirtualHub', __args__, opts=opts, typ=GetVirtualHubResult) + return __ret__.apply(lambda __response__: GetVirtualHubResult( + address_prefix=pulumi.get(__response__, 'address_prefix'), + default_route_table_id=pulumi.get(__response__, 'default_route_table_id'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + virtual_router_asn=pulumi.get(__response__, 'virtual_router_asn'), + virtual_router_ips=pulumi.get(__response__, 'virtual_router_ips'), + virtual_wan_id=pulumi.get(__response__, 'virtual_wan_id'))) diff --git a/sdk/python/pulumi_azure/network/get_virtual_hub_connection.py b/sdk/python/pulumi_azure/network/get_virtual_hub_connection.py index 8e28575bce..277b43e245 100644 --- a/sdk/python/pulumi_azure/network/get_virtual_hub_connection.py +++ b/sdk/python/pulumi_azure/network/get_virtual_hub_connection.py @@ -168,9 +168,6 @@ def get_virtual_hub_connection(name: Optional[str] = None, routings=pulumi.get(__ret__, 'routings'), virtual_hub_id=pulumi.get(__ret__, 'virtual_hub_id'), virtual_hub_name=pulumi.get(__ret__, 'virtual_hub_name')) - - -@_utilities.lift_output_func(get_virtual_hub_connection) def get_virtual_hub_connection_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, virtual_hub_name: Optional[pulumi.Input[str]] = None, @@ -195,4 +192,18 @@ def get_virtual_hub_connection_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group where the Virtual Hub Connection exists. :param str virtual_hub_name: The name of the Virtual Hub where this Connection exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['virtualHubName'] = virtual_hub_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getVirtualHubConnection:getVirtualHubConnection', __args__, opts=opts, typ=GetVirtualHubConnectionResult) + return __ret__.apply(lambda __response__: GetVirtualHubConnectionResult( + id=pulumi.get(__response__, 'id'), + internet_security_enabled=pulumi.get(__response__, 'internet_security_enabled'), + name=pulumi.get(__response__, 'name'), + remote_virtual_network_id=pulumi.get(__response__, 'remote_virtual_network_id'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + routings=pulumi.get(__response__, 'routings'), + virtual_hub_id=pulumi.get(__response__, 'virtual_hub_id'), + virtual_hub_name=pulumi.get(__response__, 'virtual_hub_name'))) diff --git a/sdk/python/pulumi_azure/network/get_virtual_hub_route_table.py b/sdk/python/pulumi_azure/network/get_virtual_hub_route_table.py index f3d9d43581..9975c05c77 100644 --- a/sdk/python/pulumi_azure/network/get_virtual_hub_route_table.py +++ b/sdk/python/pulumi_azure/network/get_virtual_hub_route_table.py @@ -155,9 +155,6 @@ def get_virtual_hub_route_table(name: Optional[str] = None, routes=pulumi.get(__ret__, 'routes'), virtual_hub_id=pulumi.get(__ret__, 'virtual_hub_id'), virtual_hub_name=pulumi.get(__ret__, 'virtual_hub_name')) - - -@_utilities.lift_output_func(get_virtual_hub_route_table) def get_virtual_hub_route_table_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, virtual_hub_name: Optional[pulumi.Input[str]] = None, @@ -182,4 +179,17 @@ def get_virtual_hub_route_table_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: The Name of the Resource Group where the Virtual Hub Route Table exists. :param str virtual_hub_name: The name which should be used for Virtual Hub Route Table. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['virtualHubName'] = virtual_hub_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getVirtualHubRouteTable:getVirtualHubRouteTable', __args__, opts=opts, typ=GetVirtualHubRouteTableResult) + return __ret__.apply(lambda __response__: GetVirtualHubRouteTableResult( + id=pulumi.get(__response__, 'id'), + labels=pulumi.get(__response__, 'labels'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + routes=pulumi.get(__response__, 'routes'), + virtual_hub_id=pulumi.get(__response__, 'virtual_hub_id'), + virtual_hub_name=pulumi.get(__response__, 'virtual_hub_name'))) diff --git a/sdk/python/pulumi_azure/network/get_virtual_network.py b/sdk/python/pulumi_azure/network/get_virtual_network.py index 53686b9210..adc3a377b1 100644 --- a/sdk/python/pulumi_azure/network/get_virtual_network.py +++ b/sdk/python/pulumi_azure/network/get_virtual_network.py @@ -202,9 +202,6 @@ def get_virtual_network(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), vnet_peerings=pulumi.get(__ret__, 'vnet_peerings'), vnet_peerings_addresses=pulumi.get(__ret__, 'vnet_peerings_addresses')) - - -@_utilities.lift_output_func(get_virtual_network) def get_virtual_network_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVirtualNetworkResult]: @@ -226,4 +223,20 @@ def get_virtual_network_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Virtual Network. :param str resource_group_name: Specifies the name of the resource group the Virtual Network is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getVirtualNetwork:getVirtualNetwork', __args__, opts=opts, typ=GetVirtualNetworkResult) + return __ret__.apply(lambda __response__: GetVirtualNetworkResult( + address_spaces=pulumi.get(__response__, 'address_spaces'), + dns_servers=pulumi.get(__response__, 'dns_servers'), + guid=pulumi.get(__response__, 'guid'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + subnets=pulumi.get(__response__, 'subnets'), + tags=pulumi.get(__response__, 'tags'), + vnet_peerings=pulumi.get(__response__, 'vnet_peerings'), + vnet_peerings_addresses=pulumi.get(__response__, 'vnet_peerings_addresses'))) diff --git a/sdk/python/pulumi_azure/network/get_virtual_network_gateway.py b/sdk/python/pulumi_azure/network/get_virtual_network_gateway.py index 5acdf47d30..d6d9596f84 100644 --- a/sdk/python/pulumi_azure/network/get_virtual_network_gateway.py +++ b/sdk/python/pulumi_azure/network/get_virtual_network_gateway.py @@ -282,9 +282,6 @@ def get_virtual_network_gateway(name: Optional[str] = None, type=pulumi.get(__ret__, 'type'), vpn_client_configurations=pulumi.get(__ret__, 'vpn_client_configurations'), vpn_type=pulumi.get(__ret__, 'vpn_type')) - - -@_utilities.lift_output_func(get_virtual_network_gateway) def get_virtual_network_gateway_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVirtualNetworkGatewayResult]: @@ -306,4 +303,26 @@ def get_virtual_network_gateway_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Virtual Network Gateway. :param str resource_group_name: Specifies the name of the resource group the Virtual Network Gateway is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getVirtualNetworkGateway:getVirtualNetworkGateway', __args__, opts=opts, typ=GetVirtualNetworkGatewayResult) + return __ret__.apply(lambda __response__: GetVirtualNetworkGatewayResult( + active_active=pulumi.get(__response__, 'active_active'), + bgp_settings=pulumi.get(__response__, 'bgp_settings'), + custom_routes=pulumi.get(__response__, 'custom_routes'), + default_local_network_gateway_id=pulumi.get(__response__, 'default_local_network_gateway_id'), + enable_bgp=pulumi.get(__response__, 'enable_bgp'), + generation=pulumi.get(__response__, 'generation'), + id=pulumi.get(__response__, 'id'), + ip_configurations=pulumi.get(__response__, 'ip_configurations'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + private_ip_address_enabled=pulumi.get(__response__, 'private_ip_address_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + type=pulumi.get(__response__, 'type'), + vpn_client_configurations=pulumi.get(__response__, 'vpn_client_configurations'), + vpn_type=pulumi.get(__response__, 'vpn_type'))) diff --git a/sdk/python/pulumi_azure/network/get_virtual_wan.py b/sdk/python/pulumi_azure/network/get_virtual_wan.py index c536c09fdb..ee8e45610b 100644 --- a/sdk/python/pulumi_azure/network/get_virtual_wan.py +++ b/sdk/python/pulumi_azure/network/get_virtual_wan.py @@ -191,9 +191,6 @@ def get_virtual_wan(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), virtual_hub_ids=pulumi.get(__ret__, 'virtual_hub_ids'), vpn_site_ids=pulumi.get(__ret__, 'vpn_site_ids')) - - -@_utilities.lift_output_func(get_virtual_wan) def get_virtual_wan_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVirtualWanResult]: @@ -204,4 +201,20 @@ def get_virtual_wan_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Virtual Wan. :param str resource_group_name: The name of the Resource Group where the Virtual Wan exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getVirtualWan:getVirtualWan', __args__, opts=opts, typ=GetVirtualWanResult) + return __ret__.apply(lambda __response__: GetVirtualWanResult( + allow_branch_to_branch_traffic=pulumi.get(__response__, 'allow_branch_to_branch_traffic'), + disable_vpn_encryption=pulumi.get(__response__, 'disable_vpn_encryption'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + office365_local_breakout_category=pulumi.get(__response__, 'office365_local_breakout_category'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + virtual_hub_ids=pulumi.get(__response__, 'virtual_hub_ids'), + vpn_site_ids=pulumi.get(__response__, 'vpn_site_ids'))) diff --git a/sdk/python/pulumi_azure/network/get_vpn_gateway.py b/sdk/python/pulumi_azure/network/get_vpn_gateway.py index 597f4a98dc..ca5918308c 100644 --- a/sdk/python/pulumi_azure/network/get_vpn_gateway.py +++ b/sdk/python/pulumi_azure/network/get_vpn_gateway.py @@ -164,9 +164,6 @@ def get_vpn_gateway(name: Optional[str] = None, scale_unit=pulumi.get(__ret__, 'scale_unit'), tags=pulumi.get(__ret__, 'tags'), virtual_hub_id=pulumi.get(__ret__, 'virtual_hub_id')) - - -@_utilities.lift_output_func(get_vpn_gateway) def get_vpn_gateway_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVpnGatewayResult]: @@ -188,4 +185,17 @@ def get_vpn_gateway_output(name: Optional[pulumi.Input[str]] = None, :param str name: The Name of the VPN Gateway. :param str resource_group_name: The name of the Resource Group where the VPN Gateway exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getVpnGateway:getVpnGateway', __args__, opts=opts, typ=GetVpnGatewayResult) + return __ret__.apply(lambda __response__: GetVpnGatewayResult( + bgp_settings=pulumi.get(__response__, 'bgp_settings'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + scale_unit=pulumi.get(__response__, 'scale_unit'), + tags=pulumi.get(__response__, 'tags'), + virtual_hub_id=pulumi.get(__response__, 'virtual_hub_id'))) diff --git a/sdk/python/pulumi_azure/network/get_vpn_server_configuration.py b/sdk/python/pulumi_azure/network/get_vpn_server_configuration.py index 280882b195..fa474cb4c8 100644 --- a/sdk/python/pulumi_azure/network/get_vpn_server_configuration.py +++ b/sdk/python/pulumi_azure/network/get_vpn_server_configuration.py @@ -219,9 +219,6 @@ def get_vpn_server_configuration(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), vpn_authentication_types=pulumi.get(__ret__, 'vpn_authentication_types'), vpn_protocols=pulumi.get(__ret__, 'vpn_protocols')) - - -@_utilities.lift_output_func(get_vpn_server_configuration) def get_vpn_server_configuration_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVpnServerConfigurationResult]: @@ -243,4 +240,21 @@ def get_vpn_server_configuration_output(name: Optional[pulumi.Input[str]] = None :param str name: The Name of the VPN Server Configuration. :param str resource_group_name: The name of the Resource Group where the VPN Server Configuration exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:network/getVpnServerConfiguration:getVpnServerConfiguration', __args__, opts=opts, typ=GetVpnServerConfigurationResult) + return __ret__.apply(lambda __response__: GetVpnServerConfigurationResult( + azure_active_directory_authentications=pulumi.get(__response__, 'azure_active_directory_authentications'), + client_revoked_certificates=pulumi.get(__response__, 'client_revoked_certificates'), + client_root_certificates=pulumi.get(__response__, 'client_root_certificates'), + id=pulumi.get(__response__, 'id'), + ipsec_policies=pulumi.get(__response__, 'ipsec_policies'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + radii=pulumi.get(__response__, 'radii'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + vpn_authentication_types=pulumi.get(__response__, 'vpn_authentication_types'), + vpn_protocols=pulumi.get(__response__, 'vpn_protocols'))) diff --git a/sdk/python/pulumi_azure/nginx/get_certificate.py b/sdk/python/pulumi_azure/nginx/get_certificate.py index b226d1100c..fb9f2999b1 100644 --- a/sdk/python/pulumi_azure/nginx/get_certificate.py +++ b/sdk/python/pulumi_azure/nginx/get_certificate.py @@ -202,9 +202,6 @@ def get_certificate(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), nginx_deployment_id=pulumi.get(__ret__, 'nginx_deployment_id'), sha1_thumbprint=pulumi.get(__ret__, 'sha1_thumbprint')) - - -@_utilities.lift_output_func(get_certificate) def get_certificate_output(name: Optional[pulumi.Input[str]] = None, nginx_deployment_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetCertificateResult]: @@ -226,4 +223,20 @@ def get_certificate_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the NGINX Certificate. :param str nginx_deployment_id: The ID of the NGINX Deployment that the certificate is associated with. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['nginxDeploymentId'] = nginx_deployment_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:nginx/getCertificate:getCertificate', __args__, opts=opts, typ=GetCertificateResult) + return __ret__.apply(lambda __response__: GetCertificateResult( + certificate_virtual_path=pulumi.get(__response__, 'certificate_virtual_path'), + error_code=pulumi.get(__response__, 'error_code'), + error_message=pulumi.get(__response__, 'error_message'), + id=pulumi.get(__response__, 'id'), + key_vault_secret_creation_date=pulumi.get(__response__, 'key_vault_secret_creation_date'), + key_vault_secret_id=pulumi.get(__response__, 'key_vault_secret_id'), + key_vault_secret_version=pulumi.get(__response__, 'key_vault_secret_version'), + key_virtual_path=pulumi.get(__response__, 'key_virtual_path'), + name=pulumi.get(__response__, 'name'), + nginx_deployment_id=pulumi.get(__response__, 'nginx_deployment_id'), + sha1_thumbprint=pulumi.get(__response__, 'sha1_thumbprint'))) diff --git a/sdk/python/pulumi_azure/nginx/get_configuration.py b/sdk/python/pulumi_azure/nginx/get_configuration.py index 62c1476268..71983d2976 100644 --- a/sdk/python/pulumi_azure/nginx/get_configuration.py +++ b/sdk/python/pulumi_azure/nginx/get_configuration.py @@ -134,9 +134,6 @@ def get_configuration(nginx_deployment_id: Optional[str] = None, package_data=pulumi.get(__ret__, 'package_data'), protected_files=pulumi.get(__ret__, 'protected_files'), root_file=pulumi.get(__ret__, 'root_file')) - - -@_utilities.lift_output_func(get_configuration) def get_configuration_output(nginx_deployment_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetConfigurationResult]: """ @@ -155,4 +152,14 @@ def get_configuration_output(nginx_deployment_id: Optional[pulumi.Input[str]] = :param str nginx_deployment_id: The ID of the Nginx Deployment. """ - ... + __args__ = dict() + __args__['nginxDeploymentId'] = nginx_deployment_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:nginx/getConfiguration:getConfiguration', __args__, opts=opts, typ=GetConfigurationResult) + return __ret__.apply(lambda __response__: GetConfigurationResult( + config_files=pulumi.get(__response__, 'config_files'), + id=pulumi.get(__response__, 'id'), + nginx_deployment_id=pulumi.get(__response__, 'nginx_deployment_id'), + package_data=pulumi.get(__response__, 'package_data'), + protected_files=pulumi.get(__response__, 'protected_files'), + root_file=pulumi.get(__response__, 'root_file'))) diff --git a/sdk/python/pulumi_azure/nginx/get_deployment.py b/sdk/python/pulumi_azure/nginx/get_deployment.py index 7ef3272775..e1db8b6b86 100644 --- a/sdk/python/pulumi_azure/nginx/get_deployment.py +++ b/sdk/python/pulumi_azure/nginx/get_deployment.py @@ -310,9 +310,6 @@ def get_deployment(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_deployment) def get_deployment_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDeploymentResult]: @@ -334,4 +331,28 @@ def get_deployment_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this NGINX Deployment. :param str resource_group_name: The name of the Resource Group where the NGINX Deployment exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:nginx/getDeployment:getDeployment', __args__, opts=opts, typ=GetDeploymentResult) + return __ret__.apply(lambda __response__: GetDeploymentResult( + auto_scale_profiles=pulumi.get(__response__, 'auto_scale_profiles'), + automatic_upgrade_channel=pulumi.get(__response__, 'automatic_upgrade_channel'), + capacity=pulumi.get(__response__, 'capacity'), + diagnose_support_enabled=pulumi.get(__response__, 'diagnose_support_enabled'), + email=pulumi.get(__response__, 'email'), + frontend_privates=pulumi.get(__response__, 'frontend_privates'), + frontend_publics=pulumi.get(__response__, 'frontend_publics'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + ip_address=pulumi.get(__response__, 'ip_address'), + location=pulumi.get(__response__, 'location'), + logging_storage_accounts=pulumi.get(__response__, 'logging_storage_accounts'), + managed_resource_group=pulumi.get(__response__, 'managed_resource_group'), + name=pulumi.get(__response__, 'name'), + network_interfaces=pulumi.get(__response__, 'network_interfaces'), + nginx_version=pulumi.get(__response__, 'nginx_version'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/notificationhub/get_hub.py b/sdk/python/pulumi_azure/notificationhub/get_hub.py index db596382e8..577004240d 100644 --- a/sdk/python/pulumi_azure/notificationhub/get_hub.py +++ b/sdk/python/pulumi_azure/notificationhub/get_hub.py @@ -165,9 +165,6 @@ def get_hub(name: Optional[str] = None, namespace_name=pulumi.get(__ret__, 'namespace_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_hub) def get_hub_output(name: Optional[pulumi.Input[str]] = None, namespace_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -192,4 +189,18 @@ def get_hub_output(name: Optional[pulumi.Input[str]] = None, :param str namespace_name: Specifies the Name of the Notification Hub Namespace which contains the Notification Hub. :param str resource_group_name: Specifies the Name of the Resource Group within which the Notification Hub exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:notificationhub/getHub:getHub', __args__, opts=opts, typ=GetHubResult) + return __ret__.apply(lambda __response__: GetHubResult( + apns_credentials=pulumi.get(__response__, 'apns_credentials'), + gcm_credentials=pulumi.get(__response__, 'gcm_credentials'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/notificationhub/get_namespace.py b/sdk/python/pulumi_azure/notificationhub/get_namespace.py index 09ff0213c0..99f956f3b5 100644 --- a/sdk/python/pulumi_azure/notificationhub/get_namespace.py +++ b/sdk/python/pulumi_azure/notificationhub/get_namespace.py @@ -177,9 +177,6 @@ def get_namespace(name: Optional[str] = None, servicebus_endpoint=pulumi.get(__ret__, 'servicebus_endpoint'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_namespace) def get_namespace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]: @@ -201,4 +198,18 @@ def get_namespace_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the Name of the Notification Hub Namespace. :param str resource_group_name: Specifies the Name of the Resource Group within which the Notification Hub exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:notificationhub/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult) + return __ret__.apply(lambda __response__: GetNamespaceResult( + enabled=pulumi.get(__response__, 'enabled'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + namespace_type=pulumi.get(__response__, 'namespace_type'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + servicebus_endpoint=pulumi.get(__response__, 'servicebus_endpoint'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/operationalinsights/get_analytics_workspace.py b/sdk/python/pulumi_azure/operationalinsights/get_analytics_workspace.py index c62d6dc040..9bf3f43a6e 100644 --- a/sdk/python/pulumi_azure/operationalinsights/get_analytics_workspace.py +++ b/sdk/python/pulumi_azure/operationalinsights/get_analytics_workspace.py @@ -199,9 +199,6 @@ def get_analytics_workspace(name: Optional[str] = None, sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags'), workspace_id=pulumi.get(__ret__, 'workspace_id')) - - -@_utilities.lift_output_func(get_analytics_workspace) def get_analytics_workspace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAnalyticsWorkspaceResult]: @@ -223,4 +220,20 @@ def get_analytics_workspace_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Log Analytics Workspace. :param str resource_group_name: The name of the resource group in which the Log Analytics workspace is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:operationalinsights/getAnalyticsWorkspace:getAnalyticsWorkspace', __args__, opts=opts, typ=GetAnalyticsWorkspaceResult) + return __ret__.apply(lambda __response__: GetAnalyticsWorkspaceResult( + daily_quota_gb=pulumi.get(__response__, 'daily_quota_gb'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + primary_shared_key=pulumi.get(__response__, 'primary_shared_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + retention_in_days=pulumi.get(__response__, 'retention_in_days'), + secondary_shared_key=pulumi.get(__response__, 'secondary_shared_key'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + workspace_id=pulumi.get(__response__, 'workspace_id'))) diff --git a/sdk/python/pulumi_azure/paloalto/get_local_rulestack.py b/sdk/python/pulumi_azure/paloalto/get_local_rulestack.py index ad50560ac9..0da843847e 100644 --- a/sdk/python/pulumi_azure/paloalto/get_local_rulestack.py +++ b/sdk/python/pulumi_azure/paloalto/get_local_rulestack.py @@ -183,13 +183,28 @@ def get_local_rulestack(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), url_filtering_profile=pulumi.get(__ret__, 'url_filtering_profile'), vulnerability_profile=pulumi.get(__ret__, 'vulnerability_profile')) - - -@_utilities.lift_output_func(get_local_rulestack) def get_local_rulestack_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetLocalRulestackResult]: """ Use this data source to access information about an existing resource. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:paloalto/getLocalRulestack:getLocalRulestack', __args__, opts=opts, typ=GetLocalRulestackResult) + return __ret__.apply(lambda __response__: GetLocalRulestackResult( + anti_spyware_profile=pulumi.get(__response__, 'anti_spyware_profile'), + anti_virus_profile=pulumi.get(__response__, 'anti_virus_profile'), + description=pulumi.get(__response__, 'description'), + dns_subscription=pulumi.get(__response__, 'dns_subscription'), + file_blocking_profile=pulumi.get(__response__, 'file_blocking_profile'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + outbound_trust_certificate=pulumi.get(__response__, 'outbound_trust_certificate'), + outbound_untrust_certificate=pulumi.get(__response__, 'outbound_untrust_certificate'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + url_filtering_profile=pulumi.get(__response__, 'url_filtering_profile'), + vulnerability_profile=pulumi.get(__response__, 'vulnerability_profile'))) diff --git a/sdk/python/pulumi_azure/pim/get_role_management_policy.py b/sdk/python/pulumi_azure/pim/get_role_management_policy.py index 3ace58db3a..4dfdd0b098 100644 --- a/sdk/python/pulumi_azure/pim/get_role_management_policy.py +++ b/sdk/python/pulumi_azure/pim/get_role_management_policy.py @@ -194,9 +194,6 @@ def get_role_management_policy(role_definition_id: Optional[str] = None, notification_rules=pulumi.get(__ret__, 'notification_rules'), role_definition_id=pulumi.get(__ret__, 'role_definition_id'), scope=pulumi.get(__ret__, 'scope')) - - -@_utilities.lift_output_func(get_role_management_policy) def get_role_management_policy_output(role_definition_id: Optional[pulumi.Input[str]] = None, scope: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRoleManagementPolicyResult]: @@ -235,4 +232,18 @@ def get_role_management_policy_output(role_definition_id: Optional[pulumi.Input[ :param str role_definition_id: The scoped Role Definition ID of the role for which this policy applies. :param str scope: The scope to which this Role Management Policy applies. Can refer to a management group, a subscription, a resource group or a resource. """ - ... + __args__ = dict() + __args__['roleDefinitionId'] = role_definition_id + __args__['scope'] = scope + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:pim/getRoleManagementPolicy:getRoleManagementPolicy', __args__, opts=opts, typ=GetRoleManagementPolicyResult) + return __ret__.apply(lambda __response__: GetRoleManagementPolicyResult( + activation_rules=pulumi.get(__response__, 'activation_rules'), + active_assignment_rules=pulumi.get(__response__, 'active_assignment_rules'), + description=pulumi.get(__response__, 'description'), + eligible_assignment_rules=pulumi.get(__response__, 'eligible_assignment_rules'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + notification_rules=pulumi.get(__response__, 'notification_rules'), + role_definition_id=pulumi.get(__response__, 'role_definition_id'), + scope=pulumi.get(__response__, 'scope'))) diff --git a/sdk/python/pulumi_azure/policy/get_policy_assignment.py b/sdk/python/pulumi_azure/policy/get_policy_assignment.py index d3340d58b3..23d9b2c71f 100644 --- a/sdk/python/pulumi_azure/policy/get_policy_assignment.py +++ b/sdk/python/pulumi_azure/policy/get_policy_assignment.py @@ -229,9 +229,6 @@ def get_policy_assignment(name: Optional[str] = None, parameters=pulumi.get(__ret__, 'parameters'), policy_definition_id=pulumi.get(__ret__, 'policy_definition_id'), scope_id=pulumi.get(__ret__, 'scope_id')) - - -@_utilities.lift_output_func(get_policy_assignment) def get_policy_assignment_output(name: Optional[pulumi.Input[str]] = None, scope_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyAssignmentResult]: @@ -253,4 +250,22 @@ def get_policy_assignment_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Policy Assignment. Changing this forces a new Policy Assignment to be created. :param str scope_id: The ID of the scope this Policy Assignment is assigned to. The `scope_id` can be a subscription id, a resource group id, a management group id, or an ID of any resource that is assigned with a policy. Changing this forces a new Policy Assignment to be created. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['scopeId'] = scope_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:policy/getPolicyAssignment:getPolicyAssignment', __args__, opts=opts, typ=GetPolicyAssignmentResult) + return __ret__.apply(lambda __response__: GetPolicyAssignmentResult( + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + enforce=pulumi.get(__response__, 'enforce'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + metadata=pulumi.get(__response__, 'metadata'), + name=pulumi.get(__response__, 'name'), + non_compliance_messages=pulumi.get(__response__, 'non_compliance_messages'), + not_scopes=pulumi.get(__response__, 'not_scopes'), + parameters=pulumi.get(__response__, 'parameters'), + policy_definition_id=pulumi.get(__response__, 'policy_definition_id'), + scope_id=pulumi.get(__response__, 'scope_id'))) diff --git a/sdk/python/pulumi_azure/policy/get_policy_defintion.py b/sdk/python/pulumi_azure/policy/get_policy_defintion.py index 0d06090578..90093d2ab7 100644 --- a/sdk/python/pulumi_azure/policy/get_policy_defintion.py +++ b/sdk/python/pulumi_azure/policy/get_policy_defintion.py @@ -216,9 +216,6 @@ def get_policy_defintion(display_name: Optional[str] = None, policy_type=pulumi.get(__ret__, 'policy_type'), role_definition_ids=pulumi.get(__ret__, 'role_definition_ids'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_policy_defintion) def get_policy_defintion_output(display_name: Optional[pulumi.Input[Optional[str]]] = None, management_group_name: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, @@ -243,4 +240,22 @@ def get_policy_defintion_output(display_name: Optional[pulumi.Input[Optional[str :param str management_group_name: Only retrieve Policy Definitions from this Management Group. :param str name: Specifies the name of the Policy Definition. Conflicts with `display_name`. """ - ... + __args__ = dict() + __args__['displayName'] = display_name + __args__['managementGroupName'] = management_group_name + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:policy/getPolicyDefintion:getPolicyDefintion', __args__, opts=opts, typ=GetPolicyDefintionResult) + return __ret__.apply(lambda __response__: GetPolicyDefintionResult( + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + management_group_name=pulumi.get(__response__, 'management_group_name'), + metadata=pulumi.get(__response__, 'metadata'), + mode=pulumi.get(__response__, 'mode'), + name=pulumi.get(__response__, 'name'), + parameters=pulumi.get(__response__, 'parameters'), + policy_rule=pulumi.get(__response__, 'policy_rule'), + policy_type=pulumi.get(__response__, 'policy_type'), + role_definition_ids=pulumi.get(__response__, 'role_definition_ids'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_azure/policy/get_policy_defintion_built_in.py b/sdk/python/pulumi_azure/policy/get_policy_defintion_built_in.py index 876cfa049a..6b3792e932 100644 --- a/sdk/python/pulumi_azure/policy/get_policy_defintion_built_in.py +++ b/sdk/python/pulumi_azure/policy/get_policy_defintion_built_in.py @@ -216,9 +216,6 @@ def get_policy_defintion_built_in(display_name: Optional[str] = None, policy_type=pulumi.get(__ret__, 'policy_type'), role_definition_ids=pulumi.get(__ret__, 'role_definition_ids'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_policy_defintion_built_in) def get_policy_defintion_built_in_output(display_name: Optional[pulumi.Input[Optional[str]]] = None, management_group_name: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, @@ -243,4 +240,22 @@ def get_policy_defintion_built_in_output(display_name: Optional[pulumi.Input[Opt :param str management_group_name: Only retrieve Policy Definitions from this Management Group. :param str name: Specifies the name of the Policy Definition. Conflicts with `display_name`. """ - ... + __args__ = dict() + __args__['displayName'] = display_name + __args__['managementGroupName'] = management_group_name + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:policy/getPolicyDefintionBuiltIn:getPolicyDefintionBuiltIn', __args__, opts=opts, typ=GetPolicyDefintionBuiltInResult) + return __ret__.apply(lambda __response__: GetPolicyDefintionBuiltInResult( + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + management_group_name=pulumi.get(__response__, 'management_group_name'), + metadata=pulumi.get(__response__, 'metadata'), + mode=pulumi.get(__response__, 'mode'), + name=pulumi.get(__response__, 'name'), + parameters=pulumi.get(__response__, 'parameters'), + policy_rule=pulumi.get(__response__, 'policy_rule'), + policy_type=pulumi.get(__response__, 'policy_type'), + role_definition_ids=pulumi.get(__response__, 'role_definition_ids'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_azure/policy/get_policy_set_definition.py b/sdk/python/pulumi_azure/policy/get_policy_set_definition.py index 4a55592beb..a0b58be963 100644 --- a/sdk/python/pulumi_azure/policy/get_policy_set_definition.py +++ b/sdk/python/pulumi_azure/policy/get_policy_set_definition.py @@ -210,9 +210,6 @@ def get_policy_set_definition(display_name: Optional[str] = None, policy_definition_references=pulumi.get(__ret__, 'policy_definition_references'), policy_definitions=pulumi.get(__ret__, 'policy_definitions'), policy_type=pulumi.get(__ret__, 'policy_type')) - - -@_utilities.lift_output_func(get_policy_set_definition) def get_policy_set_definition_output(display_name: Optional[pulumi.Input[Optional[str]]] = None, management_group_name: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, @@ -237,4 +234,21 @@ def get_policy_set_definition_output(display_name: Optional[pulumi.Input[Optiona :param str management_group_name: Only retrieve Policy Set Definitions from this Management Group. :param str name: Specifies the name of the Policy Set Definition. Conflicts with `display_name`. """ - ... + __args__ = dict() + __args__['displayName'] = display_name + __args__['managementGroupName'] = management_group_name + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:policy/getPolicySetDefinition:getPolicySetDefinition', __args__, opts=opts, typ=GetPolicySetDefinitionResult) + return __ret__.apply(lambda __response__: GetPolicySetDefinitionResult( + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + management_group_name=pulumi.get(__response__, 'management_group_name'), + metadata=pulumi.get(__response__, 'metadata'), + name=pulumi.get(__response__, 'name'), + parameters=pulumi.get(__response__, 'parameters'), + policy_definition_groups=pulumi.get(__response__, 'policy_definition_groups'), + policy_definition_references=pulumi.get(__response__, 'policy_definition_references'), + policy_definitions=pulumi.get(__response__, 'policy_definitions'), + policy_type=pulumi.get(__response__, 'policy_type'))) diff --git a/sdk/python/pulumi_azure/policy/get_virtual_machine_configuration_assignment.py b/sdk/python/pulumi_azure/policy/get_virtual_machine_configuration_assignment.py index 8b64f12ccb..4ae9486fd4 100644 --- a/sdk/python/pulumi_azure/policy/get_virtual_machine_configuration_assignment.py +++ b/sdk/python/pulumi_azure/policy/get_virtual_machine_configuration_assignment.py @@ -190,9 +190,6 @@ def get_virtual_machine_configuration_assignment(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), virtual_machine_name=pulumi.get(__ret__, 'virtual_machine_name')) - - -@_utilities.lift_output_func(get_virtual_machine_configuration_assignment) def get_virtual_machine_configuration_assignment_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, virtual_machine_name: Optional[pulumi.Input[str]] = None, @@ -217,4 +214,20 @@ def get_virtual_machine_configuration_assignment_output(name: Optional[pulumi.In :param str resource_group_name: Specifies the Name of the Resource Group where the Guest Configuration Assignment exists. :param str virtual_machine_name: Only retrieve Policy Set Definitions from this Management Group. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['virtualMachineName'] = virtual_machine_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:policy/getVirtualMachineConfigurationAssignment:getVirtualMachineConfigurationAssignment', __args__, opts=opts, typ=GetVirtualMachineConfigurationAssignmentResult) + return __ret__.apply(lambda __response__: GetVirtualMachineConfigurationAssignmentResult( + assignment_hash=pulumi.get(__response__, 'assignment_hash'), + compliance_status=pulumi.get(__response__, 'compliance_status'), + content_hash=pulumi.get(__response__, 'content_hash'), + content_uri=pulumi.get(__response__, 'content_uri'), + id=pulumi.get(__response__, 'id'), + last_compliance_status_checked=pulumi.get(__response__, 'last_compliance_status_checked'), + latest_report_id=pulumi.get(__response__, 'latest_report_id'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + virtual_machine_name=pulumi.get(__response__, 'virtual_machine_name'))) diff --git a/sdk/python/pulumi_azure/portal/azurerm_portal_dashboard.py b/sdk/python/pulumi_azure/portal/azurerm_portal_dashboard.py index 14f51bef4a..da1729d173 100644 --- a/sdk/python/pulumi_azure/portal/azurerm_portal_dashboard.py +++ b/sdk/python/pulumi_azure/portal/azurerm_portal_dashboard.py @@ -153,9 +153,6 @@ def azurerm_portal_dashboard(dashboard_properties: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(azurerm_portal_dashboard) def azurerm_portal_dashboard_output(dashboard_properties: Optional[pulumi.Input[Optional[str]]] = None, display_name: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, @@ -181,4 +178,18 @@ def azurerm_portal_dashboard_output(dashboard_properties: Optional[pulumi.Input[ :param str name: Specifies the name of the shared Azure Portal Dashboard. :param str resource_group_name: Specifies the name of the resource group the shared Azure Portal Dashboard is located in. """ - ... + __args__ = dict() + __args__['dashboardProperties'] = dashboard_properties + __args__['displayName'] = display_name + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:portal/azurerm_portal_dashboard:azurerm_portal_dashboard', __args__, opts=opts, typ=Azurerm_portal_dashboardResult) + return __ret__.apply(lambda __response__: Azurerm_portal_dashboardResult( + dashboard_properties=pulumi.get(__response__, 'dashboard_properties'), + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/postgresql/get_flexible_server.py b/sdk/python/pulumi_azure/postgresql/get_flexible_server.py index 186e49c436..e4ecb828e0 100644 --- a/sdk/python/pulumi_azure/postgresql/get_flexible_server.py +++ b/sdk/python/pulumi_azure/postgresql/get_flexible_server.py @@ -241,9 +241,6 @@ def get_flexible_server(name: Optional[str] = None, storage_mb=pulumi.get(__ret__, 'storage_mb'), tags=pulumi.get(__ret__, 'tags'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_flexible_server) def get_flexible_server_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetFlexibleServerResult]: @@ -265,4 +262,23 @@ def get_flexible_server_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this PostgreSQL Flexible Server. :param str resource_group_name: The name of the Resource Group where the PostgreSQL Flexible Server exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:postgresql/getFlexibleServer:getFlexibleServer', __args__, opts=opts, typ=GetFlexibleServerResult) + return __ret__.apply(lambda __response__: GetFlexibleServerResult( + administrator_login=pulumi.get(__response__, 'administrator_login'), + auto_grow_enabled=pulumi.get(__response__, 'auto_grow_enabled'), + backup_retention_days=pulumi.get(__response__, 'backup_retention_days'), + delegated_subnet_id=pulumi.get(__response__, 'delegated_subnet_id'), + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + storage_mb=pulumi.get(__response__, 'storage_mb'), + tags=pulumi.get(__response__, 'tags'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_azure/postgresql/get_server.py b/sdk/python/pulumi_azure/postgresql/get_server.py index 2918cc5349..5a02470ad6 100644 --- a/sdk/python/pulumi_azure/postgresql/get_server.py +++ b/sdk/python/pulumi_azure/postgresql/get_server.py @@ -190,9 +190,6 @@ def get_server(name: Optional[str] = None, sku_name=pulumi.get(__ret__, 'sku_name'), tags=pulumi.get(__ret__, 'tags'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_server) def get_server_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServerResult]: @@ -214,4 +211,19 @@ def get_server_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the PostgreSQL Server. :param str resource_group_name: Specifies the name of the Resource Group where the PostgreSQL Server exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:postgresql/getServer:getServer', __args__, opts=opts, typ=GetServerResult) + return __ret__.apply(lambda __response__: GetServerResult( + administrator_login=pulumi.get(__response__, 'administrator_login'), + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + tags=pulumi.get(__response__, 'tags'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_a_record.py b/sdk/python/pulumi_azure/privatedns/get_a_record.py index c01935d051..6d3ad287aa 100644 --- a/sdk/python/pulumi_azure/privatedns/get_a_record.py +++ b/sdk/python/pulumi_azure/privatedns/get_a_record.py @@ -162,9 +162,6 @@ def get_a_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_a_record) def get_a_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -187,4 +184,18 @@ def get_a_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the Private DNS Zone (parent resource) exists. :param str zone_name: Specifies the Private DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getARecord:getARecord', __args__, opts=opts, typ=GetARecordResult) + return __ret__.apply(lambda __response__: GetARecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_aaaa_record.py b/sdk/python/pulumi_azure/privatedns/get_aaaa_record.py index acbeb0e525..2d4bf746c3 100644 --- a/sdk/python/pulumi_azure/privatedns/get_aaaa_record.py +++ b/sdk/python/pulumi_azure/privatedns/get_aaaa_record.py @@ -163,9 +163,6 @@ def get_aaaa_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_aaaa_record) def get_aaaa_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -189,4 +186,18 @@ def get_aaaa_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the Private DNS Zone (parent resource) exists. :param str zone_name: Specifies the Private DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getAAAARecord:getAAAARecord', __args__, opts=opts, typ=GetAAAARecordResult) + return __ret__.apply(lambda __response__: GetAAAARecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_cname_record.py b/sdk/python/pulumi_azure/privatedns/get_cname_record.py index 92d3236057..d3a721efe1 100644 --- a/sdk/python/pulumi_azure/privatedns/get_cname_record.py +++ b/sdk/python/pulumi_azure/privatedns/get_cname_record.py @@ -173,9 +173,6 @@ def get_cname_record(name: Optional[str] = None, target_resource_id=pulumi.get(__ret__, 'target_resource_id'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_cname_record) def get_cname_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -199,4 +196,19 @@ def get_cname_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the Private DNS Zone (parent resource) exists. :param str zone_name: Specifies the Private DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getCnameRecord:getCnameRecord', __args__, opts=opts, typ=GetCnameRecordResult) + return __ret__.apply(lambda __response__: GetCnameRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + record=pulumi.get(__response__, 'record'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + target_resource_id=pulumi.get(__response__, 'target_resource_id'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_dns_zone.py b/sdk/python/pulumi_azure/privatedns/get_dns_zone.py index f2eff5930a..fe6fb9584f 100644 --- a/sdk/python/pulumi_azure/privatedns/get_dns_zone.py +++ b/sdk/python/pulumi_azure/privatedns/get_dns_zone.py @@ -168,9 +168,6 @@ def get_dns_zone(name: Optional[str] = None, number_of_record_sets=pulumi.get(__ret__, 'number_of_record_sets'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_dns_zone) def get_dns_zone_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[Optional[str]]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -196,4 +193,18 @@ def get_dns_zone_output(name: Optional[pulumi.Input[str]] = None, DNS Zones in your subscription that matches `name` will be returned. :param Mapping[str, str] tags: A mapping of tags for the zone. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getDnsZone:getDnsZone', __args__, opts=opts, typ=GetDnsZoneResult) + return __ret__.apply(lambda __response__: GetDnsZoneResult( + id=pulumi.get(__response__, 'id'), + max_number_of_record_sets=pulumi.get(__response__, 'max_number_of_record_sets'), + max_number_of_virtual_network_links=pulumi.get(__response__, 'max_number_of_virtual_network_links'), + max_number_of_virtual_network_links_with_registration=pulumi.get(__response__, 'max_number_of_virtual_network_links_with_registration'), + name=pulumi.get(__response__, 'name'), + number_of_record_sets=pulumi.get(__response__, 'number_of_record_sets'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_mx_record.py b/sdk/python/pulumi_azure/privatedns/get_mx_record.py index 5b3d95fdd5..d16ccf9366 100644 --- a/sdk/python/pulumi_azure/privatedns/get_mx_record.py +++ b/sdk/python/pulumi_azure/privatedns/get_mx_record.py @@ -164,9 +164,6 @@ def get_mx_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_mx_record) def get_mx_record_output(name: Optional[pulumi.Input[Optional[str]]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -190,4 +187,18 @@ def get_mx_record_output(name: Optional[pulumi.Input[Optional[str]]] = None, :param str resource_group_name: Specifies the resource group where the Private DNS Zone (parent resource) exists. :param str zone_name: Specifies the Private DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getMxRecord:getMxRecord', __args__, opts=opts, typ=GetMxRecordResult) + return __ret__.apply(lambda __response__: GetMxRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_ptr_record.py b/sdk/python/pulumi_azure/privatedns/get_ptr_record.py index 1f0f3879ac..94763db2f2 100644 --- a/sdk/python/pulumi_azure/privatedns/get_ptr_record.py +++ b/sdk/python/pulumi_azure/privatedns/get_ptr_record.py @@ -163,9 +163,6 @@ def get_ptr_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_ptr_record) def get_ptr_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -189,4 +186,18 @@ def get_ptr_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the Private DNS Zone (parent resource) exists. :param str zone_name: Specifies the Private DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getPtrRecord:getPtrRecord', __args__, opts=opts, typ=GetPtrRecordResult) + return __ret__.apply(lambda __response__: GetPtrRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_resolver.py b/sdk/python/pulumi_azure/privatedns/get_resolver.py index 3fc996a0e2..8a9fb4eb98 100644 --- a/sdk/python/pulumi_azure/privatedns/get_resolver.py +++ b/sdk/python/pulumi_azure/privatedns/get_resolver.py @@ -136,9 +136,6 @@ def get_resolver(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), virtual_network_id=pulumi.get(__ret__, 'virtual_network_id')) - - -@_utilities.lift_output_func(get_resolver) def get_resolver_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResolverResult]: @@ -159,4 +156,15 @@ def get_resolver_output(name: Optional[pulumi.Input[str]] = None, :param str name: Name of the Private DNS Resolver. :param str resource_group_name: Name of the Resource Group where the Private DNS Resolver exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getResolver:getResolver', __args__, opts=opts, typ=GetResolverResult) + return __ret__.apply(lambda __response__: GetResolverResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + virtual_network_id=pulumi.get(__response__, 'virtual_network_id'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_resolver_dns_forwarding_ruleset.py b/sdk/python/pulumi_azure/privatedns/get_resolver_dns_forwarding_ruleset.py index 1a88c020d2..4ec5cec6b3 100644 --- a/sdk/python/pulumi_azure/privatedns/get_resolver_dns_forwarding_ruleset.py +++ b/sdk/python/pulumi_azure/privatedns/get_resolver_dns_forwarding_ruleset.py @@ -136,9 +136,6 @@ def get_resolver_dns_forwarding_ruleset(name: Optional[str] = None, private_dns_resolver_outbound_endpoint_ids=pulumi.get(__ret__, 'private_dns_resolver_outbound_endpoint_ids'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_resolver_dns_forwarding_ruleset) def get_resolver_dns_forwarding_ruleset_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResolverDnsForwardingRulesetResult]: @@ -159,4 +156,15 @@ def get_resolver_dns_forwarding_ruleset_output(name: Optional[pulumi.Input[str]] :param str name: Name of the existing Private DNS Resolver Dns Forwarding Ruleset. :param str resource_group_name: Name of the Resource Group where the Private DNS Resolver Dns Forwarding Ruleset exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getResolverDnsForwardingRuleset:getResolverDnsForwardingRuleset', __args__, opts=opts, typ=GetResolverDnsForwardingRulesetResult) + return __ret__.apply(lambda __response__: GetResolverDnsForwardingRulesetResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + private_dns_resolver_outbound_endpoint_ids=pulumi.get(__response__, 'private_dns_resolver_outbound_endpoint_ids'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_resolver_forwarding_rule.py b/sdk/python/pulumi_azure/privatedns/get_resolver_forwarding_rule.py index 1697ffa6a2..87b6a5fac2 100644 --- a/sdk/python/pulumi_azure/privatedns/get_resolver_forwarding_rule.py +++ b/sdk/python/pulumi_azure/privatedns/get_resolver_forwarding_rule.py @@ -150,9 +150,6 @@ def get_resolver_forwarding_rule(dns_forwarding_ruleset_id: Optional[str] = None metadata=pulumi.get(__ret__, 'metadata'), name=pulumi.get(__ret__, 'name'), target_dns_servers=pulumi.get(__ret__, 'target_dns_servers')) - - -@_utilities.lift_output_func(get_resolver_forwarding_rule) def get_resolver_forwarding_rule_output(dns_forwarding_ruleset_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResolverForwardingRuleResult]: @@ -173,4 +170,16 @@ def get_resolver_forwarding_rule_output(dns_forwarding_ruleset_id: Optional[pulu :param str dns_forwarding_ruleset_id: ID of the Private DNS Resolver Forwarding Ruleset. :param str name: Name of the Private DNS Resolver Forwarding Rule. """ - ... + __args__ = dict() + __args__['dnsForwardingRulesetId'] = dns_forwarding_ruleset_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getResolverForwardingRule:getResolverForwardingRule', __args__, opts=opts, typ=GetResolverForwardingRuleResult) + return __ret__.apply(lambda __response__: GetResolverForwardingRuleResult( + dns_forwarding_ruleset_id=pulumi.get(__response__, 'dns_forwarding_ruleset_id'), + domain_name=pulumi.get(__response__, 'domain_name'), + enabled=pulumi.get(__response__, 'enabled'), + id=pulumi.get(__response__, 'id'), + metadata=pulumi.get(__response__, 'metadata'), + name=pulumi.get(__response__, 'name'), + target_dns_servers=pulumi.get(__response__, 'target_dns_servers'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_resolver_inbound_endpoint.py b/sdk/python/pulumi_azure/privatedns/get_resolver_inbound_endpoint.py index 56e6cf7225..4c4b794689 100644 --- a/sdk/python/pulumi_azure/privatedns/get_resolver_inbound_endpoint.py +++ b/sdk/python/pulumi_azure/privatedns/get_resolver_inbound_endpoint.py @@ -137,9 +137,6 @@ def get_resolver_inbound_endpoint(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), private_dns_resolver_id=pulumi.get(__ret__, 'private_dns_resolver_id'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_resolver_inbound_endpoint) def get_resolver_inbound_endpoint_output(name: Optional[pulumi.Input[str]] = None, private_dns_resolver_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResolverInboundEndpointResult]: @@ -160,4 +157,15 @@ def get_resolver_inbound_endpoint_output(name: Optional[pulumi.Input[str]] = Non :param str name: Name of the Private DNS Resolver Inbound Endpoint. :param str private_dns_resolver_id: ID of the Private DNS Resolver. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['privateDnsResolverId'] = private_dns_resolver_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getResolverInboundEndpoint:getResolverInboundEndpoint', __args__, opts=opts, typ=GetResolverInboundEndpointResult) + return __ret__.apply(lambda __response__: GetResolverInboundEndpointResult( + id=pulumi.get(__response__, 'id'), + ip_configurations=pulumi.get(__response__, 'ip_configurations'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + private_dns_resolver_id=pulumi.get(__response__, 'private_dns_resolver_id'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_resolver_outbound_endpoint.py b/sdk/python/pulumi_azure/privatedns/get_resolver_outbound_endpoint.py index 185ce9b054..6c78b122ec 100644 --- a/sdk/python/pulumi_azure/privatedns/get_resolver_outbound_endpoint.py +++ b/sdk/python/pulumi_azure/privatedns/get_resolver_outbound_endpoint.py @@ -136,9 +136,6 @@ def get_resolver_outbound_endpoint(name: Optional[str] = None, private_dns_resolver_id=pulumi.get(__ret__, 'private_dns_resolver_id'), subnet_id=pulumi.get(__ret__, 'subnet_id'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_resolver_outbound_endpoint) def get_resolver_outbound_endpoint_output(name: Optional[pulumi.Input[str]] = None, private_dns_resolver_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResolverOutboundEndpointResult]: @@ -159,4 +156,15 @@ def get_resolver_outbound_endpoint_output(name: Optional[pulumi.Input[str]] = No :param str name: Name of the Private DNS Resolver Outbound Endpoint. :param str private_dns_resolver_id: ID of the Private DNS Resolver Outbound Endpoint. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['privateDnsResolverId'] = private_dns_resolver_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getResolverOutboundEndpoint:getResolverOutboundEndpoint', __args__, opts=opts, typ=GetResolverOutboundEndpointResult) + return __ret__.apply(lambda __response__: GetResolverOutboundEndpointResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + private_dns_resolver_id=pulumi.get(__response__, 'private_dns_resolver_id'), + subnet_id=pulumi.get(__response__, 'subnet_id'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_resolver_virtual_network_link.py b/sdk/python/pulumi_azure/privatedns/get_resolver_virtual_network_link.py index 2fffd29f72..cc8458b04f 100644 --- a/sdk/python/pulumi_azure/privatedns/get_resolver_virtual_network_link.py +++ b/sdk/python/pulumi_azure/privatedns/get_resolver_virtual_network_link.py @@ -123,9 +123,6 @@ def get_resolver_virtual_network_link(dns_forwarding_ruleset_id: Optional[str] = metadata=pulumi.get(__ret__, 'metadata'), name=pulumi.get(__ret__, 'name'), virtual_network_id=pulumi.get(__ret__, 'virtual_network_id')) - - -@_utilities.lift_output_func(get_resolver_virtual_network_link) def get_resolver_virtual_network_link_output(dns_forwarding_ruleset_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetResolverVirtualNetworkLinkResult]: @@ -146,4 +143,14 @@ def get_resolver_virtual_network_link_output(dns_forwarding_ruleset_id: Optional :param str dns_forwarding_ruleset_id: ID of the Private DNS Resolver DNS Forwarding Ruleset. :param str name: Name of the Private DNS Resolver Virtual Network Link. """ - ... + __args__ = dict() + __args__['dnsForwardingRulesetId'] = dns_forwarding_ruleset_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getResolverVirtualNetworkLink:getResolverVirtualNetworkLink', __args__, opts=opts, typ=GetResolverVirtualNetworkLinkResult) + return __ret__.apply(lambda __response__: GetResolverVirtualNetworkLinkResult( + dns_forwarding_ruleset_id=pulumi.get(__response__, 'dns_forwarding_ruleset_id'), + id=pulumi.get(__response__, 'id'), + metadata=pulumi.get(__response__, 'metadata'), + name=pulumi.get(__response__, 'name'), + virtual_network_id=pulumi.get(__response__, 'virtual_network_id'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_soa_record.py b/sdk/python/pulumi_azure/privatedns/get_soa_record.py index 43cafddb8c..6a3e61256a 100644 --- a/sdk/python/pulumi_azure/privatedns/get_soa_record.py +++ b/sdk/python/pulumi_azure/privatedns/get_soa_record.py @@ -243,9 +243,6 @@ def get_soa_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_soa_record) def get_soa_record_output(name: Optional[pulumi.Input[Optional[str]]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -268,4 +265,24 @@ def get_soa_record_output(name: Optional[pulumi.Input[Optional[str]]] = None, :param str resource_group_name: Specifies the resource group where the Private DNS Zone (parent resource) exists. :param str zone_name: Specifies the Private DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getSoaRecord:getSoaRecord', __args__, opts=opts, typ=GetSoaRecordResult) + return __ret__.apply(lambda __response__: GetSoaRecordResult( + email=pulumi.get(__response__, 'email'), + expire_time=pulumi.get(__response__, 'expire_time'), + fqdn=pulumi.get(__response__, 'fqdn'), + host_name=pulumi.get(__response__, 'host_name'), + id=pulumi.get(__response__, 'id'), + minimum_ttl=pulumi.get(__response__, 'minimum_ttl'), + name=pulumi.get(__response__, 'name'), + refresh_time=pulumi.get(__response__, 'refresh_time'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + retry_time=pulumi.get(__response__, 'retry_time'), + serial_number=pulumi.get(__response__, 'serial_number'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_srv_record.py b/sdk/python/pulumi_azure/privatedns/get_srv_record.py index 380273241a..248602cdd9 100644 --- a/sdk/python/pulumi_azure/privatedns/get_srv_record.py +++ b/sdk/python/pulumi_azure/privatedns/get_srv_record.py @@ -164,9 +164,6 @@ def get_srv_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_srv_record) def get_srv_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -190,4 +187,18 @@ def get_srv_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the Private DNS Zone (parent resource) exists. :param str zone_name: Specifies the Private DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getSrvRecord:getSrvRecord', __args__, opts=opts, typ=GetSrvRecordResult) + return __ret__.apply(lambda __response__: GetSrvRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_txt_record.py b/sdk/python/pulumi_azure/privatedns/get_txt_record.py index e879afefc2..c7ad066c6c 100644 --- a/sdk/python/pulumi_azure/privatedns/get_txt_record.py +++ b/sdk/python/pulumi_azure/privatedns/get_txt_record.py @@ -164,9 +164,6 @@ def get_txt_record(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), ttl=pulumi.get(__ret__, 'ttl'), zone_name=pulumi.get(__ret__, 'zone_name')) - - -@_utilities.lift_output_func(get_txt_record) def get_txt_record_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, zone_name: Optional[pulumi.Input[str]] = None, @@ -190,4 +187,18 @@ def get_txt_record_output(name: Optional[pulumi.Input[str]] = None, :param str resource_group_name: Specifies the resource group where the Private DNS Zone (parent resource) exists. :param str zone_name: Specifies the Private DNS Zone where the resource exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['zoneName'] = zone_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getTxtRecord:getTxtRecord', __args__, opts=opts, typ=GetTxtRecordResult) + return __ret__.apply(lambda __response__: GetTxtRecordResult( + fqdn=pulumi.get(__response__, 'fqdn'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + records=pulumi.get(__response__, 'records'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + ttl=pulumi.get(__response__, 'ttl'), + zone_name=pulumi.get(__response__, 'zone_name'))) diff --git a/sdk/python/pulumi_azure/privatedns/get_zone_virtual_network_link.py b/sdk/python/pulumi_azure/privatedns/get_zone_virtual_network_link.py index f57e6342eb..5c7032a201 100644 --- a/sdk/python/pulumi_azure/privatedns/get_zone_virtual_network_link.py +++ b/sdk/python/pulumi_azure/privatedns/get_zone_virtual_network_link.py @@ -151,9 +151,6 @@ def get_zone_virtual_network_link(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), virtual_network_id=pulumi.get(__ret__, 'virtual_network_id')) - - -@_utilities.lift_output_func(get_zone_virtual_network_link) def get_zone_virtual_network_link_output(name: Optional[pulumi.Input[str]] = None, private_dns_zone_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -178,4 +175,17 @@ def get_zone_virtual_network_link_output(name: Optional[pulumi.Input[str]] = Non :param str private_dns_zone_name: The name of the Private DNS zone (without a terminating dot). :param str resource_group_name: Specifies the resource group where the Private DNS Zone exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['privateDnsZoneName'] = private_dns_zone_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatedns/getZoneVirtualNetworkLink:getZoneVirtualNetworkLink', __args__, opts=opts, typ=GetZoneVirtualNetworkLinkResult) + return __ret__.apply(lambda __response__: GetZoneVirtualNetworkLinkResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + private_dns_zone_name=pulumi.get(__response__, 'private_dns_zone_name'), + registration_enabled=pulumi.get(__response__, 'registration_enabled'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + virtual_network_id=pulumi.get(__response__, 'virtual_network_id'))) diff --git a/sdk/python/pulumi_azure/privatelink/get_endpoint_connection.py b/sdk/python/pulumi_azure/privatelink/get_endpoint_connection.py index 6d45f0d6db..6156829de4 100644 --- a/sdk/python/pulumi_azure/privatelink/get_endpoint_connection.py +++ b/sdk/python/pulumi_azure/privatelink/get_endpoint_connection.py @@ -135,9 +135,6 @@ def get_endpoint_connection(name: Optional[str] = None, network_interfaces=pulumi.get(__ret__, 'network_interfaces'), private_service_connections=pulumi.get(__ret__, 'private_service_connections'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_endpoint_connection) def get_endpoint_connection_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEndpointConnectionResult]: @@ -159,4 +156,15 @@ def get_endpoint_connection_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the Name of the private endpoint. :param str resource_group_name: Specifies the Name of the Resource Group within which the private endpoint exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatelink/getEndpointConnection:getEndpointConnection', __args__, opts=opts, typ=GetEndpointConnectionResult) + return __ret__.apply(lambda __response__: GetEndpointConnectionResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + network_interfaces=pulumi.get(__response__, 'network_interfaces'), + private_service_connections=pulumi.get(__response__, 'private_service_connections'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/privatelink/get_service.py b/sdk/python/pulumi_azure/privatelink/get_service.py index 6e97a25a99..bf569bcae6 100644 --- a/sdk/python/pulumi_azure/privatelink/get_service.py +++ b/sdk/python/pulumi_azure/privatelink/get_service.py @@ -206,9 +206,6 @@ def get_service(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags'), visibility_subscription_ids=pulumi.get(__ret__, 'visibility_subscription_ids')) - - -@_utilities.lift_output_func(get_service) def get_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceResult]: @@ -230,4 +227,20 @@ def get_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the private link service. :param str resource_group_name: The name of the resource group in which the private link service resides. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatelink/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + alias=pulumi.get(__response__, 'alias'), + auto_approval_subscription_ids=pulumi.get(__response__, 'auto_approval_subscription_ids'), + enable_proxy_protocol=pulumi.get(__response__, 'enable_proxy_protocol'), + id=pulumi.get(__response__, 'id'), + load_balancer_frontend_ip_configuration_ids=pulumi.get(__response__, 'load_balancer_frontend_ip_configuration_ids'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + nat_ip_configurations=pulumi.get(__response__, 'nat_ip_configurations'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'), + visibility_subscription_ids=pulumi.get(__response__, 'visibility_subscription_ids'))) diff --git a/sdk/python/pulumi_azure/privatelink/get_service_endpoint_connections.py b/sdk/python/pulumi_azure/privatelink/get_service_endpoint_connections.py index 946168e742..faabb50982 100644 --- a/sdk/python/pulumi_azure/privatelink/get_service_endpoint_connections.py +++ b/sdk/python/pulumi_azure/privatelink/get_service_endpoint_connections.py @@ -132,9 +132,6 @@ def get_service_endpoint_connections(resource_group_name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), service_id=pulumi.get(__ret__, 'service_id'), service_name=pulumi.get(__ret__, 'service_name')) - - -@_utilities.lift_output_func(get_service_endpoint_connections) def get_service_endpoint_connections_output(resource_group_name: Optional[pulumi.Input[str]] = None, service_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceEndpointConnectionsResult]: @@ -156,4 +153,15 @@ def get_service_endpoint_connections_output(resource_group_name: Optional[pulumi :param str resource_group_name: The name of the resource group in which the private link service resides. :param str service_id: The resource ID of the private link service. """ - ... + __args__ = dict() + __args__['resourceGroupName'] = resource_group_name + __args__['serviceId'] = service_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:privatelink/getServiceEndpointConnections:getServiceEndpointConnections', __args__, opts=opts, typ=GetServiceEndpointConnectionsResult) + return __ret__.apply(lambda __response__: GetServiceEndpointConnectionsResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + private_endpoint_connections=pulumi.get(__response__, 'private_endpoint_connections'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + service_id=pulumi.get(__response__, 'service_id'), + service_name=pulumi.get(__response__, 'service_name'))) diff --git a/sdk/python/pulumi_azure/proximity/get_placement_group.py b/sdk/python/pulumi_azure/proximity/get_placement_group.py index 192ad466b2..ed2b602be0 100644 --- a/sdk/python/pulumi_azure/proximity/get_placement_group.py +++ b/sdk/python/pulumi_azure/proximity/get_placement_group.py @@ -118,9 +118,6 @@ def get_placement_group(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_placement_group) def get_placement_group_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPlacementGroupResult]: @@ -142,4 +139,14 @@ def get_placement_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Proximity Placement Group. :param str resource_group_name: The name of the resource group in which the Proximity Placement Group exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:proximity/getPlacementGroup:getPlacementGroup', __args__, opts=opts, typ=GetPlacementGroupResult) + return __ret__.apply(lambda __response__: GetPlacementGroupResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/recoveryservices/get_vault.py b/sdk/python/pulumi_azure/recoveryservices/get_vault.py index 5e8566eedf..f0014cab93 100644 --- a/sdk/python/pulumi_azure/recoveryservices/get_vault.py +++ b/sdk/python/pulumi_azure/recoveryservices/get_vault.py @@ -150,9 +150,6 @@ def get_vault(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_vault) def get_vault_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVaultResult]: @@ -173,4 +170,16 @@ def get_vault_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Recovery Services Vault. :param str resource_group_name: The name of the resource group in which the Recovery Services Vault resides. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:recoveryservices/getVault:getVault', __args__, opts=opts, typ=GetVaultResult) + return __ret__.apply(lambda __response__: GetVaultResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/redis/get_cache.py b/sdk/python/pulumi_azure/redis/get_cache.py index 0c18d71e4f..f85dfe7ea0 100644 --- a/sdk/python/pulumi_azure/redis/get_cache.py +++ b/sdk/python/pulumi_azure/redis/get_cache.py @@ -361,9 +361,6 @@ def get_cache(name: Optional[str] = None, subnet_id=pulumi.get(__ret__, 'subnet_id'), tags=pulumi.get(__ret__, 'tags'), zones=pulumi.get(__ret__, 'zones')) - - -@_utilities.lift_output_func(get_cache) def get_cache_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetCacheResult]: @@ -386,4 +383,33 @@ def get_cache_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Redis cache :param str resource_group_name: The name of the resource group the Redis cache instance is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:redis/getCache:getCache', __args__, opts=opts, typ=GetCacheResult) + return __ret__.apply(lambda __response__: GetCacheResult( + access_keys_authentication_enabled=pulumi.get(__response__, 'access_keys_authentication_enabled'), + capacity=pulumi.get(__response__, 'capacity'), + family=pulumi.get(__response__, 'family'), + hostname=pulumi.get(__response__, 'hostname'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + minimum_tls_version=pulumi.get(__response__, 'minimum_tls_version'), + name=pulumi.get(__response__, 'name'), + non_ssl_port_enabled=pulumi.get(__response__, 'non_ssl_port_enabled'), + patch_schedules=pulumi.get(__response__, 'patch_schedules'), + port=pulumi.get(__response__, 'port'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + private_static_ip_address=pulumi.get(__response__, 'private_static_ip_address'), + redis_configurations=pulumi.get(__response__, 'redis_configurations'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + shard_count=pulumi.get(__response__, 'shard_count'), + sku_name=pulumi.get(__response__, 'sku_name'), + ssl_port=pulumi.get(__response__, 'ssl_port'), + subnet_id=pulumi.get(__response__, 'subnet_id'), + tags=pulumi.get(__response__, 'tags'), + zones=pulumi.get(__response__, 'zones'))) diff --git a/sdk/python/pulumi_azure/redis/get_enterprise_database.py b/sdk/python/pulumi_azure/redis/get_enterprise_database.py index dbe609faf6..70172dfcca 100644 --- a/sdk/python/pulumi_azure/redis/get_enterprise_database.py +++ b/sdk/python/pulumi_azure/redis/get_enterprise_database.py @@ -145,9 +145,6 @@ def get_enterprise_database(cluster_id: Optional[str] = None, name=pulumi.get(__ret__, 'name'), primary_access_key=pulumi.get(__ret__, 'primary_access_key'), secondary_access_key=pulumi.get(__ret__, 'secondary_access_key')) - - -@_utilities.lift_output_func(get_enterprise_database) def get_enterprise_database_output(cluster_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEnterpriseDatabaseResult]: @@ -158,4 +155,16 @@ def get_enterprise_database_output(cluster_id: Optional[pulumi.Input[str]] = Non :param str cluster_id: The resource ID of Redis Enterprise Cluster which hosts the Redis Enterprise Database instance. :param str name: The name of the Redis Enterprise Database. """ - ... + __args__ = dict() + __args__['clusterId'] = cluster_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:redis/getEnterpriseDatabase:getEnterpriseDatabase', __args__, opts=opts, typ=GetEnterpriseDatabaseResult) + return __ret__.apply(lambda __response__: GetEnterpriseDatabaseResult( + cluster_id=pulumi.get(__response__, 'cluster_id'), + id=pulumi.get(__response__, 'id'), + linked_database_group_nickname=pulumi.get(__response__, 'linked_database_group_nickname'), + linked_database_ids=pulumi.get(__response__, 'linked_database_ids'), + name=pulumi.get(__response__, 'name'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'))) diff --git a/sdk/python/pulumi_azure/role/get_role_definition.py b/sdk/python/pulumi_azure/role/get_role_definition.py index 6da40c38ab..9566d20545 100644 --- a/sdk/python/pulumi_azure/role/get_role_definition.py +++ b/sdk/python/pulumi_azure/role/get_role_definition.py @@ -180,9 +180,6 @@ def get_role_definition(name: Optional[str] = None, role_definition_id=pulumi.get(__ret__, 'role_definition_id'), scope=pulumi.get(__ret__, 'scope'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_role_definition) def get_role_definition_output(name: Optional[pulumi.Input[Optional[str]]] = None, role_definition_id: Optional[pulumi.Input[Optional[str]]] = None, scope: Optional[pulumi.Input[Optional[str]]] = None, @@ -220,4 +217,18 @@ def get_role_definition_output(name: Optional[pulumi.Input[Optional[str]]] = Non > **Note:** One of `name` or `role_definition_id` must be specified. """ pulumi.log.warn("""get_role_definition is deprecated: azure.role.getRoleDefinition has been deprecated in favor of azure.authorization.getRoleDefinition""") - ... + __args__ = dict() + __args__['name'] = name + __args__['roleDefinitionId'] = role_definition_id + __args__['scope'] = scope + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:role/getRoleDefinition:getRoleDefinition', __args__, opts=opts, typ=GetRoleDefinitionResult) + return __ret__.apply(lambda __response__: GetRoleDefinitionResult( + assignable_scopes=pulumi.get(__response__, 'assignable_scopes'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + permissions=pulumi.get(__response__, 'permissions'), + role_definition_id=pulumi.get(__response__, 'role_definition_id'), + scope=pulumi.get(__response__, 'scope'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_azure/search/get_service.py b/sdk/python/pulumi_azure/search/get_service.py index 827b5cafec..9ca2a0653b 100644 --- a/sdk/python/pulumi_azure/search/get_service.py +++ b/sdk/python/pulumi_azure/search/get_service.py @@ -208,9 +208,6 @@ def get_service(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), secondary_key=pulumi.get(__ret__, 'secondary_key'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_service) def get_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceResult]: @@ -234,4 +231,20 @@ def get_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: The Name of the Search Service. :param str resource_group_name: The name of the Resource Group where the Search Service exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:search/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + name=pulumi.get(__response__, 'name'), + partition_count=pulumi.get(__response__, 'partition_count'), + primary_key=pulumi.get(__response__, 'primary_key'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + query_keys=pulumi.get(__response__, 'query_keys'), + replica_count=pulumi.get(__response__, 'replica_count'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_key=pulumi.get(__response__, 'secondary_key'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/sentinel/get_alert_rule.py b/sdk/python/pulumi_azure/sentinel/get_alert_rule.py index 4ff7de7195..005439ca51 100644 --- a/sdk/python/pulumi_azure/sentinel/get_alert_rule.py +++ b/sdk/python/pulumi_azure/sentinel/get_alert_rule.py @@ -100,9 +100,6 @@ def get_alert_rule(log_analytics_workspace_id: Optional[str] = None, id=pulumi.get(__ret__, 'id'), log_analytics_workspace_id=pulumi.get(__ret__, 'log_analytics_workspace_id'), name=pulumi.get(__ret__, 'name')) - - -@_utilities.lift_output_func(get_alert_rule) def get_alert_rule_output(log_analytics_workspace_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAlertRuleResult]: @@ -126,4 +123,12 @@ def get_alert_rule_output(log_analytics_workspace_id: Optional[pulumi.Input[str] :param str log_analytics_workspace_id: The ID of the Log Analytics Workspace this Sentinel Alert Rule belongs to. :param str name: The name which should be used for this Sentinel Alert Rule. """ - ... + __args__ = dict() + __args__['logAnalyticsWorkspaceId'] = log_analytics_workspace_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:sentinel/getAlertRule:getAlertRule', __args__, opts=opts, typ=GetAlertRuleResult) + return __ret__.apply(lambda __response__: GetAlertRuleResult( + id=pulumi.get(__response__, 'id'), + log_analytics_workspace_id=pulumi.get(__response__, 'log_analytics_workspace_id'), + name=pulumi.get(__response__, 'name'))) diff --git a/sdk/python/pulumi_azure/sentinel/get_alert_rule_anomaly.py b/sdk/python/pulumi_azure/sentinel/get_alert_rule_anomaly.py index d7df84a5b4..2576b59f73 100644 --- a/sdk/python/pulumi_azure/sentinel/get_alert_rule_anomaly.py +++ b/sdk/python/pulumi_azure/sentinel/get_alert_rule_anomaly.py @@ -307,9 +307,6 @@ def get_alert_rule_anomaly(display_name: Optional[str] = None, tactics=pulumi.get(__ret__, 'tactics'), techniques=pulumi.get(__ret__, 'techniques'), threshold_observations=pulumi.get(__ret__, 'threshold_observations')) - - -@_utilities.lift_output_func(get_alert_rule_anomaly) def get_alert_rule_anomaly_output(display_name: Optional[pulumi.Input[Optional[str]]] = None, log_analytics_workspace_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, @@ -346,4 +343,28 @@ def get_alert_rule_anomaly_output(display_name: Optional[pulumi.Input[Optional[s :param str log_analytics_workspace_id: The ID of the Log Analytics Workspace. :param str name: The guid of this Sentinel Alert Rule Template. Either `display_name` or `name` have to be specified. """ - ... + __args__ = dict() + __args__['displayName'] = display_name + __args__['logAnalyticsWorkspaceId'] = log_analytics_workspace_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:sentinel/getAlertRuleAnomaly:getAlertRuleAnomaly', __args__, opts=opts, typ=GetAlertRuleAnomalyResult) + return __ret__.apply(lambda __response__: GetAlertRuleAnomalyResult( + anomaly_settings_version=pulumi.get(__response__, 'anomaly_settings_version'), + anomaly_version=pulumi.get(__response__, 'anomaly_version'), + description=pulumi.get(__response__, 'description'), + display_name=pulumi.get(__response__, 'display_name'), + enabled=pulumi.get(__response__, 'enabled'), + frequency=pulumi.get(__response__, 'frequency'), + id=pulumi.get(__response__, 'id'), + log_analytics_workspace_id=pulumi.get(__response__, 'log_analytics_workspace_id'), + mode=pulumi.get(__response__, 'mode'), + multi_select_observations=pulumi.get(__response__, 'multi_select_observations'), + name=pulumi.get(__response__, 'name'), + prioritized_exclude_observations=pulumi.get(__response__, 'prioritized_exclude_observations'), + required_data_connectors=pulumi.get(__response__, 'required_data_connectors'), + settings_definition_id=pulumi.get(__response__, 'settings_definition_id'), + single_select_observations=pulumi.get(__response__, 'single_select_observations'), + tactics=pulumi.get(__response__, 'tactics'), + techniques=pulumi.get(__response__, 'techniques'), + threshold_observations=pulumi.get(__response__, 'threshold_observations'))) diff --git a/sdk/python/pulumi_azure/sentinel/get_alert_rule_template.py b/sdk/python/pulumi_azure/sentinel/get_alert_rule_template.py index 154442f284..3925e09b14 100644 --- a/sdk/python/pulumi_azure/sentinel/get_alert_rule_template.py +++ b/sdk/python/pulumi_azure/sentinel/get_alert_rule_template.py @@ -153,9 +153,6 @@ def get_alert_rule_template(display_name: Optional[str] = None, nrt_templates=pulumi.get(__ret__, 'nrt_templates'), scheduled_templates=pulumi.get(__ret__, 'scheduled_templates'), security_incident_templates=pulumi.get(__ret__, 'security_incident_templates')) - - -@_utilities.lift_output_func(get_alert_rule_template) def get_alert_rule_template_output(display_name: Optional[pulumi.Input[Optional[str]]] = None, log_analytics_workspace_id: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, @@ -181,4 +178,17 @@ def get_alert_rule_template_output(display_name: Optional[pulumi.Input[Optional[ :param str log_analytics_workspace_id: The ID of the Log Analytics Workspace. :param str name: The name of this Sentinel Alert Rule Template. Either `display_name` or `name` have to be specified. """ - ... + __args__ = dict() + __args__['displayName'] = display_name + __args__['logAnalyticsWorkspaceId'] = log_analytics_workspace_id + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:sentinel/getAlertRuleTemplate:getAlertRuleTemplate', __args__, opts=opts, typ=GetAlertRuleTemplateResult) + return __ret__.apply(lambda __response__: GetAlertRuleTemplateResult( + display_name=pulumi.get(__response__, 'display_name'), + id=pulumi.get(__response__, 'id'), + log_analytics_workspace_id=pulumi.get(__response__, 'log_analytics_workspace_id'), + name=pulumi.get(__response__, 'name'), + nrt_templates=pulumi.get(__response__, 'nrt_templates'), + scheduled_templates=pulumi.get(__response__, 'scheduled_templates'), + security_incident_templates=pulumi.get(__response__, 'security_incident_templates'))) diff --git a/sdk/python/pulumi_azure/servicebus/get_namespace.py b/sdk/python/pulumi_azure/servicebus/get_namespace.py index 8cabc89f2e..c2b207bca8 100644 --- a/sdk/python/pulumi_azure/servicebus/get_namespace.py +++ b/sdk/python/pulumi_azure/servicebus/get_namespace.py @@ -230,9 +230,6 @@ def get_namespace(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), sku=pulumi.get(__ret__, 'sku'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_namespace) def get_namespace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]: @@ -254,4 +251,22 @@ def get_namespace_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the ServiceBus Namespace. :param str resource_group_name: Specifies the name of the Resource Group where the ServiceBus Namespace exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:servicebus/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult) + return __ret__.apply(lambda __response__: GetNamespaceResult( + capacity=pulumi.get(__response__, 'capacity'), + default_primary_connection_string=pulumi.get(__response__, 'default_primary_connection_string'), + default_primary_key=pulumi.get(__response__, 'default_primary_key'), + default_secondary_connection_string=pulumi.get(__response__, 'default_secondary_connection_string'), + default_secondary_key=pulumi.get(__response__, 'default_secondary_key'), + endpoint=pulumi.get(__response__, 'endpoint'), + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + premium_messaging_partitions=pulumi.get(__response__, 'premium_messaging_partitions'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/servicebus/get_namespace_authorization_rule.py b/sdk/python/pulumi_azure/servicebus/get_namespace_authorization_rule.py index 4a1db8a3e7..d471a44c9c 100644 --- a/sdk/python/pulumi_azure/servicebus/get_namespace_authorization_rule.py +++ b/sdk/python/pulumi_azure/servicebus/get_namespace_authorization_rule.py @@ -202,9 +202,6 @@ def get_namespace_authorization_rule(name: Optional[str] = None, secondary_connection_string=pulumi.get(__ret__, 'secondary_connection_string'), secondary_connection_string_alias=pulumi.get(__ret__, 'secondary_connection_string_alias'), secondary_key=pulumi.get(__ret__, 'secondary_key')) - - -@_utilities.lift_output_func(get_namespace_authorization_rule) def get_namespace_authorization_rule_output(name: Optional[pulumi.Input[str]] = None, namespace_id: Optional[pulumi.Input[Optional[str]]] = None, namespace_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -228,4 +225,22 @@ def get_namespace_authorization_rule_output(name: Optional[pulumi.Input[str]] = :param str name: Specifies the name of the ServiceBus Namespace Authorization Rule. :param str namespace_id: Specifies the ID of the ServiceBus Namespace where the Service Bus Namespace Authorization Rule exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceId'] = namespace_id + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:servicebus/getNamespaceAuthorizationRule:getNamespaceAuthorizationRule', __args__, opts=opts, typ=GetNamespaceAuthorizationRuleResult) + return __ret__.apply(lambda __response__: GetNamespaceAuthorizationRuleResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + namespace_id=pulumi.get(__response__, 'namespace_id'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_connection_string_alias=pulumi.get(__response__, 'primary_connection_string_alias'), + primary_key=pulumi.get(__response__, 'primary_key'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_connection_string_alias=pulumi.get(__response__, 'secondary_connection_string_alias'), + secondary_key=pulumi.get(__response__, 'secondary_key'))) diff --git a/sdk/python/pulumi_azure/servicebus/get_namespace_disaster_recovery_config.py b/sdk/python/pulumi_azure/servicebus/get_namespace_disaster_recovery_config.py index 66ed5fb0fd..dc239fe49a 100644 --- a/sdk/python/pulumi_azure/servicebus/get_namespace_disaster_recovery_config.py +++ b/sdk/python/pulumi_azure/servicebus/get_namespace_disaster_recovery_config.py @@ -171,9 +171,6 @@ def get_namespace_disaster_recovery_config(alias_authorization_rule_id: Optional primary_connection_string_alias=pulumi.get(__ret__, 'primary_connection_string_alias'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), secondary_connection_string_alias=pulumi.get(__ret__, 'secondary_connection_string_alias')) - - -@_utilities.lift_output_func(get_namespace_disaster_recovery_config) def get_namespace_disaster_recovery_config_output(alias_authorization_rule_id: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[str]] = None, namespace_id: Optional[pulumi.Input[Optional[str]]] = None, @@ -183,4 +180,23 @@ def get_namespace_disaster_recovery_config_output(alias_authorization_rule_id: O """ Use this data source to access information about an existing resource. """ - ... + __args__ = dict() + __args__['aliasAuthorizationRuleId'] = alias_authorization_rule_id + __args__['name'] = name + __args__['namespaceId'] = namespace_id + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:servicebus/getNamespaceDisasterRecoveryConfig:getNamespaceDisasterRecoveryConfig', __args__, opts=opts, typ=GetNamespaceDisasterRecoveryConfigResult) + return __ret__.apply(lambda __response__: GetNamespaceDisasterRecoveryConfigResult( + alias_authorization_rule_id=pulumi.get(__response__, 'alias_authorization_rule_id'), + default_primary_key=pulumi.get(__response__, 'default_primary_key'), + default_secondary_key=pulumi.get(__response__, 'default_secondary_key'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + namespace_id=pulumi.get(__response__, 'namespace_id'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + partner_namespace_id=pulumi.get(__response__, 'partner_namespace_id'), + primary_connection_string_alias=pulumi.get(__response__, 'primary_connection_string_alias'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string_alias=pulumi.get(__response__, 'secondary_connection_string_alias'))) diff --git a/sdk/python/pulumi_azure/servicebus/get_queue.py b/sdk/python/pulumi_azure/servicebus/get_queue.py index 167fadf8ef..a71b32c9b1 100644 --- a/sdk/python/pulumi_azure/servicebus/get_queue.py +++ b/sdk/python/pulumi_azure/servicebus/get_queue.py @@ -319,9 +319,6 @@ def get_queue(name: Optional[str] = None, requires_session=pulumi.get(__ret__, 'requires_session'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), status=pulumi.get(__ret__, 'status')) - - -@_utilities.lift_output_func(get_queue) def get_queue_output(name: Optional[pulumi.Input[str]] = None, namespace_id: Optional[pulumi.Input[Optional[str]]] = None, namespace_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -345,4 +342,31 @@ def get_queue_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Service Bus Queue. :param str namespace_id: The ID of the ServiceBus Namespace where the Service Bus Queue exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceId'] = namespace_id + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:servicebus/getQueue:getQueue', __args__, opts=opts, typ=GetQueueResult) + return __ret__.apply(lambda __response__: GetQueueResult( + auto_delete_on_idle=pulumi.get(__response__, 'auto_delete_on_idle'), + dead_lettering_on_message_expiration=pulumi.get(__response__, 'dead_lettering_on_message_expiration'), + default_message_ttl=pulumi.get(__response__, 'default_message_ttl'), + duplicate_detection_history_time_window=pulumi.get(__response__, 'duplicate_detection_history_time_window'), + enable_batched_operations=pulumi.get(__response__, 'enable_batched_operations'), + enable_express=pulumi.get(__response__, 'enable_express'), + enable_partitioning=pulumi.get(__response__, 'enable_partitioning'), + forward_dead_lettered_messages_to=pulumi.get(__response__, 'forward_dead_lettered_messages_to'), + forward_to=pulumi.get(__response__, 'forward_to'), + id=pulumi.get(__response__, 'id'), + lock_duration=pulumi.get(__response__, 'lock_duration'), + max_delivery_count=pulumi.get(__response__, 'max_delivery_count'), + max_size_in_megabytes=pulumi.get(__response__, 'max_size_in_megabytes'), + name=pulumi.get(__response__, 'name'), + namespace_id=pulumi.get(__response__, 'namespace_id'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + requires_duplicate_detection=pulumi.get(__response__, 'requires_duplicate_detection'), + requires_session=pulumi.get(__response__, 'requires_session'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + status=pulumi.get(__response__, 'status'))) diff --git a/sdk/python/pulumi_azure/servicebus/get_queue_authorization_rule.py b/sdk/python/pulumi_azure/servicebus/get_queue_authorization_rule.py index 778dc17a0d..b8cf1c1aa1 100644 --- a/sdk/python/pulumi_azure/servicebus/get_queue_authorization_rule.py +++ b/sdk/python/pulumi_azure/servicebus/get_queue_authorization_rule.py @@ -246,9 +246,6 @@ def get_queue_authorization_rule(name: Optional[str] = None, secondary_connection_string_alias=pulumi.get(__ret__, 'secondary_connection_string_alias'), secondary_key=pulumi.get(__ret__, 'secondary_key'), send=pulumi.get(__ret__, 'send')) - - -@_utilities.lift_output_func(get_queue_authorization_rule) def get_queue_authorization_rule_output(name: Optional[pulumi.Input[str]] = None, namespace_name: Optional[pulumi.Input[Optional[str]]] = None, queue_id: Optional[pulumi.Input[Optional[str]]] = None, @@ -277,4 +274,27 @@ def get_queue_authorization_rule_output(name: Optional[pulumi.Input[str]] = None :param str queue_name: The name of the ServiceBus Queue. :param str resource_group_name: The name of the Resource Group where the ServiceBus Queue Authorisation Rule exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceName'] = namespace_name + __args__['queueId'] = queue_id + __args__['queueName'] = queue_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:servicebus/getQueueAuthorizationRule:getQueueAuthorizationRule', __args__, opts=opts, typ=GetQueueAuthorizationRuleResult) + return __ret__.apply(lambda __response__: GetQueueAuthorizationRuleResult( + id=pulumi.get(__response__, 'id'), + listen=pulumi.get(__response__, 'listen'), + manage=pulumi.get(__response__, 'manage'), + name=pulumi.get(__response__, 'name'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_connection_string_alias=pulumi.get(__response__, 'primary_connection_string_alias'), + primary_key=pulumi.get(__response__, 'primary_key'), + queue_id=pulumi.get(__response__, 'queue_id'), + queue_name=pulumi.get(__response__, 'queue_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_connection_string_alias=pulumi.get(__response__, 'secondary_connection_string_alias'), + secondary_key=pulumi.get(__response__, 'secondary_key'), + send=pulumi.get(__response__, 'send'))) diff --git a/sdk/python/pulumi_azure/servicebus/get_subscription.py b/sdk/python/pulumi_azure/servicebus/get_subscription.py index 8e3a39b1f1..2eb1ca87fd 100644 --- a/sdk/python/pulumi_azure/servicebus/get_subscription.py +++ b/sdk/python/pulumi_azure/servicebus/get_subscription.py @@ -267,9 +267,6 @@ def get_subscription(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), topic_id=pulumi.get(__ret__, 'topic_id'), topic_name=pulumi.get(__ret__, 'topic_name')) - - -@_utilities.lift_output_func(get_subscription) def get_subscription_output(name: Optional[pulumi.Input[str]] = None, namespace_name: Optional[pulumi.Input[Optional[str]]] = None, resource_group_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -294,4 +291,28 @@ def get_subscription_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the ServiceBus Subscription. :param str topic_id: The ID of the ServiceBus Topic where the Service Bus Subscription exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + __args__['topicId'] = topic_id + __args__['topicName'] = topic_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:servicebus/getSubscription:getSubscription', __args__, opts=opts, typ=GetSubscriptionResult) + return __ret__.apply(lambda __response__: GetSubscriptionResult( + auto_delete_on_idle=pulumi.get(__response__, 'auto_delete_on_idle'), + dead_lettering_on_filter_evaluation_error=pulumi.get(__response__, 'dead_lettering_on_filter_evaluation_error'), + dead_lettering_on_message_expiration=pulumi.get(__response__, 'dead_lettering_on_message_expiration'), + default_message_ttl=pulumi.get(__response__, 'default_message_ttl'), + enable_batched_operations=pulumi.get(__response__, 'enable_batched_operations'), + forward_dead_lettered_messages_to=pulumi.get(__response__, 'forward_dead_lettered_messages_to'), + forward_to=pulumi.get(__response__, 'forward_to'), + id=pulumi.get(__response__, 'id'), + lock_duration=pulumi.get(__response__, 'lock_duration'), + max_delivery_count=pulumi.get(__response__, 'max_delivery_count'), + name=pulumi.get(__response__, 'name'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + requires_session=pulumi.get(__response__, 'requires_session'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + topic_id=pulumi.get(__response__, 'topic_id'), + topic_name=pulumi.get(__response__, 'topic_name'))) diff --git a/sdk/python/pulumi_azure/servicebus/get_topic.py b/sdk/python/pulumi_azure/servicebus/get_topic.py index d54f83c012..f780802731 100644 --- a/sdk/python/pulumi_azure/servicebus/get_topic.py +++ b/sdk/python/pulumi_azure/servicebus/get_topic.py @@ -254,9 +254,6 @@ def get_topic(name: Optional[str] = None, resource_group_name=pulumi.get(__ret__, 'resource_group_name'), status=pulumi.get(__ret__, 'status'), support_ordering=pulumi.get(__ret__, 'support_ordering')) - - -@_utilities.lift_output_func(get_topic) def get_topic_output(name: Optional[pulumi.Input[str]] = None, namespace_id: Optional[pulumi.Input[Optional[str]]] = None, namespace_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -280,4 +277,26 @@ def get_topic_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Service Bus Topic. :param str namespace_id: The ID of the ServiceBus Namespace where the Service Bus Topic exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceId'] = namespace_id + __args__['namespaceName'] = namespace_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:servicebus/getTopic:getTopic', __args__, opts=opts, typ=GetTopicResult) + return __ret__.apply(lambda __response__: GetTopicResult( + auto_delete_on_idle=pulumi.get(__response__, 'auto_delete_on_idle'), + default_message_ttl=pulumi.get(__response__, 'default_message_ttl'), + duplicate_detection_history_time_window=pulumi.get(__response__, 'duplicate_detection_history_time_window'), + enable_batched_operations=pulumi.get(__response__, 'enable_batched_operations'), + enable_express=pulumi.get(__response__, 'enable_express'), + enable_partitioning=pulumi.get(__response__, 'enable_partitioning'), + id=pulumi.get(__response__, 'id'), + max_size_in_megabytes=pulumi.get(__response__, 'max_size_in_megabytes'), + name=pulumi.get(__response__, 'name'), + namespace_id=pulumi.get(__response__, 'namespace_id'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + requires_duplicate_detection=pulumi.get(__response__, 'requires_duplicate_detection'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + status=pulumi.get(__response__, 'status'), + support_ordering=pulumi.get(__response__, 'support_ordering'))) diff --git a/sdk/python/pulumi_azure/servicebus/get_topic_authorization_rule.py b/sdk/python/pulumi_azure/servicebus/get_topic_authorization_rule.py index 8519e094ea..960465d525 100644 --- a/sdk/python/pulumi_azure/servicebus/get_topic_authorization_rule.py +++ b/sdk/python/pulumi_azure/servicebus/get_topic_authorization_rule.py @@ -258,9 +258,6 @@ def get_topic_authorization_rule(name: Optional[str] = None, send=pulumi.get(__ret__, 'send'), topic_id=pulumi.get(__ret__, 'topic_id'), topic_name=pulumi.get(__ret__, 'topic_name')) - - -@_utilities.lift_output_func(get_topic_authorization_rule) def get_topic_authorization_rule_output(name: Optional[pulumi.Input[str]] = None, namespace_name: Optional[pulumi.Input[Optional[str]]] = None, queue_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -290,4 +287,29 @@ def get_topic_authorization_rule_output(name: Optional[pulumi.Input[str]] = None :param str resource_group_name: The name of the resource group in which the ServiceBus Namespace exists. :param str topic_name: The name of the ServiceBus Topic. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespaceName'] = namespace_name + __args__['queueName'] = queue_name + __args__['resourceGroupName'] = resource_group_name + __args__['topicId'] = topic_id + __args__['topicName'] = topic_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:servicebus/getTopicAuthorizationRule:getTopicAuthorizationRule', __args__, opts=opts, typ=GetTopicAuthorizationRuleResult) + return __ret__.apply(lambda __response__: GetTopicAuthorizationRuleResult( + id=pulumi.get(__response__, 'id'), + listen=pulumi.get(__response__, 'listen'), + manage=pulumi.get(__response__, 'manage'), + name=pulumi.get(__response__, 'name'), + namespace_name=pulumi.get(__response__, 'namespace_name'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_connection_string_alias=pulumi.get(__response__, 'primary_connection_string_alias'), + primary_key=pulumi.get(__response__, 'primary_key'), + queue_name=pulumi.get(__response__, 'queue_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_connection_string_alias=pulumi.get(__response__, 'secondary_connection_string_alias'), + secondary_key=pulumi.get(__response__, 'secondary_key'), + send=pulumi.get(__response__, 'send'), + topic_id=pulumi.get(__response__, 'topic_id'), + topic_name=pulumi.get(__response__, 'topic_name'))) diff --git a/sdk/python/pulumi_azure/signalr/get_service.py b/sdk/python/pulumi_azure/signalr/get_service.py index 5a19bc6b8b..6363916cf2 100644 --- a/sdk/python/pulumi_azure/signalr/get_service.py +++ b/sdk/python/pulumi_azure/signalr/get_service.py @@ -289,9 +289,6 @@ def get_service(name: Optional[str] = None, serverless_connection_timeout_in_seconds=pulumi.get(__ret__, 'serverless_connection_timeout_in_seconds'), tags=pulumi.get(__ret__, 'tags'), tls_client_cert_enabled=pulumi.get(__ret__, 'tls_client_cert_enabled')) - - -@_utilities.lift_output_func(get_service) def get_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceResult]: @@ -312,4 +309,27 @@ def get_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the SignalR service. :param str resource_group_name: Specifies the name of the resource group the SignalR service is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:signalr/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + aad_auth_enabled=pulumi.get(__response__, 'aad_auth_enabled'), + hostname=pulumi.get(__response__, 'hostname'), + id=pulumi.get(__response__, 'id'), + ip_address=pulumi.get(__response__, 'ip_address'), + local_auth_enabled=pulumi.get(__response__, 'local_auth_enabled'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + public_port=pulumi.get(__response__, 'public_port'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + server_port=pulumi.get(__response__, 'server_port'), + serverless_connection_timeout_in_seconds=pulumi.get(__response__, 'serverless_connection_timeout_in_seconds'), + tags=pulumi.get(__response__, 'tags'), + tls_client_cert_enabled=pulumi.get(__response__, 'tls_client_cert_enabled'))) diff --git a/sdk/python/pulumi_azure/siterecovery/get_fabric.py b/sdk/python/pulumi_azure/siterecovery/get_fabric.py index 4b865b915a..3c90b0dade 100644 --- a/sdk/python/pulumi_azure/siterecovery/get_fabric.py +++ b/sdk/python/pulumi_azure/siterecovery/get_fabric.py @@ -124,9 +124,6 @@ def get_fabric(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), recovery_vault_name=pulumi.get(__ret__, 'recovery_vault_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_fabric) def get_fabric_output(name: Optional[pulumi.Input[str]] = None, recovery_vault_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -150,4 +147,15 @@ def get_fabric_output(name: Optional[pulumi.Input[str]] = None, :param str recovery_vault_name: The name of the Recovery Services Vault that the Site Recovery Replication Fabric is associated witth. :param str resource_group_name: The name of the resource group in which the associated Recovery Services Vault resides. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['recoveryVaultName'] = recovery_vault_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:siterecovery/getFabric:getFabric', __args__, opts=opts, typ=GetFabricResult) + return __ret__.apply(lambda __response__: GetFabricResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + recovery_vault_name=pulumi.get(__response__, 'recovery_vault_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/siterecovery/get_protection_container.py b/sdk/python/pulumi_azure/siterecovery/get_protection_container.py index 844ad4cedd..f4ba801c6d 100644 --- a/sdk/python/pulumi_azure/siterecovery/get_protection_container.py +++ b/sdk/python/pulumi_azure/siterecovery/get_protection_container.py @@ -125,9 +125,6 @@ def get_protection_container(name: Optional[str] = None, recovery_fabric_name=pulumi.get(__ret__, 'recovery_fabric_name'), recovery_vault_name=pulumi.get(__ret__, 'recovery_vault_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_protection_container) def get_protection_container_output(name: Optional[pulumi.Input[str]] = None, recovery_fabric_name: Optional[pulumi.Input[str]] = None, recovery_vault_name: Optional[pulumi.Input[str]] = None, @@ -154,4 +151,16 @@ def get_protection_container_output(name: Optional[pulumi.Input[str]] = None, :param str recovery_vault_name: The name of the Recovery Services Vault that the protection container is associated witth. :param str resource_group_name: The name of the resource group in which the associated protection container resides. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['recoveryFabricName'] = recovery_fabric_name + __args__['recoveryVaultName'] = recovery_vault_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:siterecovery/getProtectionContainer:getProtectionContainer', __args__, opts=opts, typ=GetProtectionContainerResult) + return __ret__.apply(lambda __response__: GetProtectionContainerResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + recovery_fabric_name=pulumi.get(__response__, 'recovery_fabric_name'), + recovery_vault_name=pulumi.get(__response__, 'recovery_vault_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/siterecovery/get_replication_policy.py b/sdk/python/pulumi_azure/siterecovery/get_replication_policy.py index 9ef7bfb23a..4324e5b2a3 100644 --- a/sdk/python/pulumi_azure/siterecovery/get_replication_policy.py +++ b/sdk/python/pulumi_azure/siterecovery/get_replication_policy.py @@ -137,9 +137,6 @@ def get_replication_policy(name: Optional[str] = None, recovery_point_retention_in_minutes=pulumi.get(__ret__, 'recovery_point_retention_in_minutes'), recovery_vault_name=pulumi.get(__ret__, 'recovery_vault_name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name')) - - -@_utilities.lift_output_func(get_replication_policy) def get_replication_policy_output(name: Optional[pulumi.Input[str]] = None, recovery_vault_name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, @@ -163,4 +160,16 @@ def get_replication_policy_output(name: Optional[pulumi.Input[str]] = None, :param str recovery_vault_name: The name of the Recovery Services Vault that the Azure Site Recovery replication policy is associated witth. :param str resource_group_name: The name of the resource group in which the associated Azure Site Recovery replication policy resides. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['recoveryVaultName'] = recovery_vault_name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:siterecovery/getReplicationPolicy:getReplicationPolicy', __args__, opts=opts, typ=GetReplicationPolicyResult) + return __ret__.apply(lambda __response__: GetReplicationPolicyResult( + application_consistent_snapshot_frequency_in_minutes=pulumi.get(__response__, 'application_consistent_snapshot_frequency_in_minutes'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + recovery_point_retention_in_minutes=pulumi.get(__response__, 'recovery_point_retention_in_minutes'), + recovery_vault_name=pulumi.get(__response__, 'recovery_vault_name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'))) diff --git a/sdk/python/pulumi_azure/siterecovery/get_replication_recovery_plan.py b/sdk/python/pulumi_azure/siterecovery/get_replication_recovery_plan.py index 96a74911f7..2d1ed0ac9a 100644 --- a/sdk/python/pulumi_azure/siterecovery/get_replication_recovery_plan.py +++ b/sdk/python/pulumi_azure/siterecovery/get_replication_recovery_plan.py @@ -162,9 +162,6 @@ def get_replication_recovery_plan(name: Optional[str] = None, recovery_vault_id=pulumi.get(__ret__, 'recovery_vault_id'), source_recovery_fabric_id=pulumi.get(__ret__, 'source_recovery_fabric_id'), target_recovery_fabric_id=pulumi.get(__ret__, 'target_recovery_fabric_id')) - - -@_utilities.lift_output_func(get_replication_recovery_plan) def get_replication_recovery_plan_output(name: Optional[pulumi.Input[str]] = None, recovery_vault_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetReplicationRecoveryPlanResult]: @@ -187,4 +184,17 @@ def get_replication_recovery_plan_output(name: Optional[pulumi.Input[str]] = Non :param str name: The name of the Replication Plan. :param str recovery_vault_id: The ID of the vault that should be updated. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['recoveryVaultId'] = recovery_vault_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:siterecovery/getReplicationRecoveryPlan:getReplicationRecoveryPlan', __args__, opts=opts, typ=GetReplicationRecoveryPlanResult) + return __ret__.apply(lambda __response__: GetReplicationRecoveryPlanResult( + azure_to_azure_settings=pulumi.get(__response__, 'azure_to_azure_settings'), + failover_deployment_model=pulumi.get(__response__, 'failover_deployment_model'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + recovery_groups=pulumi.get(__response__, 'recovery_groups'), + recovery_vault_id=pulumi.get(__response__, 'recovery_vault_id'), + source_recovery_fabric_id=pulumi.get(__response__, 'source_recovery_fabric_id'), + target_recovery_fabric_id=pulumi.get(__response__, 'target_recovery_fabric_id'))) diff --git a/sdk/python/pulumi_azure/stack/get_hci_cluster.py b/sdk/python/pulumi_azure/stack/get_hci_cluster.py index 46b288f455..bb1397498b 100644 --- a/sdk/python/pulumi_azure/stack/get_hci_cluster.py +++ b/sdk/python/pulumi_azure/stack/get_hci_cluster.py @@ -218,9 +218,6 @@ def get_hci_cluster(name: Optional[str] = None, service_endpoint=pulumi.get(__ret__, 'service_endpoint'), tags=pulumi.get(__ret__, 'tags'), tenant_id=pulumi.get(__ret__, 'tenant_id')) - - -@_utilities.lift_output_func(get_hci_cluster) def get_hci_cluster_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetHciClusterResult]: @@ -244,4 +241,21 @@ def get_hci_cluster_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Azure Stack HCI Cluster. :param str resource_group_name: The name of the Resource Group where the Azure Stack HCI Cluster exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:stack/getHciCluster:getHciCluster', __args__, opts=opts, typ=GetHciClusterResult) + return __ret__.apply(lambda __response__: GetHciClusterResult( + automanage_configuration_id=pulumi.get(__response__, 'automanage_configuration_id'), + client_id=pulumi.get(__response__, 'client_id'), + cloud_id=pulumi.get(__response__, 'cloud_id'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + resource_provider_object_id=pulumi.get(__response__, 'resource_provider_object_id'), + service_endpoint=pulumi.get(__response__, 'service_endpoint'), + tags=pulumi.get(__response__, 'tags'), + tenant_id=pulumi.get(__response__, 'tenant_id'))) diff --git a/sdk/python/pulumi_azure/storage/get_account.py b/sdk/python/pulumi_azure/storage/get_account.py index ab9d640da3..fc05b31771 100644 --- a/sdk/python/pulumi_azure/storage/get_account.py +++ b/sdk/python/pulumi_azure/storage/get_account.py @@ -1276,9 +1276,6 @@ def get_account(min_tls_version: Optional[str] = None, secondary_web_microsoft_host=pulumi.get(__ret__, 'secondary_web_microsoft_host'), table_encryption_key_type=pulumi.get(__ret__, 'table_encryption_key_type'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_account) def get_account_output(min_tls_version: Optional[pulumi.Input[Optional[str]]] = None, name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -1302,4 +1299,103 @@ def get_account_output(min_tls_version: Optional[pulumi.Input[Optional[str]]] = :param str name: Specifies the name of the Storage Account :param str resource_group_name: Specifies the name of the resource group the Storage Account is located in. """ - ... + __args__ = dict() + __args__['minTlsVersion'] = min_tls_version + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getAccount:getAccount', __args__, opts=opts, typ=GetAccountResult) + return __ret__.apply(lambda __response__: GetAccountResult( + access_tier=pulumi.get(__response__, 'access_tier'), + account_kind=pulumi.get(__response__, 'account_kind'), + account_replication_type=pulumi.get(__response__, 'account_replication_type'), + account_tier=pulumi.get(__response__, 'account_tier'), + allow_nested_items_to_be_public=pulumi.get(__response__, 'allow_nested_items_to_be_public'), + azure_files_authentications=pulumi.get(__response__, 'azure_files_authentications'), + custom_domains=pulumi.get(__response__, 'custom_domains'), + dns_endpoint_type=pulumi.get(__response__, 'dns_endpoint_type'), + https_traffic_only_enabled=pulumi.get(__response__, 'https_traffic_only_enabled'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + infrastructure_encryption_enabled=pulumi.get(__response__, 'infrastructure_encryption_enabled'), + is_hns_enabled=pulumi.get(__response__, 'is_hns_enabled'), + location=pulumi.get(__response__, 'location'), + min_tls_version=pulumi.get(__response__, 'min_tls_version'), + name=pulumi.get(__response__, 'name'), + nfsv3_enabled=pulumi.get(__response__, 'nfsv3_enabled'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + primary_blob_connection_string=pulumi.get(__response__, 'primary_blob_connection_string'), + primary_blob_endpoint=pulumi.get(__response__, 'primary_blob_endpoint'), + primary_blob_host=pulumi.get(__response__, 'primary_blob_host'), + primary_blob_internet_endpoint=pulumi.get(__response__, 'primary_blob_internet_endpoint'), + primary_blob_internet_host=pulumi.get(__response__, 'primary_blob_internet_host'), + primary_blob_microsoft_endpoint=pulumi.get(__response__, 'primary_blob_microsoft_endpoint'), + primary_blob_microsoft_host=pulumi.get(__response__, 'primary_blob_microsoft_host'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + primary_dfs_endpoint=pulumi.get(__response__, 'primary_dfs_endpoint'), + primary_dfs_host=pulumi.get(__response__, 'primary_dfs_host'), + primary_dfs_internet_endpoint=pulumi.get(__response__, 'primary_dfs_internet_endpoint'), + primary_dfs_internet_host=pulumi.get(__response__, 'primary_dfs_internet_host'), + primary_dfs_microsoft_endpoint=pulumi.get(__response__, 'primary_dfs_microsoft_endpoint'), + primary_dfs_microsoft_host=pulumi.get(__response__, 'primary_dfs_microsoft_host'), + primary_file_endpoint=pulumi.get(__response__, 'primary_file_endpoint'), + primary_file_host=pulumi.get(__response__, 'primary_file_host'), + primary_file_internet_endpoint=pulumi.get(__response__, 'primary_file_internet_endpoint'), + primary_file_internet_host=pulumi.get(__response__, 'primary_file_internet_host'), + primary_file_microsoft_endpoint=pulumi.get(__response__, 'primary_file_microsoft_endpoint'), + primary_file_microsoft_host=pulumi.get(__response__, 'primary_file_microsoft_host'), + primary_location=pulumi.get(__response__, 'primary_location'), + primary_queue_endpoint=pulumi.get(__response__, 'primary_queue_endpoint'), + primary_queue_host=pulumi.get(__response__, 'primary_queue_host'), + primary_queue_microsoft_endpoint=pulumi.get(__response__, 'primary_queue_microsoft_endpoint'), + primary_queue_microsoft_host=pulumi.get(__response__, 'primary_queue_microsoft_host'), + primary_table_endpoint=pulumi.get(__response__, 'primary_table_endpoint'), + primary_table_host=pulumi.get(__response__, 'primary_table_host'), + primary_table_microsoft_endpoint=pulumi.get(__response__, 'primary_table_microsoft_endpoint'), + primary_table_microsoft_host=pulumi.get(__response__, 'primary_table_microsoft_host'), + primary_web_endpoint=pulumi.get(__response__, 'primary_web_endpoint'), + primary_web_host=pulumi.get(__response__, 'primary_web_host'), + primary_web_internet_endpoint=pulumi.get(__response__, 'primary_web_internet_endpoint'), + primary_web_internet_host=pulumi.get(__response__, 'primary_web_internet_host'), + primary_web_microsoft_endpoint=pulumi.get(__response__, 'primary_web_microsoft_endpoint'), + primary_web_microsoft_host=pulumi.get(__response__, 'primary_web_microsoft_host'), + queue_encryption_key_type=pulumi.get(__response__, 'queue_encryption_key_type'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + secondary_blob_connection_string=pulumi.get(__response__, 'secondary_blob_connection_string'), + secondary_blob_endpoint=pulumi.get(__response__, 'secondary_blob_endpoint'), + secondary_blob_host=pulumi.get(__response__, 'secondary_blob_host'), + secondary_blob_internet_endpoint=pulumi.get(__response__, 'secondary_blob_internet_endpoint'), + secondary_blob_internet_host=pulumi.get(__response__, 'secondary_blob_internet_host'), + secondary_blob_microsoft_endpoint=pulumi.get(__response__, 'secondary_blob_microsoft_endpoint'), + secondary_blob_microsoft_host=pulumi.get(__response__, 'secondary_blob_microsoft_host'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + secondary_dfs_endpoint=pulumi.get(__response__, 'secondary_dfs_endpoint'), + secondary_dfs_host=pulumi.get(__response__, 'secondary_dfs_host'), + secondary_dfs_internet_endpoint=pulumi.get(__response__, 'secondary_dfs_internet_endpoint'), + secondary_dfs_internet_host=pulumi.get(__response__, 'secondary_dfs_internet_host'), + secondary_dfs_microsoft_endpoint=pulumi.get(__response__, 'secondary_dfs_microsoft_endpoint'), + secondary_dfs_microsoft_host=pulumi.get(__response__, 'secondary_dfs_microsoft_host'), + secondary_file_endpoint=pulumi.get(__response__, 'secondary_file_endpoint'), + secondary_file_host=pulumi.get(__response__, 'secondary_file_host'), + secondary_file_internet_endpoint=pulumi.get(__response__, 'secondary_file_internet_endpoint'), + secondary_file_internet_host=pulumi.get(__response__, 'secondary_file_internet_host'), + secondary_file_microsoft_endpoint=pulumi.get(__response__, 'secondary_file_microsoft_endpoint'), + secondary_file_microsoft_host=pulumi.get(__response__, 'secondary_file_microsoft_host'), + secondary_location=pulumi.get(__response__, 'secondary_location'), + secondary_queue_endpoint=pulumi.get(__response__, 'secondary_queue_endpoint'), + secondary_queue_host=pulumi.get(__response__, 'secondary_queue_host'), + secondary_queue_microsoft_endpoint=pulumi.get(__response__, 'secondary_queue_microsoft_endpoint'), + secondary_queue_microsoft_host=pulumi.get(__response__, 'secondary_queue_microsoft_host'), + secondary_table_endpoint=pulumi.get(__response__, 'secondary_table_endpoint'), + secondary_table_host=pulumi.get(__response__, 'secondary_table_host'), + secondary_table_microsoft_endpoint=pulumi.get(__response__, 'secondary_table_microsoft_endpoint'), + secondary_table_microsoft_host=pulumi.get(__response__, 'secondary_table_microsoft_host'), + secondary_web_endpoint=pulumi.get(__response__, 'secondary_web_endpoint'), + secondary_web_host=pulumi.get(__response__, 'secondary_web_host'), + secondary_web_internet_endpoint=pulumi.get(__response__, 'secondary_web_internet_endpoint'), + secondary_web_internet_host=pulumi.get(__response__, 'secondary_web_internet_host'), + secondary_web_microsoft_endpoint=pulumi.get(__response__, 'secondary_web_microsoft_endpoint'), + secondary_web_microsoft_host=pulumi.get(__response__, 'secondary_web_microsoft_host'), + table_encryption_key_type=pulumi.get(__response__, 'table_encryption_key_type'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/storage/get_account_blob_container_sas.py b/sdk/python/pulumi_azure/storage/get_account_blob_container_sas.py index a006f4bde3..f53eaadd22 100644 --- a/sdk/python/pulumi_azure/storage/get_account_blob_container_sas.py +++ b/sdk/python/pulumi_azure/storage/get_account_blob_container_sas.py @@ -277,9 +277,6 @@ def get_account_blob_container_sas(cache_control: Optional[str] = None, permissions=pulumi.get(__ret__, 'permissions'), sas=pulumi.get(__ret__, 'sas'), start=pulumi.get(__ret__, 'start')) - - -@_utilities.lift_output_func(get_account_blob_container_sas) def get_account_blob_container_sas_output(cache_control: Optional[pulumi.Input[Optional[str]]] = None, connection_string: Optional[pulumi.Input[str]] = None, container_name: Optional[pulumi.Input[str]] = None, @@ -355,4 +352,33 @@ def get_account_blob_container_sas_output(cache_control: Optional[pulumi.Input[O :param Union['GetAccountBlobContainerSASPermissionsArgs', 'GetAccountBlobContainerSASPermissionsArgsDict'] permissions: A `permissions` block as defined below. :param str start: The starting time and date of validity of this SAS. Must be a valid ISO-8601 format time/date string. """ - ... + __args__ = dict() + __args__['cacheControl'] = cache_control + __args__['connectionString'] = connection_string + __args__['containerName'] = container_name + __args__['contentDisposition'] = content_disposition + __args__['contentEncoding'] = content_encoding + __args__['contentLanguage'] = content_language + __args__['contentType'] = content_type + __args__['expiry'] = expiry + __args__['httpsOnly'] = https_only + __args__['ipAddress'] = ip_address + __args__['permissions'] = permissions + __args__['start'] = start + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getAccountBlobContainerSAS:getAccountBlobContainerSAS', __args__, opts=opts, typ=GetAccountBlobContainerSASResult) + return __ret__.apply(lambda __response__: GetAccountBlobContainerSASResult( + cache_control=pulumi.get(__response__, 'cache_control'), + connection_string=pulumi.get(__response__, 'connection_string'), + container_name=pulumi.get(__response__, 'container_name'), + content_disposition=pulumi.get(__response__, 'content_disposition'), + content_encoding=pulumi.get(__response__, 'content_encoding'), + content_language=pulumi.get(__response__, 'content_language'), + content_type=pulumi.get(__response__, 'content_type'), + expiry=pulumi.get(__response__, 'expiry'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + ip_address=pulumi.get(__response__, 'ip_address'), + permissions=pulumi.get(__response__, 'permissions'), + sas=pulumi.get(__response__, 'sas'), + start=pulumi.get(__response__, 'start'))) diff --git a/sdk/python/pulumi_azure/storage/get_account_sas.py b/sdk/python/pulumi_azure/storage/get_account_sas.py index 359fcc822c..d0c143ed14 100644 --- a/sdk/python/pulumi_azure/storage/get_account_sas.py +++ b/sdk/python/pulumi_azure/storage/get_account_sas.py @@ -249,9 +249,6 @@ def get_account_sas(connection_string: Optional[str] = None, services=pulumi.get(__ret__, 'services'), signed_version=pulumi.get(__ret__, 'signed_version'), start=pulumi.get(__ret__, 'start')) - - -@_utilities.lift_output_func(get_account_sas) def get_account_sas_output(connection_string: Optional[pulumi.Input[str]] = None, expiry: Optional[pulumi.Input[str]] = None, https_only: Optional[pulumi.Input[Optional[bool]]] = None, @@ -332,4 +329,27 @@ def get_account_sas_output(connection_string: Optional[pulumi.Input[str]] = None :param str signed_version: Specifies the signed storage service version to use to authorize requests made with this account SAS. Defaults to `2017-07-29`. :param str start: The starting time and date of validity of this SAS. Must be a valid ISO-8601 format time/date string. """ - ... + __args__ = dict() + __args__['connectionString'] = connection_string + __args__['expiry'] = expiry + __args__['httpsOnly'] = https_only + __args__['ipAddresses'] = ip_addresses + __args__['permissions'] = permissions + __args__['resourceTypes'] = resource_types + __args__['services'] = services + __args__['signedVersion'] = signed_version + __args__['start'] = start + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getAccountSAS:getAccountSAS', __args__, opts=opts, typ=GetAccountSASResult) + return __ret__.apply(lambda __response__: GetAccountSASResult( + connection_string=pulumi.get(__response__, 'connection_string'), + expiry=pulumi.get(__response__, 'expiry'), + https_only=pulumi.get(__response__, 'https_only'), + id=pulumi.get(__response__, 'id'), + ip_addresses=pulumi.get(__response__, 'ip_addresses'), + permissions=pulumi.get(__response__, 'permissions'), + resource_types=pulumi.get(__response__, 'resource_types'), + sas=pulumi.get(__response__, 'sas'), + services=pulumi.get(__response__, 'services'), + signed_version=pulumi.get(__response__, 'signed_version'), + start=pulumi.get(__response__, 'start'))) diff --git a/sdk/python/pulumi_azure/storage/get_blob.py b/sdk/python/pulumi_azure/storage/get_blob.py index 1468e1ae7f..9eb4410506 100644 --- a/sdk/python/pulumi_azure/storage/get_blob.py +++ b/sdk/python/pulumi_azure/storage/get_blob.py @@ -205,9 +205,6 @@ def get_blob(metadata: Optional[Mapping[str, str]] = None, storage_container_name=pulumi.get(__ret__, 'storage_container_name'), type=pulumi.get(__ret__, 'type'), url=pulumi.get(__ret__, 'url')) - - -@_utilities.lift_output_func(get_blob) def get_blob_output(metadata: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, name: Optional[pulumi.Input[str]] = None, storage_account_name: Optional[pulumi.Input[str]] = None, @@ -233,4 +230,22 @@ def get_blob_output(metadata: Optional[pulumi.Input[Optional[Mapping[str, str]]] :param str storage_account_name: The name of the Storage Account where the Container exists. :param str storage_container_name: The name of the Storage Container where the Blob exists. """ - ... + __args__ = dict() + __args__['metadata'] = metadata + __args__['name'] = name + __args__['storageAccountName'] = storage_account_name + __args__['storageContainerName'] = storage_container_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getBlob:getBlob', __args__, opts=opts, typ=GetBlobResult) + return __ret__.apply(lambda __response__: GetBlobResult( + access_tier=pulumi.get(__response__, 'access_tier'), + content_md5=pulumi.get(__response__, 'content_md5'), + content_type=pulumi.get(__response__, 'content_type'), + encryption_scope=pulumi.get(__response__, 'encryption_scope'), + id=pulumi.get(__response__, 'id'), + metadata=pulumi.get(__response__, 'metadata'), + name=pulumi.get(__response__, 'name'), + storage_account_name=pulumi.get(__response__, 'storage_account_name'), + storage_container_name=pulumi.get(__response__, 'storage_container_name'), + type=pulumi.get(__response__, 'type'), + url=pulumi.get(__response__, 'url'))) diff --git a/sdk/python/pulumi_azure/storage/get_containers.py b/sdk/python/pulumi_azure/storage/get_containers.py index 84383de0d8..94d7951d4d 100644 --- a/sdk/python/pulumi_azure/storage/get_containers.py +++ b/sdk/python/pulumi_azure/storage/get_containers.py @@ -111,9 +111,6 @@ def get_containers(name_prefix: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name_prefix=pulumi.get(__ret__, 'name_prefix'), storage_account_id=pulumi.get(__ret__, 'storage_account_id')) - - -@_utilities.lift_output_func(get_containers) def get_containers_output(name_prefix: Optional[pulumi.Input[Optional[str]]] = None, storage_account_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetContainersResult]: @@ -134,4 +131,13 @@ def get_containers_output(name_prefix: Optional[pulumi.Input[Optional[str]]] = N :param str name_prefix: A prefix match used for the Storage Container `name` field. :param str storage_account_id: The ID of the Storage Account that the Storage Containers reside in. """ - ... + __args__ = dict() + __args__['namePrefix'] = name_prefix + __args__['storageAccountId'] = storage_account_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getContainers:getContainers', __args__, opts=opts, typ=GetContainersResult) + return __ret__.apply(lambda __response__: GetContainersResult( + containers=pulumi.get(__response__, 'containers'), + id=pulumi.get(__response__, 'id'), + name_prefix=pulumi.get(__response__, 'name_prefix'), + storage_account_id=pulumi.get(__response__, 'storage_account_id'))) diff --git a/sdk/python/pulumi_azure/storage/get_encryption_scope.py b/sdk/python/pulumi_azure/storage/get_encryption_scope.py index 7a47866454..e8d4dabb03 100644 --- a/sdk/python/pulumi_azure/storage/get_encryption_scope.py +++ b/sdk/python/pulumi_azure/storage/get_encryption_scope.py @@ -126,9 +126,6 @@ def get_encryption_scope(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), source=pulumi.get(__ret__, 'source'), storage_account_id=pulumi.get(__ret__, 'storage_account_id')) - - -@_utilities.lift_output_func(get_encryption_scope) def get_encryption_scope_output(name: Optional[pulumi.Input[str]] = None, storage_account_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEncryptionScopeResult]: @@ -152,4 +149,14 @@ def get_encryption_scope_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Storage Encryption Scope. :param str storage_account_id: The ID of the Storage Account where this Storage Encryption Scope exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['storageAccountId'] = storage_account_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getEncryptionScope:getEncryptionScope', __args__, opts=opts, typ=GetEncryptionScopeResult) + return __ret__.apply(lambda __response__: GetEncryptionScopeResult( + id=pulumi.get(__response__, 'id'), + key_vault_key_id=pulumi.get(__response__, 'key_vault_key_id'), + name=pulumi.get(__response__, 'name'), + source=pulumi.get(__response__, 'source'), + storage_account_id=pulumi.get(__response__, 'storage_account_id'))) diff --git a/sdk/python/pulumi_azure/storage/get_policy.py b/sdk/python/pulumi_azure/storage/get_policy.py index 20839a5bec..42a1cb5167 100644 --- a/sdk/python/pulumi_azure/storage/get_policy.py +++ b/sdk/python/pulumi_azure/storage/get_policy.py @@ -99,9 +99,6 @@ def get_policy(storage_account_id: Optional[str] = None, id=pulumi.get(__ret__, 'id'), rules=pulumi.get(__ret__, 'rules'), storage_account_id=pulumi.get(__ret__, 'storage_account_id')) - - -@_utilities.lift_output_func(get_policy) def get_policy_output(storage_account_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyResult]: """ @@ -121,4 +118,11 @@ def get_policy_output(storage_account_id: Optional[pulumi.Input[str]] = None, :param str storage_account_id: Specifies the id of the storage account to retrieve the management policy for. """ - ... + __args__ = dict() + __args__['storageAccountId'] = storage_account_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getPolicy:getPolicy', __args__, opts=opts, typ=GetPolicyResult) + return __ret__.apply(lambda __response__: GetPolicyResult( + id=pulumi.get(__response__, 'id'), + rules=pulumi.get(__response__, 'rules'), + storage_account_id=pulumi.get(__response__, 'storage_account_id'))) diff --git a/sdk/python/pulumi_azure/storage/get_queue.py b/sdk/python/pulumi_azure/storage/get_queue.py index bb6ee3de36..7f0f2aaf45 100644 --- a/sdk/python/pulumi_azure/storage/get_queue.py +++ b/sdk/python/pulumi_azure/storage/get_queue.py @@ -126,9 +126,6 @@ def get_queue(metadata: Optional[Mapping[str, str]] = None, name=pulumi.get(__ret__, 'name'), resource_manager_id=pulumi.get(__ret__, 'resource_manager_id'), storage_account_name=pulumi.get(__ret__, 'storage_account_name')) - - -@_utilities.lift_output_func(get_queue) def get_queue_output(metadata: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, name: Optional[pulumi.Input[str]] = None, storage_account_name: Optional[pulumi.Input[str]] = None, @@ -151,4 +148,15 @@ def get_queue_output(metadata: Optional[pulumi.Input[Optional[Mapping[str, str]] :param str name: The name of the Queue. :param str storage_account_name: The name of the Storage Account where the Queue exists. """ - ... + __args__ = dict() + __args__['metadata'] = metadata + __args__['name'] = name + __args__['storageAccountName'] = storage_account_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getQueue:getQueue', __args__, opts=opts, typ=GetQueueResult) + return __ret__.apply(lambda __response__: GetQueueResult( + id=pulumi.get(__response__, 'id'), + metadata=pulumi.get(__response__, 'metadata'), + name=pulumi.get(__response__, 'name'), + resource_manager_id=pulumi.get(__response__, 'resource_manager_id'), + storage_account_name=pulumi.get(__response__, 'storage_account_name'))) diff --git a/sdk/python/pulumi_azure/storage/get_share.py b/sdk/python/pulumi_azure/storage/get_share.py index 9e6af8b7ca..0c4a34e8b5 100644 --- a/sdk/python/pulumi_azure/storage/get_share.py +++ b/sdk/python/pulumi_azure/storage/get_share.py @@ -157,9 +157,6 @@ def get_share(acls: Optional[Sequence[Union['GetShareAclArgs', 'GetShareAclArgsD quota=pulumi.get(__ret__, 'quota'), resource_manager_id=pulumi.get(__ret__, 'resource_manager_id'), storage_account_name=pulumi.get(__ret__, 'storage_account_name')) - - -@_utilities.lift_output_func(get_share) def get_share_output(acls: Optional[pulumi.Input[Optional[Sequence[Union['GetShareAclArgs', 'GetShareAclArgsDict']]]]] = None, metadata: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, name: Optional[pulumi.Input[str]] = None, @@ -187,4 +184,18 @@ def get_share_output(acls: Optional[pulumi.Input[Optional[Sequence[Union['GetSha :param str name: The name of the share. :param str storage_account_name: The name of the storage account. """ - ... + __args__ = dict() + __args__['acls'] = acls + __args__['metadata'] = metadata + __args__['name'] = name + __args__['storageAccountName'] = storage_account_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getShare:getShare', __args__, opts=opts, typ=GetShareResult) + return __ret__.apply(lambda __response__: GetShareResult( + acls=pulumi.get(__response__, 'acls'), + id=pulumi.get(__response__, 'id'), + metadata=pulumi.get(__response__, 'metadata'), + name=pulumi.get(__response__, 'name'), + quota=pulumi.get(__response__, 'quota'), + resource_manager_id=pulumi.get(__response__, 'resource_manager_id'), + storage_account_name=pulumi.get(__response__, 'storage_account_name'))) diff --git a/sdk/python/pulumi_azure/storage/get_storage_container.py b/sdk/python/pulumi_azure/storage/get_storage_container.py index dc0d65686f..0c50836528 100644 --- a/sdk/python/pulumi_azure/storage/get_storage_container.py +++ b/sdk/python/pulumi_azure/storage/get_storage_container.py @@ -191,9 +191,6 @@ def get_storage_container(metadata: Optional[Mapping[str, str]] = None, name=pulumi.get(__ret__, 'name'), resource_manager_id=pulumi.get(__ret__, 'resource_manager_id'), storage_account_name=pulumi.get(__ret__, 'storage_account_name')) - - -@_utilities.lift_output_func(get_storage_container) def get_storage_container_output(metadata: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, name: Optional[pulumi.Input[str]] = None, storage_account_name: Optional[pulumi.Input[str]] = None, @@ -216,4 +213,20 @@ def get_storage_container_output(metadata: Optional[pulumi.Input[Optional[Mappin :param str name: The name of the Container. :param str storage_account_name: The name of the Storage Account where the Container exists. """ - ... + __args__ = dict() + __args__['metadata'] = metadata + __args__['name'] = name + __args__['storageAccountName'] = storage_account_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getStorageContainer:getStorageContainer', __args__, opts=opts, typ=GetStorageContainerResult) + return __ret__.apply(lambda __response__: GetStorageContainerResult( + container_access_type=pulumi.get(__response__, 'container_access_type'), + default_encryption_scope=pulumi.get(__response__, 'default_encryption_scope'), + encryption_scope_override_enabled=pulumi.get(__response__, 'encryption_scope_override_enabled'), + has_immutability_policy=pulumi.get(__response__, 'has_immutability_policy'), + has_legal_hold=pulumi.get(__response__, 'has_legal_hold'), + id=pulumi.get(__response__, 'id'), + metadata=pulumi.get(__response__, 'metadata'), + name=pulumi.get(__response__, 'name'), + resource_manager_id=pulumi.get(__response__, 'resource_manager_id'), + storage_account_name=pulumi.get(__response__, 'storage_account_name'))) diff --git a/sdk/python/pulumi_azure/storage/get_sync.py b/sdk/python/pulumi_azure/storage/get_sync.py index b1e3e46634..f9900a03af 100644 --- a/sdk/python/pulumi_azure/storage/get_sync.py +++ b/sdk/python/pulumi_azure/storage/get_sync.py @@ -137,9 +137,6 @@ def get_sync(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_sync) def get_sync_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSyncResult]: @@ -161,4 +158,15 @@ def get_sync_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Storage Sync. :param str resource_group_name: The name of the Resource Group where the Storage Sync exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getSync:getSync', __args__, opts=opts, typ=GetSyncResult) + return __ret__.apply(lambda __response__: GetSyncResult( + id=pulumi.get(__response__, 'id'), + incoming_traffic_policy=pulumi.get(__response__, 'incoming_traffic_policy'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/storage/get_sync_group.py b/sdk/python/pulumi_azure/storage/get_sync_group.py index 6d0d92787d..a5ee848e2b 100644 --- a/sdk/python/pulumi_azure/storage/get_sync_group.py +++ b/sdk/python/pulumi_azure/storage/get_sync_group.py @@ -98,9 +98,6 @@ def get_sync_group(name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), storage_sync_id=pulumi.get(__ret__, 'storage_sync_id')) - - -@_utilities.lift_output_func(get_sync_group) def get_sync_group_output(name: Optional[pulumi.Input[str]] = None, storage_sync_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSyncGroupResult]: @@ -122,4 +119,12 @@ def get_sync_group_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Storage Sync Group. :param str storage_sync_id: The resource ID of the Storage Sync where this Storage Sync Group is. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['storageSyncId'] = storage_sync_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getSyncGroup:getSyncGroup', __args__, opts=opts, typ=GetSyncGroupResult) + return __ret__.apply(lambda __response__: GetSyncGroupResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + storage_sync_id=pulumi.get(__response__, 'storage_sync_id'))) diff --git a/sdk/python/pulumi_azure/storage/get_table.py b/sdk/python/pulumi_azure/storage/get_table.py index 3b36cb4396..b587717ad3 100644 --- a/sdk/python/pulumi_azure/storage/get_table.py +++ b/sdk/python/pulumi_azure/storage/get_table.py @@ -124,9 +124,6 @@ def get_table(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_manager_id=pulumi.get(__ret__, 'resource_manager_id'), storage_account_name=pulumi.get(__ret__, 'storage_account_name')) - - -@_utilities.lift_output_func(get_table) def get_table_output(name: Optional[pulumi.Input[str]] = None, storage_account_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetTableResult]: @@ -147,4 +144,14 @@ def get_table_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Table. :param str storage_account_name: The name of the Storage Account where the Table exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['storageAccountName'] = storage_account_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getTable:getTable', __args__, opts=opts, typ=GetTableResult) + return __ret__.apply(lambda __response__: GetTableResult( + acls=pulumi.get(__response__, 'acls'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + resource_manager_id=pulumi.get(__response__, 'resource_manager_id'), + storage_account_name=pulumi.get(__response__, 'storage_account_name'))) diff --git a/sdk/python/pulumi_azure/storage/get_table_entities.py b/sdk/python/pulumi_azure/storage/get_table_entities.py index 9350eb8f49..748459cdf1 100644 --- a/sdk/python/pulumi_azure/storage/get_table_entities.py +++ b/sdk/python/pulumi_azure/storage/get_table_entities.py @@ -124,9 +124,6 @@ def get_table_entities(filter: Optional[str] = None, items=pulumi.get(__ret__, 'items'), selects=pulumi.get(__ret__, 'selects'), storage_table_id=pulumi.get(__ret__, 'storage_table_id')) - - -@_utilities.lift_output_func(get_table_entities) def get_table_entities_output(filter: Optional[pulumi.Input[str]] = None, selects: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, storage_table_id: Optional[pulumi.Input[str]] = None, @@ -149,4 +146,15 @@ def get_table_entities_output(filter: Optional[pulumi.Input[str]] = None, :param Sequence[str] selects: A list of properties to select from the returned Storage Table Entities. :param str storage_table_id: The Storage Table ID where the entities exist. """ - ... + __args__ = dict() + __args__['filter'] = filter + __args__['selects'] = selects + __args__['storageTableId'] = storage_table_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getTableEntities:getTableEntities', __args__, opts=opts, typ=GetTableEntitiesResult) + return __ret__.apply(lambda __response__: GetTableEntitiesResult( + filter=pulumi.get(__response__, 'filter'), + id=pulumi.get(__response__, 'id'), + items=pulumi.get(__response__, 'items'), + selects=pulumi.get(__response__, 'selects'), + storage_table_id=pulumi.get(__response__, 'storage_table_id'))) diff --git a/sdk/python/pulumi_azure/storage/get_table_entity.py b/sdk/python/pulumi_azure/storage/get_table_entity.py index bce60ddb41..8dc5cde413 100644 --- a/sdk/python/pulumi_azure/storage/get_table_entity.py +++ b/sdk/python/pulumi_azure/storage/get_table_entity.py @@ -124,9 +124,6 @@ def get_table_entity(partition_key: Optional[str] = None, partition_key=pulumi.get(__ret__, 'partition_key'), row_key=pulumi.get(__ret__, 'row_key'), storage_table_id=pulumi.get(__ret__, 'storage_table_id')) - - -@_utilities.lift_output_func(get_table_entity) def get_table_entity_output(partition_key: Optional[pulumi.Input[str]] = None, row_key: Optional[pulumi.Input[str]] = None, storage_table_id: Optional[pulumi.Input[str]] = None, @@ -150,4 +147,15 @@ def get_table_entity_output(partition_key: Optional[pulumi.Input[str]] = None, :param str row_key: The key for the row where the entity will be retrieved. :param str storage_table_id: The Storage Table ID where the entity exists. """ - ... + __args__ = dict() + __args__['partitionKey'] = partition_key + __args__['rowKey'] = row_key + __args__['storageTableId'] = storage_table_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:storage/getTableEntity:getTableEntity', __args__, opts=opts, typ=GetTableEntityResult) + return __ret__.apply(lambda __response__: GetTableEntityResult( + entity=pulumi.get(__response__, 'entity'), + id=pulumi.get(__response__, 'id'), + partition_key=pulumi.get(__response__, 'partition_key'), + row_key=pulumi.get(__response__, 'row_key'), + storage_table_id=pulumi.get(__response__, 'storage_table_id'))) diff --git a/sdk/python/pulumi_azure/streamanalytics/get_job.py b/sdk/python/pulumi_azure/streamanalytics/get_job.py index 44807d7bd6..fb7146b0ef 100644 --- a/sdk/python/pulumi_azure/streamanalytics/get_job.py +++ b/sdk/python/pulumi_azure/streamanalytics/get_job.py @@ -294,9 +294,6 @@ def get_job(name: Optional[str] = None, start_time=pulumi.get(__ret__, 'start_time'), streaming_units=pulumi.get(__ret__, 'streaming_units'), transformation_query=pulumi.get(__ret__, 'transformation_query')) - - -@_utilities.lift_output_func(get_job) def get_job_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetJobResult]: @@ -318,4 +315,27 @@ def get_job_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Stream Analytics Job. :param str resource_group_name: Specifies the name of the resource group the Stream Analytics Job is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:streamanalytics/getJob:getJob', __args__, opts=opts, typ=GetJobResult) + return __ret__.apply(lambda __response__: GetJobResult( + compatibility_level=pulumi.get(__response__, 'compatibility_level'), + data_locale=pulumi.get(__response__, 'data_locale'), + events_late_arrival_max_delay_in_seconds=pulumi.get(__response__, 'events_late_arrival_max_delay_in_seconds'), + events_out_of_order_max_delay_in_seconds=pulumi.get(__response__, 'events_out_of_order_max_delay_in_seconds'), + events_out_of_order_policy=pulumi.get(__response__, 'events_out_of_order_policy'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + job_id=pulumi.get(__response__, 'job_id'), + last_output_time=pulumi.get(__response__, 'last_output_time'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + output_error_policy=pulumi.get(__response__, 'output_error_policy'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + sku_name=pulumi.get(__response__, 'sku_name'), + start_mode=pulumi.get(__response__, 'start_mode'), + start_time=pulumi.get(__response__, 'start_time'), + streaming_units=pulumi.get(__response__, 'streaming_units'), + transformation_query=pulumi.get(__response__, 'transformation_query'))) diff --git a/sdk/python/pulumi_azure/synapse/get_workspace.py b/sdk/python/pulumi_azure/synapse/get_workspace.py index 635cc2062a..557acbfac9 100644 --- a/sdk/python/pulumi_azure/synapse/get_workspace.py +++ b/sdk/python/pulumi_azure/synapse/get_workspace.py @@ -151,9 +151,6 @@ def get_workspace(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_workspace) def get_workspace_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetWorkspaceResult]: @@ -175,4 +172,16 @@ def get_workspace_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of this Synapse Workspace. :param str resource_group_name: The name of the Resource Group where the Synapse Workspace exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:synapse/getWorkspace:getWorkspace', __args__, opts=opts, typ=GetWorkspaceResult) + return __ret__.apply(lambda __response__: GetWorkspaceResult( + connectivity_endpoints=pulumi.get(__response__, 'connectivity_endpoints'), + id=pulumi.get(__response__, 'id'), + identities=pulumi.get(__response__, 'identities'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/systemcenter/get_virtual_machine_manager_inventory_items.py b/sdk/python/pulumi_azure/systemcenter/get_virtual_machine_manager_inventory_items.py index d8a4bdf79b..a33acff81f 100644 --- a/sdk/python/pulumi_azure/systemcenter/get_virtual_machine_manager_inventory_items.py +++ b/sdk/python/pulumi_azure/systemcenter/get_virtual_machine_manager_inventory_items.py @@ -111,9 +111,6 @@ def get_virtual_machine_manager_inventory_items(inventory_type: Optional[str] = inventory_items=pulumi.get(__ret__, 'inventory_items'), inventory_type=pulumi.get(__ret__, 'inventory_type'), system_center_virtual_machine_manager_server_id=pulumi.get(__ret__, 'system_center_virtual_machine_manager_server_id')) - - -@_utilities.lift_output_func(get_virtual_machine_manager_inventory_items) def get_virtual_machine_manager_inventory_items_output(inventory_type: Optional[pulumi.Input[str]] = None, system_center_virtual_machine_manager_server_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVirtualMachineManagerInventoryItemsResult]: @@ -134,4 +131,13 @@ def get_virtual_machine_manager_inventory_items_output(inventory_type: Optional[ :param str inventory_type: The inventory type of the System Center Virtual Machine Manager Inventory Item. Possible values are `Cloud`, `VirtualMachine`, `VirtualMachineTemplate` and `VirtualNetwork`. :param str system_center_virtual_machine_manager_server_id: The ID of the System Center Virtual Machine Manager Server. """ - ... + __args__ = dict() + __args__['inventoryType'] = inventory_type + __args__['systemCenterVirtualMachineManagerServerId'] = system_center_virtual_machine_manager_server_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:systemcenter/getVirtualMachineManagerInventoryItems:getVirtualMachineManagerInventoryItems', __args__, opts=opts, typ=GetVirtualMachineManagerInventoryItemsResult) + return __ret__.apply(lambda __response__: GetVirtualMachineManagerInventoryItemsResult( + id=pulumi.get(__response__, 'id'), + inventory_items=pulumi.get(__response__, 'inventory_items'), + inventory_type=pulumi.get(__response__, 'inventory_type'), + system_center_virtual_machine_manager_server_id=pulumi.get(__response__, 'system_center_virtual_machine_manager_server_id'))) diff --git a/sdk/python/pulumi_azure/trafficmanager/get_geographical_location.py b/sdk/python/pulumi_azure/trafficmanager/get_geographical_location.py index 972dd4e5eb..6a31233ec2 100644 --- a/sdk/python/pulumi_azure/trafficmanager/get_geographical_location.py +++ b/sdk/python/pulumi_azure/trafficmanager/get_geographical_location.py @@ -89,9 +89,6 @@ def get_geographical_location(name: Optional[str] = None, return AwaitableGetGeographicalLocationResult( id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name')) - - -@_utilities.lift_output_func(get_geographical_location) def get_geographical_location_output(name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGeographicalLocationResult]: """ @@ -113,4 +110,10 @@ def get_geographical_location_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Location, for example `World`, `Europe` or `Germany`. """ pulumi.log.warn("""get_geographical_location is deprecated: azure.trafficmanager.getGeographicalLocation has been deprecated in favor of azure.network.getTrafficManager""") - ... + __args__ = dict() + __args__['name'] = name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:trafficmanager/getGeographicalLocation:getGeographicalLocation', __args__, opts=opts, typ=GetGeographicalLocationResult) + return __ret__.apply(lambda __response__: GetGeographicalLocationResult( + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'))) diff --git a/sdk/python/pulumi_azure/waf/get_firewall_policy.py b/sdk/python/pulumi_azure/waf/get_firewall_policy.py index 39f6875d0e..5e5e4180d0 100644 --- a/sdk/python/pulumi_azure/waf/get_firewall_policy.py +++ b/sdk/python/pulumi_azure/waf/get_firewall_policy.py @@ -120,9 +120,6 @@ def get_firewall_policy(name: Optional[str] = None, name=pulumi.get(__ret__, 'name'), resource_group_name=pulumi.get(__ret__, 'resource_group_name'), tags=pulumi.get(__ret__, 'tags')) - - -@_utilities.lift_output_func(get_firewall_policy) def get_firewall_policy_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, tags: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None, @@ -145,4 +142,15 @@ def get_firewall_policy_output(name: Optional[pulumi.Input[str]] = None, :param str name: The name of the Web Application Firewall Policy :param str resource_group_name: The name of the Resource Group where the Web Application Firewall Policy exists. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + __args__['tags'] = tags + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:waf/getFirewallPolicy:getFirewallPolicy', __args__, opts=opts, typ=GetFirewallPolicyResult) + return __ret__.apply(lambda __response__: GetFirewallPolicyResult( + id=pulumi.get(__response__, 'id'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + tags=pulumi.get(__response__, 'tags'))) diff --git a/sdk/python/pulumi_azure/webpubsub/get_private_link_resource.py b/sdk/python/pulumi_azure/webpubsub/get_private_link_resource.py index 4031cf088f..baa72ae5b8 100644 --- a/sdk/python/pulumi_azure/webpubsub/get_private_link_resource.py +++ b/sdk/python/pulumi_azure/webpubsub/get_private_link_resource.py @@ -106,9 +106,6 @@ def get_private_link_resource(web_pubsub_id: Optional[str] = None, id=pulumi.get(__ret__, 'id'), shared_private_link_resource_types=pulumi.get(__ret__, 'shared_private_link_resource_types'), web_pubsub_id=pulumi.get(__ret__, 'web_pubsub_id')) - - -@_utilities.lift_output_func(get_private_link_resource) def get_private_link_resource_output(web_pubsub_id: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPrivateLinkResourceResult]: """ @@ -135,4 +132,11 @@ def get_private_link_resource_output(web_pubsub_id: Optional[pulumi.Input[str]] :param str web_pubsub_id: The ID of an existing Web Pubsub Resource which Private Link Resource should be retrieved for. """ - ... + __args__ = dict() + __args__['webPubsubId'] = web_pubsub_id + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:webpubsub/getPrivateLinkResource:getPrivateLinkResource', __args__, opts=opts, typ=GetPrivateLinkResourceResult) + return __ret__.apply(lambda __response__: GetPrivateLinkResourceResult( + id=pulumi.get(__response__, 'id'), + shared_private_link_resource_types=pulumi.get(__response__, 'shared_private_link_resource_types'), + web_pubsub_id=pulumi.get(__response__, 'web_pubsub_id'))) diff --git a/sdk/python/pulumi_azure/webpubsub/get_service.py b/sdk/python/pulumi_azure/webpubsub/get_service.py index 781542258f..551bfd76a5 100644 --- a/sdk/python/pulumi_azure/webpubsub/get_service.py +++ b/sdk/python/pulumi_azure/webpubsub/get_service.py @@ -291,9 +291,6 @@ def get_service(name: Optional[str] = None, tags=pulumi.get(__ret__, 'tags'), tls_client_cert_enabled=pulumi.get(__ret__, 'tls_client_cert_enabled'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_service) def get_service_output(name: Optional[pulumi.Input[str]] = None, resource_group_name: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceResult]: @@ -314,4 +311,29 @@ def get_service_output(name: Optional[pulumi.Input[str]] = None, :param str name: Specifies the name of the Web Pubsub service. :param str resource_group_name: Specifies the name of the resource group the Web Pubsub service is located in. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['resourceGroupName'] = resource_group_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('azure:webpubsub/getService:getService', __args__, opts=opts, typ=GetServiceResult) + return __ret__.apply(lambda __response__: GetServiceResult( + aad_auth_enabled=pulumi.get(__response__, 'aad_auth_enabled'), + capacity=pulumi.get(__response__, 'capacity'), + external_ip=pulumi.get(__response__, 'external_ip'), + hostname=pulumi.get(__response__, 'hostname'), + id=pulumi.get(__response__, 'id'), + local_auth_enabled=pulumi.get(__response__, 'local_auth_enabled'), + location=pulumi.get(__response__, 'location'), + name=pulumi.get(__response__, 'name'), + primary_access_key=pulumi.get(__response__, 'primary_access_key'), + primary_connection_string=pulumi.get(__response__, 'primary_connection_string'), + public_network_access_enabled=pulumi.get(__response__, 'public_network_access_enabled'), + public_port=pulumi.get(__response__, 'public_port'), + resource_group_name=pulumi.get(__response__, 'resource_group_name'), + secondary_access_key=pulumi.get(__response__, 'secondary_access_key'), + secondary_connection_string=pulumi.get(__response__, 'secondary_connection_string'), + server_port=pulumi.get(__response__, 'server_port'), + sku=pulumi.get(__response__, 'sku'), + tags=pulumi.get(__response__, 'tags'), + tls_client_cert_enabled=pulumi.get(__response__, 'tls_client_cert_enabled'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pyproject.toml b/sdk/python/pyproject.toml index 99b23cb104..9f8f07e489 100644 --- a/sdk/python/pyproject.toml +++ b/sdk/python/pyproject.toml @@ -1,7 +1,7 @@ [project] name = "pulumi_azure" description = "A Pulumi package for creating and managing Microsoft Azure cloud resources, based on the Terraform azurerm provider. We recommend using the [Azure Native provider](https://github.com/pulumi/pulumi-azure-native) to provision Azure infrastructure. Azure Native provides complete coverage of Azure resources and same-day access to new resources and resource updates." - dependencies = ["parver>=0.2.1", "pulumi>=3.0.0,<4.0.0", "semver>=2.8.1", "typing-extensions>=4.11; python_version < \"3.11\""] + dependencies = ["parver>=0.2.1", "pulumi>=3.136.0,<4.0.0", "semver>=2.8.1", "typing-extensions>=4.11; python_version < \"3.11\""] keywords = ["pulumi", "azure"] readme = "README.md" requires-python = ">=3.8"