diff --git a/avm/res/batch/batch-account/ORPHANED.md b/avm/res/batch/batch-account/ORPHANED.md new file mode 100644 index 0000000000..ef8fa911d2 --- /dev/null +++ b/avm/res/batch/batch-account/ORPHANED.md @@ -0,0 +1,4 @@ +⚠️THIS MODULE IS CURRENTLY ORPHANED.⚠️ + +- Only security and bug fixes are being handled by the AVM core team at present. +- If interested in becoming the module owner of this orphaned module (must be Microsoft FTE), please look for the related "orphaned module" GitHub issue [here](https://aka.ms/AVM/OrphanedModules)! \ No newline at end of file diff --git a/avm/res/batch/batch-account/README.md b/avm/res/batch/batch-account/README.md index a77988df9c..d40d163767 100644 --- a/avm/res/batch/batch-account/README.md +++ b/avm/res/batch/batch-account/README.md @@ -1,5 +1,10 @@ # Batch Accounts `[Microsoft.Batch/batchAccounts]` +> ⚠️THIS MODULE IS CURRENTLY ORPHANED.⚠️ +> +> - Only security and bug fixes are being handled by the AVM core team at present. +> - If interested in becoming the module owner of this orphaned module (must be Microsoft FTE), please look for the related "orphaned module" GitHub issue [here](https://aka.ms/AVM/OrphanedModules)! + This module deploys a Batch Account. ## Navigation @@ -58,7 +63,7 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { location: '' lock: '' managedIdentities: '' - networkProfileAllowedIpRanges: '' + networkProfile: '' privateEndpoints: '' roleAssignments: '' storageAccessIdentityResourceId: '' @@ -108,8 +113,8 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { "managedIdentities": { "value": "" }, - "networkProfileAllowedIpRanges": { - "value": "" + "networkProfile": { + "value": "" }, "privateEndpoints": { "value": "" @@ -147,25 +152,17 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { name: 'bbaencr001' storageAccountId: '' // Non-required parameters - allowedAuthenticationModes: '' customerManagedKey: { keyName: '' keyVaultResourceId: '' } - diagnosticSettings: '' - keyVaultReferenceResourceId: '' location: '' - lock: '' managedIdentities: { userAssignedResourcesIds: [ '' ] } - networkProfileAllowedIpRanges: '' poolAllocationMode: 'BatchService' - privateEndpoints: '' - roleAssignments: '' - storageAccessIdentityResourceId: '' storageAuthenticationMode: 'BatchAccountManagedIdentity' tags: { 'hidden-title': 'This is visible in the resource name' @@ -194,27 +191,15 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { "value": "" }, // Non-required parameters - "allowedAuthenticationModes": { - "value": "" - }, "customerManagedKey": { "value": { "keyName": "", "keyVaultResourceId": "" } }, - "diagnosticSettings": { - "value": "" - }, - "keyVaultReferenceResourceId": { - "value": "" - }, "location": { "value": "" }, - "lock": { - "value": "" - }, "managedIdentities": { "value": { "userAssignedResourcesIds": [ @@ -222,21 +207,9 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { ] } }, - "networkProfileAllowedIpRanges": { - "value": "" - }, "poolAllocationMode": { "value": "BatchService" }, - "privateEndpoints": { - "value": "" - }, - "roleAssignments": { - "value": "" - }, - "storageAccessIdentityResourceId": { - "value": "" - }, "storageAuthenticationMode": { "value": "BatchAccountManagedIdentity" }, @@ -289,7 +262,19 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { managedIdentities: { systemAssigned: true } - networkProfileAllowedIpRanges: '' + networkProfile: { + accountAccess: { + allowedIpRules: [ + '40.74.28.0/23' + ] + defaultAction: 'Deny' + } + nodeManagementAccess: { + allowedIpRules: [ + '40.74.28.0/23' + ] + } + } poolAllocationMode: 'BatchService' privateEndpoints: [ { @@ -383,8 +368,20 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { "systemAssigned": true } }, - "networkProfileAllowedIpRanges": { - "value": "" + "networkProfile": { + "value": { + "accountAccess": { + "allowedIpRules": [ + "40.74.28.0/23" + ], + "defaultAction": "Deny" + }, + "nodeManagementAccess": { + "allowedIpRules": [ + "40.74.28.0/23" + ] + } + } }, "poolAllocationMode": { "value": "BatchService" @@ -476,7 +473,7 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { managedIdentities: { systemAssigned: true } - networkProfileAllowedIpRanges: '' + networkProfile: '' poolAllocationMode: 'BatchService' privateEndpoints: [ { @@ -551,8 +548,8 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { "systemAssigned": true } }, - "networkProfileAllowedIpRanges": { - "value": "" + "networkProfile": { + "value": "" }, "poolAllocationMode": { "value": "BatchService" @@ -617,11 +614,10 @@ module batchAccount 'br/public:avm/res/batch/batch-account:' = { | [`location`](#parameter-location) | string | Location for all Resources. | | [`lock`](#parameter-lock) | object | The lock settings of the service. | | [`managedIdentities`](#parameter-managedidentities) | object | The managed identity definition for this resource. | -| [`networkProfileAllowedIpRanges`](#parameter-networkprofileallowedipranges) | array | Array of IP ranges to filter client IP address. It is only applicable when publicNetworkAccess is not explicitly disabled. | -| [`networkProfileDefaultAction`](#parameter-networkprofiledefaultaction) | string | The network profile default action for endpoint access. It is only applicable when publicNetworkAccess is not explicitly disabled. | +| [`networkProfile`](#parameter-networkprofile) | object | Network access profile. It is only applicable when publicNetworkAccess is not explicitly disabled. | | [`poolAllocationMode`](#parameter-poolallocationmode) | string | The allocation mode for creating pools in the Batch account. Determines which quota will be used. | | [`privateEndpoints`](#parameter-privateendpoints) | array | Configuration details for private endpoints. For security reasons, it is recommended to use private endpoints whenever possible. | -| [`publicNetworkAccess`](#parameter-publicnetworkaccess) | string | Whether or not public network access is allowed for this resource. For security reasons it should be disabled. If not specified, it will be disabled by default if private endpoints are set and networkProfileAllowedIpRanges are not set. | +| [`publicNetworkAccess`](#parameter-publicnetworkaccess) | string | Whether or not public network access is allowed for this resource. For security reasons it should be disabled. If not specified, it will be disabled by default if private endpoints are set and networkProfile is not set. | | [`roleAssignments`](#parameter-roleassignments) | array | Array of role assignment objects that contain the 'roleDefinitionIdOrName' and 'principalId' to define RBAC role assignments on this resource. In the roleDefinitionIdOrName attribute, you can provide either the display name of the role definition, or its fully qualified ID in the following format: '/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11'. | | [`storageAccessIdentityResourceId`](#parameter-storageaccessidentityresourceid) | string | The resource ID of a user assigned identity assigned to pools which have compute nodes that need access to auto-storage. | | [`storageAuthenticationMode`](#parameter-storageauthenticationmode) | string | The authentication mode which the Batch service will use to manage the auto-storage account. | @@ -869,25 +865,31 @@ Name of the Azure Batch. - Required: Yes - Type: string -### Parameter: `networkProfileAllowedIpRanges` +### Parameter: `networkProfile` -Array of IP ranges to filter client IP address. It is only applicable when publicNetworkAccess is not explicitly disabled. +Network access profile. It is only applicable when publicNetworkAccess is not explicitly disabled. - Required: No -- Type: array +- Type: object -### Parameter: `networkProfileDefaultAction` -The network profile default action for endpoint access. It is only applicable when publicNetworkAccess is not explicitly disabled. +| Name | Required | Type | Description | +| :-- | :-- | :--| :-- | +| [`accountAccess`](#parameter-networkprofileaccountaccess) | No | object | Optional. Network access profile for batchAccount endpoint (Batch account data plane API). | +| [`nodeManagementAccess`](#parameter-networkprofilenodemanagementaccess) | No | object | Optional. Network access profile for nodeManagement endpoint (Batch service managing compute nodes for Batch pools). | + +### Parameter: `networkProfile.accountAccess` + +Optional. Network access profile for batchAccount endpoint (Batch account data plane API). + - Required: No -- Type: string -- Default: `'Deny'` -- Allowed: - ```Bicep - [ - 'Allow' - 'Deny' - ] - ``` +- Type: object + +### Parameter: `networkProfile.nodeManagementAccess` + +Optional. Network access profile for nodeManagement endpoint (Batch service managing compute nodes for Batch pools). + +- Required: No +- Type: object ### Parameter: `poolAllocationMode` @@ -1073,7 +1075,7 @@ Optional. Tags to be applied on all resources/resource groups in this deployment ### Parameter: `publicNetworkAccess` -Whether or not public network access is allowed for this resource. For security reasons it should be disabled. If not specified, it will be disabled by default if private endpoints are set and networkProfileAllowedIpRanges are not set. +Whether or not public network access is allowed for this resource. For security reasons it should be disabled. If not specified, it will be disabled by default if private endpoints are set and networkProfile is not set. - Required: No - Type: string - Default: `''` @@ -1203,4 +1205,4 @@ This section gives you an overview of all local-referenced module files (i.e., o | Reference | Type | | :-- | :-- | -| `br/public:avm-res-network-privateendpoint:0.1.1` | Remote reference | +| `br/public:avm/res/network/private-endpoint:0.2.0` | Remote reference | diff --git a/avm/res/batch/batch-account/main.bicep b/avm/res/batch/batch-account/main.bicep index 44b3813aa5..8d46704a14 100644 --- a/avm/res/batch/batch-account/main.bicep +++ b/avm/res/batch/batch-account/main.bicep @@ -34,7 +34,7 @@ param keyVaultReferenceResourceId string? @description('Optional. Configuration details for private endpoints. For security reasons, it is recommended to use private endpoints whenever possible.') param privateEndpoints privateEndpointType -@description('Optional. Whether or not public network access is allowed for this resource. For security reasons it should be disabled. If not specified, it will be disabled by default if private endpoints are set and networkProfileAllowedIpRanges are not set.') +@description('Optional. Whether or not public network access is allowed for this resource. For security reasons it should be disabled. If not specified, it will be disabled by default if private endpoints are set and networkProfile is not set.') @allowed([ '' 'Enabled' @@ -42,15 +42,8 @@ param privateEndpoints privateEndpointType ]) param publicNetworkAccess string = '' -@allowed([ - 'Allow' - 'Deny' -]) -@description('Optional. The network profile default action for endpoint access. It is only applicable when publicNetworkAccess is not explicitly disabled.') -param networkProfileDefaultAction string = 'Deny' - -@description('Optional. Array of IP ranges to filter client IP address. It is only applicable when publicNetworkAccess is not explicitly disabled.') -param networkProfileAllowedIpRanges array? +@description('Optional. Network access profile. It is only applicable when publicNetworkAccess is not explicitly disabled.') +param networkProfile networkProfileType @description('Optional. The lock settings of the service.') param lock lockType @@ -87,9 +80,14 @@ var identity = !empty(managedIdentities) ? { userAssignedIdentities: !empty(formattedUserAssignedIdentities) ? formattedUserAssignedIdentities : null } : null -var networkProfileIpRules = [for networkProfileAllowedIpRange in (networkProfileAllowedIpRanges ?? []): { +var accountAccessNetworkProfileIpRules = [for allowedIpRule in networkProfile.?accountAccess.?allowedIpRules ?? []: { action: 'Allow' - value: networkProfileAllowedIpRange + value: allowedIpRule +}] + +var nodeManagementAccessNetworkProfileIpRules = [for allowedIpRule in networkProfile.?nodeManagementAccess.?allowedIpRules ?? []: { + action: 'Allow' + value: allowedIpRule }] var builtInRoleNames = { @@ -156,14 +154,18 @@ resource batchAccount 'Microsoft.Batch/batchAccounts@2022-06-01' = { id: batchKeyVaultReference.id url: batchKeyVaultReference.properties.vaultUri } : null - networkProfile: (publicNetworkAccess == 'Disabled') || empty(networkProfileAllowedIpRanges ?? []) ? null : { - accountAccess: { - defaultAction: networkProfileDefaultAction - ipRules: networkProfileIpRules - } - } + networkProfile: !empty(networkProfile ?? {}) ? { + accountAccess: !empty(accountAccessNetworkProfileIpRules) ? { + defaultAction: networkProfile.?accountAccess.?defaultAction ?? 'Deny' + ipRules: accountAccessNetworkProfileIpRules + } : null + nodeManagementAccess: !empty(nodeManagementAccessNetworkProfileIpRules) ? { + defaultAction: networkProfile.?nodeManagementAccess.?defaultAction ?? 'Deny' + ipRules: nodeManagementAccessNetworkProfileIpRules + } : null + } : null poolAllocationMode: poolAllocationMode - publicNetworkAccess: !empty(publicNetworkAccess) ? any(publicNetworkAccess) : ((!empty(privateEndpoints ?? []) && empty(networkProfileAllowedIpRanges ?? [])) ? 'Disabled' : null) + publicNetworkAccess: !empty(publicNetworkAccess) ? any(publicNetworkAccess) : ((!empty(privateEndpoints ?? []) && empty(networkProfile ?? [])) ? 'Disabled' : null) } } @@ -202,7 +204,7 @@ resource batchAccount_diagnosticSettings 'Microsoft.Insights/diagnosticSettings@ scope: batchAccount }] -module batchAccount_privateEndpoints 'br/public:avm-res-network-privateendpoint:0.1.1' = [for (privateEndpoint, index) in (privateEndpoints ?? []): { +module batchAccount_privateEndpoints 'br/public:avm/res/network/private-endpoint:0.2.0' = [for (privateEndpoint, index) in (privateEndpoints ?? []): { name: '${uniqueString(deployment().name, location)}-BatchAccount-PrivateEndpoint-${index}' params: { groupIds: [ @@ -279,7 +281,7 @@ type diagnosticSettingType = { }[]? @description('Optional. A string indicating whether the export to Log Analytics should use the default destination type, i.e. AzureDiagnostics, or use a destination type.') - logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics' | null)? + logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics')? @description('Optional. Resource ID of the diagnostic log analytics workspace. For security reasons, it is recommended to set diagnostic settings to send data to either storage account, log analytics workspace or event hub.') workspaceResourceId: string? @@ -305,7 +307,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? @@ -401,3 +403,19 @@ type lockType = { @description('Optional. Specify the type of lock.') kind: ('CanNotDelete' | 'ReadOnly' | 'None')? }? + +type networkProfileType = { + @description('Optional. Network access profile for batchAccount endpoint (Batch account data plane API).') + accountAccess: endpointAccessProfileType? + + @description('Optional. Network access profile for nodeManagement endpoint (Batch service managing compute nodes for Batch pools).') + nodeManagementAccess: endpointAccessProfileType? +}? + +type endpointAccessProfileType = { + @description('Optional. Default action for endpoint access. If not specified, defaults to Deny.') + defaultAction: ('Allow' | 'Deny')? + + @description('Optional. Array of IP ranges to filter client IP address.') + allowedIpRules: array? +}? diff --git a/avm/res/batch/batch-account/main.json b/avm/res/batch/batch-account/main.json index bf23e7b2c6..0f6f4c08cd 100644 --- a/avm/res/batch/batch-account/main.json +++ b/avm/res/batch/batch-account/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "14416997244636139298" + "version": "0.23.1.45101", + "templateHash": "5985605470006145752" }, "name": "Batch Accounts", "description": "This module deploys a Batch Account.", @@ -407,6 +407,50 @@ } }, "nullable": true + }, + "networkProfileType": { + "type": "object", + "properties": { + "accountAccess": { + "$ref": "#/definitions/endpointAccessProfileType", + "nullable": true, + "metadata": { + "description": "Optional. Network access profile for batchAccount endpoint (Batch account data plane API)." + } + }, + "nodeManagementAccess": { + "$ref": "#/definitions/endpointAccessProfileType", + "nullable": true, + "metadata": { + "description": "Optional. Network access profile for nodeManagement endpoint (Batch service managing compute nodes for Batch pools)." + } + } + }, + "nullable": true + }, + "endpointAccessProfileType": { + "type": "object", + "properties": { + "defaultAction": { + "type": "string", + "allowedValues": [ + "Allow", + "Deny" + ], + "nullable": true, + "metadata": { + "description": "Optional. Default action for endpoint access. If not specified, defaults to Deny." + } + }, + "allowedIpRules": { + "type": "array", + "nullable": true, + "metadata": { + "description": "Optional. Array of IP ranges to filter client IP address." + } + } + }, + "nullable": true } }, "parameters": { @@ -480,25 +524,13 @@ "Disabled" ], "metadata": { - "description": "Optional. Whether or not public network access is allowed for this resource. For security reasons it should be disabled. If not specified, it will be disabled by default if private endpoints are set and networkProfileAllowedIpRanges are not set." + "description": "Optional. Whether or not public network access is allowed for this resource. For security reasons it should be disabled. If not specified, it will be disabled by default if private endpoints are set and networkProfile is not set." } }, - "networkProfileDefaultAction": { - "type": "string", - "defaultValue": "Deny", - "allowedValues": [ - "Allow", - "Deny" - ], + "networkProfile": { + "$ref": "#/definitions/networkProfileType", "metadata": { - "description": "Optional. The network profile default action for endpoint access. It is only applicable when publicNetworkAccess is not explicitly disabled." - } - }, - "networkProfileAllowedIpRanges": { - "type": "array", - "nullable": true, - "metadata": { - "description": "Optional. Array of IP ranges to filter client IP address. It is only applicable when publicNetworkAccess is not explicitly disabled." + "description": "Optional. Network access profile. It is only applicable when publicNetworkAccess is not explicitly disabled." } }, "lock": { @@ -561,11 +593,19 @@ "variables": { "copy": [ { - "name": "networkProfileIpRules", - "count": "[length(coalesce(parameters('networkProfileAllowedIpRanges'), createArray()))]", + "name": "accountAccessNetworkProfileIpRules", + "count": "[length(coalesce(tryGet(tryGet(parameters('networkProfile'), 'accountAccess'), 'allowedIpRules'), createArray()))]", + "input": { + "action": "Allow", + "value": "[coalesce(tryGet(tryGet(parameters('networkProfile'), 'accountAccess'), 'allowedIpRules'), createArray())[copyIndex('accountAccessNetworkProfileIpRules')]]" + } + }, + { + "name": "nodeManagementAccessNetworkProfileIpRules", + "count": "[length(coalesce(tryGet(tryGet(parameters('networkProfile'), 'nodeManagementAccess'), 'allowedIpRules'), createArray()))]", "input": { "action": "Allow", - "value": "[coalesce(parameters('networkProfileAllowedIpRanges'), createArray())[copyIndex('networkProfileIpRules')]]" + "value": "[coalesce(tryGet(tryGet(parameters('networkProfile'), 'nodeManagementAccess'), 'allowedIpRules'), createArray())[copyIndex('nodeManagementAccessNetworkProfileIpRules')]]" } } ], @@ -646,9 +686,9 @@ }, "encryption": "[if(not(empty(parameters('customerManagedKey'))), createObject('keySource', 'Microsoft.KeyVault', 'keyVaultProperties', createObject('keyIdentifier', if(not(empty(coalesce(tryGet(parameters('customerManagedKey'), 'keyVersion'), ''))), format('{0}/{1}', reference('cMKKeyVault::cMKKey').keyUri, parameters('customerManagedKey').keyVersion), reference('cMKKeyVault::cMKKey').keyUriWithVersion))), null())]", "keyVaultReference": "[if(equals(parameters('poolAllocationMode'), 'UserSubscription'), createObject('id', extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(parameters('keyVaultReferenceResourceId'), '//'), '/')[2], split(coalesce(parameters('keyVaultReferenceResourceId'), '////'), '/')[4]), 'Microsoft.KeyVault/vaults', last(split(coalesce(parameters('keyVaultReferenceResourceId'), 'dummyVault'), '/'))), 'url', reference('batchKeyVaultReference').vaultUri), null())]", - "networkProfile": "[if(or(equals(parameters('publicNetworkAccess'), 'Disabled'), empty(coalesce(parameters('networkProfileAllowedIpRanges'), createArray()))), null(), createObject('accountAccess', createObject('defaultAction', parameters('networkProfileDefaultAction'), 'ipRules', variables('networkProfileIpRules'))))]", + "networkProfile": "[if(not(empty(coalesce(parameters('networkProfile'), createObject()))), createObject('accountAccess', if(not(empty(variables('accountAccessNetworkProfileIpRules'))), createObject('defaultAction', coalesce(tryGet(tryGet(parameters('networkProfile'), 'accountAccess'), 'defaultAction'), 'Deny'), 'ipRules', variables('accountAccessNetworkProfileIpRules')), null()), 'nodeManagementAccess', if(not(empty(variables('nodeManagementAccessNetworkProfileIpRules'))), createObject('defaultAction', coalesce(tryGet(tryGet(parameters('networkProfile'), 'nodeManagementAccess'), 'defaultAction'), 'Deny'), 'ipRules', variables('nodeManagementAccessNetworkProfileIpRules')), null())), null())]", "poolAllocationMode": "[parameters('poolAllocationMode')]", - "publicNetworkAccess": "[if(not(empty(parameters('publicNetworkAccess'))), parameters('publicNetworkAccess'), if(and(not(empty(coalesce(parameters('privateEndpoints'), createArray()))), empty(coalesce(parameters('networkProfileAllowedIpRanges'), createArray()))), 'Disabled', null()))]" + "publicNetworkAccess": "[if(not(empty(parameters('publicNetworkAccess'))), parameters('publicNetworkAccess'), if(and(not(empty(coalesce(parameters('privateEndpoints'), createArray()))), empty(coalesce(parameters('networkProfile'), createArray()))), 'Disabled', null()))]" }, "dependsOn": [ "batchKeyVaultReference", @@ -786,8 +826,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.21.1.54444", - "templateHash": "13152465847704433697" + "version": "0.23.1.45101", + "templateHash": "2788827530274342759" }, "name": "Private Endpoints", "description": "This module deploys a Private Endpoint.", @@ -1013,7 +1053,7 @@ "condition": "[parameters('enableTelemetry')]", "type": "Microsoft.Resources/deployments", "apiVersion": "2023-07-01", - "name": "[format('46d3xbcp.res.network-privateendpoint.{0}.{1}', replace('0.1.1', '.', '-'), substring(uniqueString(deployment().name, parameters('location')), 0, 4))]", + "name": "[format('46d3xbcp.res.network-privateendpoint.{0}.{1}', replace('0.2.0', '.', '-'), substring(uniqueString(deployment().name, parameters('location')), 0, 4))]", "properties": { "mode": "Incremental", "template": { @@ -1126,8 +1166,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.21.1.54444", - "templateHash": "1698104586574073002" + "version": "0.23.1.45101", + "templateHash": "18168683629401652671" }, "name": "Private Endpoint Private DNS Zone Groups", "description": "This module deploys a Private Endpoint Private DNS Zone Group.", diff --git a/avm/res/batch/batch-account/tests/e2e/defaults/main.test.bicep b/avm/res/batch/batch-account/tests/e2e/defaults/main.test.bicep index c877bf840a..b0bb748e7c 100644 --- a/avm/res/batch/batch-account/tests/e2e/defaults/main.test.bicep +++ b/avm/res/batch/batch-account/tests/e2e/defaults/main.test.bicep @@ -55,7 +55,7 @@ module testDeployment '../../../main.bicep' = [for iteration in [ 'init', 'idem' // Workaround for PSRule storageAccessIdentityResourceId: null keyVaultReferenceResourceId: null - networkProfileAllowedIpRanges: null + networkProfile: null tags: null allowedAuthenticationModes: null diagnosticSettings: null diff --git a/avm/res/batch/batch-account/tests/e2e/encr/main.test.bicep b/avm/res/batch/batch-account/tests/e2e/encr/main.test.bicep index 8e1754991d..a048ed207f 100644 --- a/avm/res/batch/batch-account/tests/e2e/encr/main.test.bicep +++ b/avm/res/batch/batch-account/tests/e2e/encr/main.test.bicep @@ -73,14 +73,5 @@ module testDeployment '../../../main.bicep' = [for iteration in [ 'init', 'idem' tags: { 'hidden-title': 'This is visible in the resource name' } - // Workaround for PSRule - storageAccessIdentityResourceId: null - keyVaultReferenceResourceId: null - networkProfileAllowedIpRanges: null - allowedAuthenticationModes: null - diagnosticSettings: null - roleAssignments: null - privateEndpoints: null - lock: null } }] diff --git a/avm/res/batch/batch-account/tests/e2e/max/main.test.bicep b/avm/res/batch/batch-account/tests/e2e/max/main.test.bicep index 9e361edc03..9fb6a700fb 100644 --- a/avm/res/batch/batch-account/tests/e2e/max/main.test.bicep +++ b/avm/res/batch/batch-account/tests/e2e/max/main.test.bicep @@ -102,6 +102,19 @@ module testDeployment '../../../main.bicep' = [for iteration in [ 'init', 'idem' ] } ] + networkProfile: { + accountAccess: { + defaultAction: 'Deny' + allowedIpRules: [ + '40.74.28.0/23' + ] + } + nodeManagementAccess: { + allowedIpRules: [ + '40.74.28.0/23' + ] + } + } roleAssignments: [ { roleDefinitionIdOrName: 'Reader' @@ -121,7 +134,6 @@ module testDeployment '../../../main.bicep' = [for iteration in [ 'init', 'idem' } // Workaround for PSRule keyVaultReferenceResourceId: null - networkProfileAllowedIpRanges: null allowedAuthenticationModes: null customerManagedKey: null } diff --git a/avm/res/batch/batch-account/tests/e2e/waf-aligned/main.test.bicep b/avm/res/batch/batch-account/tests/e2e/waf-aligned/main.test.bicep index a2b32e16c8..80511fa7ea 100644 --- a/avm/res/batch/batch-account/tests/e2e/waf-aligned/main.test.bicep +++ b/avm/res/batch/batch-account/tests/e2e/waf-aligned/main.test.bicep @@ -101,7 +101,7 @@ module testDeployment '../../../main.bicep' = [for iteration in [ 'init', 'idem' } // Workaround for PSRule keyVaultReferenceResourceId: null - networkProfileAllowedIpRanges: null + networkProfile: null allowedAuthenticationModes: null roleAssignments: null customerManagedKey: null diff --git a/avm/res/batch/batch-account/version.json b/avm/res/batch/batch-account/version.json index 83083db694..1c035df49f 100644 --- a/avm/res/batch/batch-account/version.json +++ b/avm/res/batch/batch-account/version.json @@ -1,6 +1,6 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] diff --git a/avm/res/cognitive-services/account/README.md b/avm/res/cognitive-services/account/README.md index 311f24b21c..b9c9947e60 100644 --- a/avm/res/cognitive-services/account/README.md +++ b/avm/res/cognitive-services/account/README.md @@ -1641,4 +1641,4 @@ This section gives you an overview of all local-referenced module files (i.e., o | Reference | Type | | :-- | :-- | -| `br/public:avm-res-network-privateendpoint:0.1.1` | Remote reference | +| `br/public:avm/res/network/private-endpoint:0.2.0` | Remote reference | diff --git a/avm/res/cognitive-services/account/main.bicep b/avm/res/cognitive-services/account/main.bicep index 27338cefbe..ea3591460f 100644 --- a/avm/res/cognitive-services/account/main.bicep +++ b/avm/res/cognitive-services/account/main.bicep @@ -261,7 +261,7 @@ resource cognitiveService_diagnosticSettings 'Microsoft.Insights/diagnosticSetti scope: cognitiveService }] -module cognitiveService_privateEndpoints 'br/public:avm-res-network-privateendpoint:0.1.1' = [for (privateEndpoint, index) in (privateEndpoints ?? []): { +module cognitiveService_privateEndpoints 'br/public:avm/res/network/private-endpoint:0.2.0' = [for (privateEndpoint, index) in (privateEndpoints ?? []): { name: '${uniqueString(deployment().name, location)}-CognitiveService-PrivateEndpoint-${index}' params: { groupIds: [ @@ -341,7 +341,7 @@ type diagnosticSettingType = { }[]? @description('Optional. A string indicating whether the export to Log Analytics should use the default destination type, i.e. AzureDiagnostics, or use a destination type.') - logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics' | null)? + logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics')? @description('Optional. Resource ID of the diagnostic log analytics workspace. For security reasons, it is recommended to set diagnostic settings to send data to either storage account, log analytics workspace or event hub.') workspaceResourceId: string? @@ -367,7 +367,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/cognitive-services/account/main.json b/avm/res/cognitive-services/account/main.json index 30e9e26770..bebf063097 100644 --- a/avm/res/cognitive-services/account/main.json +++ b/avm/res/cognitive-services/account/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "6554282331516500276" + "version": "0.23.1.45101", + "templateHash": "12255564723872519506" }, "name": "Cognitive Services", "description": "This module deploys a Cognitive Service.", @@ -866,8 +866,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.21.1.54444", - "templateHash": "13152465847704433697" + "version": "0.23.1.45101", + "templateHash": "2788827530274342759" }, "name": "Private Endpoints", "description": "This module deploys a Private Endpoint.", @@ -1093,7 +1093,7 @@ "condition": "[parameters('enableTelemetry')]", "type": "Microsoft.Resources/deployments", "apiVersion": "2023-07-01", - "name": "[format('46d3xbcp.res.network-privateendpoint.{0}.{1}', replace('0.1.1', '.', '-'), substring(uniqueString(deployment().name, parameters('location')), 0, 4))]", + "name": "[format('46d3xbcp.res.network-privateendpoint.{0}.{1}', replace('0.2.0', '.', '-'), substring(uniqueString(deployment().name, parameters('location')), 0, 4))]", "properties": { "mode": "Incremental", "template": { @@ -1206,8 +1206,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.21.1.54444", - "templateHash": "1698104586574073002" + "version": "0.23.1.45101", + "templateHash": "18168683629401652671" }, "name": "Private Endpoint Private DNS Zone Groups", "description": "This module deploys a Private Endpoint Private DNS Zone Group.", diff --git a/avm/res/cognitive-services/account/version.json b/avm/res/cognitive-services/account/version.json index 7fa401bdf7..1c035df49f 100644 --- a/avm/res/cognitive-services/account/version.json +++ b/avm/res/cognitive-services/account/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/compute/ssh-public-key/main.bicep b/avm/res/compute/ssh-public-key/main.bicep index 68256e0ad1..48a31df796 100644 --- a/avm/res/compute/ssh-public-key/main.bicep +++ b/avm/res/compute/ssh-public-key/main.bicep @@ -96,7 +96,6 @@ output name string = sshPublicKey.name @description('The location the resource was deployed into.') output location string = sshPublicKey.location - // ================ // // Definitions // // ================ // @@ -109,7 +108,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/compute/ssh-public-key/main.json b/avm/res/compute/ssh-public-key/main.json index 89527e7f7d..1faedf7c72 100644 --- a/avm/res/compute/ssh-public-key/main.json +++ b/avm/res/compute/ssh-public-key/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "5038952518458313125" + "version": "0.23.1.45101", + "templateHash": "710464253439949406" }, "name": "Public SSH Keys", "description": "This module deploys a Public SSH Key.\n\n> Note: The resource does not auto-generate the key for you.", diff --git a/avm/res/compute/ssh-public-key/version.json b/avm/res/compute/ssh-public-key/version.json index 7fa401bdf7..1c035df49f 100644 --- a/avm/res/compute/ssh-public-key/version.json +++ b/avm/res/compute/ssh-public-key/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/insights/action-group/main.bicep b/avm/res/insights/action-group/main.bicep index 08a48cb438..0195ea6943 100644 --- a/avm/res/insights/action-group/main.bicep +++ b/avm/res/insights/action-group/main.bicep @@ -137,7 +137,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/insights/action-group/main.json b/avm/res/insights/action-group/main.json index d63e2f5422..47c5d704b4 100644 --- a/avm/res/insights/action-group/main.json +++ b/avm/res/insights/action-group/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "17495477532305810590" + "version": "0.23.1.45101", + "templateHash": "9343054180603300914" }, "name": "Action Groups", "description": "This module deploys an Action Group.", diff --git a/avm/res/insights/action-group/version.json b/avm/res/insights/action-group/version.json index 7fa401bdf7..1c035df49f 100644 --- a/avm/res/insights/action-group/version.json +++ b/avm/res/insights/action-group/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/key-vault/vault/README.md b/avm/res/key-vault/vault/README.md index 656a77c2d1..41d4f8ec4d 100644 --- a/avm/res/key-vault/vault/README.md +++ b/avm/res/key-vault/vault/README.md @@ -1410,4 +1410,4 @@ This section gives you an overview of all local-referenced module files (i.e., o | Reference | Type | | :-- | :-- | -| `br/public:avm-res-network-privateendpoint:0.1.1` | Remote reference | +| `br/public:avm/res/network/private-endpoint:0.2.0` | Remote reference | diff --git a/avm/res/key-vault/vault/access-policy/main.json b/avm/res/key-vault/vault/access-policy/main.json index 9b6725ecc4..8aa7ea483d 100644 --- a/avm/res/key-vault/vault/access-policy/main.json +++ b/avm/res/key-vault/vault/access-policy/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "9999250509448584761" + "version": "0.23.1.45101", + "templateHash": "4111939022872407830" }, "name": "Key Vault Access Policies", "description": "This module deploys a Key Vault Access Policy.", diff --git a/avm/res/key-vault/vault/key/main.bicep b/avm/res/key-vault/vault/key/main.bicep index a2326bd117..4a5807f4e8 100644 --- a/avm/res/key-vault/vault/key/main.bicep +++ b/avm/res/key-vault/vault/key/main.bicep @@ -133,7 +133,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/key-vault/vault/key/main.json b/avm/res/key-vault/vault/key/main.json index 6ecce215ac..6e85c7d6ad 100644 --- a/avm/res/key-vault/vault/key/main.json +++ b/avm/res/key-vault/vault/key/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "15591839680984542683" + "version": "0.23.1.45101", + "templateHash": "2691621623448325959" }, "name": "Key Vault Keys", "description": "This module deploys a Key Vault Key.", diff --git a/avm/res/key-vault/vault/main.bicep b/avm/res/key-vault/vault/main.bicep index ae038cf1f5..fa2f17d1d7 100644 --- a/avm/res/key-vault/vault/main.bicep +++ b/avm/res/key-vault/vault/main.bicep @@ -239,7 +239,7 @@ module keyVault_keys 'key/main.bicep' = [for (key, index) in (keys ?? []): { } }] -module keyVault_privateEndpoints 'br/public:avm-res-network-privateendpoint:0.1.1' = [for (privateEndpoint, index) in (privateEndpoints ?? []): { +module keyVault_privateEndpoints 'br/public:avm/res/network/private-endpoint:0.2.0' = [for (privateEndpoint, index) in (privateEndpoints ?? []): { name: '${uniqueString(deployment().name, location)}-KeyVault-PrivateEndpoint-${index}' params: { groupIds: [ @@ -319,7 +319,7 @@ type diagnosticSettingType = { }[]? @description('Optional. A string indicating whether the export to Log Analytics should use the default destination type, i.e. AzureDiagnostics, or use a destination type.') - logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics' | null)? + logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics')? @description('Optional. Resource ID of the diagnostic log analytics workspace. For security reasons, it is recommended to set diagnostic settings to send data to either storage account, log analytics workspace or event hub.') workspaceResourceId: string? @@ -345,7 +345,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/key-vault/vault/main.json b/avm/res/key-vault/vault/main.json index f10c40c0fb..0607d1deac 100644 --- a/avm/res/key-vault/vault/main.json +++ b/avm/res/key-vault/vault/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "9188769706526490100" + "version": "0.23.1.45101", + "templateHash": "7132385713843537541" }, "name": "Key Vaults", "description": "This module deploys a Key Vault.", @@ -682,8 +682,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "9999250509448584761" + "version": "0.23.1.45101", + "templateHash": "4111939022872407830" }, "name": "Key Vault Access Policies", "description": "This module deploys a Key Vault Access Policy.", @@ -815,8 +815,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "11139788551431901948" + "version": "0.23.1.45101", + "templateHash": "9180551172362989336" }, "name": "Key Vault Secrets", "description": "This module deploys a Key Vault Secret.", @@ -1104,8 +1104,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "15591839680984542683" + "version": "0.23.1.45101", + "templateHash": "2691621623448325959" }, "name": "Key Vault Keys", "description": "This module deploys a Key Vault Key.", @@ -1453,8 +1453,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.21.1.54444", - "templateHash": "13152465847704433697" + "version": "0.23.1.45101", + "templateHash": "2788827530274342759" }, "name": "Private Endpoints", "description": "This module deploys a Private Endpoint.", @@ -1680,7 +1680,7 @@ "condition": "[parameters('enableTelemetry')]", "type": "Microsoft.Resources/deployments", "apiVersion": "2023-07-01", - "name": "[format('46d3xbcp.res.network-privateendpoint.{0}.{1}', replace('0.1.1', '.', '-'), substring(uniqueString(deployment().name, parameters('location')), 0, 4))]", + "name": "[format('46d3xbcp.res.network-privateendpoint.{0}.{1}', replace('0.2.0', '.', '-'), substring(uniqueString(deployment().name, parameters('location')), 0, 4))]", "properties": { "mode": "Incremental", "template": { @@ -1793,8 +1793,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.21.1.54444", - "templateHash": "1698104586574073002" + "version": "0.23.1.45101", + "templateHash": "18168683629401652671" }, "name": "Private Endpoint Private DNS Zone Groups", "description": "This module deploys a Private Endpoint Private DNS Zone Group.", diff --git a/avm/res/key-vault/vault/secret/main.bicep b/avm/res/key-vault/vault/secret/main.bicep index c1b693b1bb..0d4ea3dc2c 100644 --- a/avm/res/key-vault/vault/secret/main.bicep +++ b/avm/res/key-vault/vault/secret/main.bicep @@ -102,7 +102,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/key-vault/vault/secret/main.json b/avm/res/key-vault/vault/secret/main.json index 62c5c52a19..f778252db1 100644 --- a/avm/res/key-vault/vault/secret/main.json +++ b/avm/res/key-vault/vault/secret/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "11139788551431901948" + "version": "0.23.1.45101", + "templateHash": "9180551172362989336" }, "name": "Key Vault Secrets", "description": "This module deploys a Key Vault Secret.", diff --git a/avm/res/key-vault/vault/version.json b/avm/res/key-vault/vault/version.json index 7fa401bdf7..1c035df49f 100644 --- a/avm/res/key-vault/vault/version.json +++ b/avm/res/key-vault/vault/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/kubernetes-configuration/extension/README.md b/avm/res/kubernetes-configuration/extension/README.md index c7035fb0a2..a618a01199 100644 --- a/avm/res/kubernetes-configuration/extension/README.md +++ b/avm/res/kubernetes-configuration/extension/README.md @@ -478,7 +478,7 @@ This section gives you an overview of all local-referenced module files (i.e., o | Reference | Type | | :-- | :-- | -| `br/public:avm-res-kubernetesconfiguration-fluxconfiguration:0.1.1` | Remote reference | +| `br/public:avm/res/kubernetes-configuration/flux-configuration:0.2.0` | Remote reference | ## Notes diff --git a/avm/res/kubernetes-configuration/extension/main.bicep b/avm/res/kubernetes-configuration/extension/main.bicep index 9174319ede..eaaaf73283 100644 --- a/avm/res/kubernetes-configuration/extension/main.bicep +++ b/avm/res/kubernetes-configuration/extension/main.bicep @@ -82,7 +82,7 @@ resource extension 'Microsoft.KubernetesConfiguration/extensions@2022-03-01' = { } } -module fluxConfiguration 'br/public:avm-res-kubernetesconfiguration-fluxconfiguration:0.1.1' = [for (fluxConfiguration, index) in (fluxConfigurations ?? []): { +module fluxConfiguration 'br/public:avm/res/kubernetes-configuration/flux-configuration:0.2.0' = [for (fluxConfiguration, index) in (fluxConfigurations ?? []): { name: '${uniqueString(deployment().name, location)}-ManagedCluster-FluxConfiguration${index}' params: { enableTelemetry: enableTelemetry diff --git a/avm/res/kubernetes-configuration/extension/main.json b/avm/res/kubernetes-configuration/extension/main.json index 8b98fa6c62..b81db497db 100644 --- a/avm/res/kubernetes-configuration/extension/main.json +++ b/avm/res/kubernetes-configuration/extension/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "14897435188419140897" + "version": "0.23.1.45101", + "templateHash": "12293754418506359991" }, "name": "Kubernetes Configuration Extensions", "description": "This module deploys a Kubernetes Configuration Extension.", @@ -196,8 +196,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "8142453295903624237" + "version": "0.23.1.45101", + "templateHash": "13420454476526931427" }, "name": "Kubernetes Configuration Flux Configurations", "description": "This module deploys a Kubernetes Configuration Flux Configuration.", @@ -297,7 +297,7 @@ "condition": "[parameters('enableTelemetry')]", "type": "Microsoft.Resources/deployments", "apiVersion": "2023-07-01", - "name": "[format('46d3xbcp.res.kubernetesconfiguration-extension.{0}.{1}', replace('0.1.1', '.', '-'), substring(uniqueString(deployment().name, parameters('location')), 0, 4))]", + "name": "[format('46d3xbcp.res.kubernetesconfiguration-extension.{0}.{1}', replace('0.2.0', '.', '-'), substring(uniqueString(deployment().name, parameters('location')), 0, 4))]", "properties": { "mode": "Incremental", "template": { diff --git a/avm/res/kubernetes-configuration/extension/version.json b/avm/res/kubernetes-configuration/extension/version.json index 83083db694..1c035df49f 100644 --- a/avm/res/kubernetes-configuration/extension/version.json +++ b/avm/res/kubernetes-configuration/extension/version.json @@ -1,6 +1,6 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] diff --git a/avm/res/network/dns-forwarding-ruleset/forwarding-rule/main.json b/avm/res/network/dns-forwarding-ruleset/forwarding-rule/main.json index bcd11592a5..bb858f6e48 100644 --- a/avm/res/network/dns-forwarding-ruleset/forwarding-rule/main.json +++ b/avm/res/network/dns-forwarding-ruleset/forwarding-rule/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "10548868595530009801" + "version": "0.23.1.45101", + "templateHash": "15979056867101785660" }, "name": "Dns Forwarding Rulesets Forwarding Rules", "description": "This template deploys Forwarding Rule in a Dns Forwarding Ruleset.", diff --git a/avm/res/network/dns-forwarding-ruleset/main.bicep b/avm/res/network/dns-forwarding-ruleset/main.bicep index 8d62d8fd35..c124c1e47d 100644 --- a/avm/res/network/dns-forwarding-ruleset/main.bicep +++ b/avm/res/network/dns-forwarding-ruleset/main.bicep @@ -137,7 +137,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-forwarding-ruleset/main.json b/avm/res/network/dns-forwarding-ruleset/main.json index 91c58067f3..0bb398aac9 100644 --- a/avm/res/network/dns-forwarding-ruleset/main.json +++ b/avm/res/network/dns-forwarding-ruleset/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "6432207702551473267" + "version": "0.23.1.45101", + "templateHash": "13421137596279907945" }, "name": "Dns Forwarding Rulesets", "description": "This template deploys an dns forwarding ruleset.", @@ -359,8 +359,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "10548868595530009801" + "version": "0.23.1.45101", + "templateHash": "15979056867101785660" }, "name": "Dns Forwarding Rulesets Forwarding Rules", "description": "This template deploys Forwarding Rule in a Dns Forwarding Ruleset.", @@ -484,8 +484,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "16281449356047571788" + "version": "0.23.1.45101", + "templateHash": "12854445907905498145" }, "name": "Dns Forwarding Rulesets Virtual Network Links", "description": "This template deploys Virtual Network Link in a Dns Forwarding Ruleset.", diff --git a/avm/res/network/dns-forwarding-ruleset/version.json b/avm/res/network/dns-forwarding-ruleset/version.json index 8def869ede..729ac87673 100644 --- a/avm/res/network/dns-forwarding-ruleset/version.json +++ b/avm/res/network/dns-forwarding-ruleset/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/network/dns-forwarding-ruleset/virtual-network-link/main.json b/avm/res/network/dns-forwarding-ruleset/virtual-network-link/main.json index 7d91357cc4..599ac2a2a1 100644 --- a/avm/res/network/dns-forwarding-ruleset/virtual-network-link/main.json +++ b/avm/res/network/dns-forwarding-ruleset/virtual-network-link/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "16281449356047571788" + "version": "0.23.1.45101", + "templateHash": "12854445907905498145" }, "name": "Dns Forwarding Rulesets Virtual Network Links", "description": "This template deploys Virtual Network Link in a Dns Forwarding Ruleset.", diff --git a/avm/res/network/dns-resolver/inbound-endpoint/main.json b/avm/res/network/dns-resolver/inbound-endpoint/main.json index f4aa6e3363..3c494637c6 100644 --- a/avm/res/network/dns-resolver/inbound-endpoint/main.json +++ b/avm/res/network/dns-resolver/inbound-endpoint/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "2703848374078282231" + "version": "0.23.1.45101", + "templateHash": "4959933150619557451" }, "name": "DNS Resolver Inbound Endpoint", "description": "This module deploys a DNS Resolver Inbound Endpoint.", diff --git a/avm/res/network/dns-resolver/main.bicep b/avm/res/network/dns-resolver/main.bicep index 51cadae754..cab4598b8e 100644 --- a/avm/res/network/dns-resolver/main.bicep +++ b/avm/res/network/dns-resolver/main.bicep @@ -144,7 +144,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-resolver/main.json b/avm/res/network/dns-resolver/main.json index 5e007c2bae..86e4f31f68 100644 --- a/avm/res/network/dns-resolver/main.json +++ b/avm/res/network/dns-resolver/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "7241185525212749408" + "version": "0.23.1.45101", + "templateHash": "8204369866925392451" }, "name": "DNS Resolvers", "description": "This module deploys a DNS Resolver.", @@ -293,8 +293,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "2703848374078282231" + "version": "0.23.1.45101", + "templateHash": "4959933150619557451" }, "name": "DNS Resolver Inbound Endpoint", "description": "This module deploys a DNS Resolver Inbound Endpoint.", @@ -444,8 +444,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "5345486606667278268" + "version": "0.23.1.45101", + "templateHash": "5115868945023493966" }, "name": "DNS Resolver Outbound Endpoint", "description": "This module deploys a DNS Resolver Outbound Endpoint.", diff --git a/avm/res/network/dns-resolver/outbound-endpoint/main.json b/avm/res/network/dns-resolver/outbound-endpoint/main.json index 38b5a8a47c..b382d56180 100644 --- a/avm/res/network/dns-resolver/outbound-endpoint/main.json +++ b/avm/res/network/dns-resolver/outbound-endpoint/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "5345486606667278268" + "version": "0.23.1.45101", + "templateHash": "5115868945023493966" }, "name": "DNS Resolver Outbound Endpoint", "description": "This module deploys a DNS Resolver Outbound Endpoint.", diff --git a/avm/res/network/dns-resolver/version.json b/avm/res/network/dns-resolver/version.json index 8def869ede..729ac87673 100644 --- a/avm/res/network/dns-resolver/version.json +++ b/avm/res/network/dns-resolver/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/network/dns-zone/a/main.bicep b/avm/res/network/dns-zone/a/main.bicep index f34565373e..aaa83d1bd2 100644 --- a/avm/res/network/dns-zone/a/main.bicep +++ b/avm/res/network/dns-zone/a/main.bicep @@ -87,7 +87,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/a/main.json b/avm/res/network/dns-zone/a/main.json index b918547b0d..0be98a8c95 100644 --- a/avm/res/network/dns-zone/a/main.json +++ b/avm/res/network/dns-zone/a/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "13970238007833991411" + "version": "0.23.1.45101", + "templateHash": "5102357917037426899" }, "name": "Public DNS Zone A record", "description": "This module deploys a Public DNS Zone A record.", diff --git a/avm/res/network/dns-zone/aaaa/main.bicep b/avm/res/network/dns-zone/aaaa/main.bicep index 7b8a1d4244..d8b7547d5e 100644 --- a/avm/res/network/dns-zone/aaaa/main.bicep +++ b/avm/res/network/dns-zone/aaaa/main.bicep @@ -88,7 +88,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/aaaa/main.json b/avm/res/network/dns-zone/aaaa/main.json index b011523bb0..722ba83c64 100644 --- a/avm/res/network/dns-zone/aaaa/main.json +++ b/avm/res/network/dns-zone/aaaa/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "4011930963432958713" + "version": "0.23.1.45101", + "templateHash": "15377155277897248268" }, "name": "Public DNS Zone AAAA record", "description": "This module deploys a Public DNS Zone AAAA record.", diff --git a/avm/res/network/dns-zone/caa/main.bicep b/avm/res/network/dns-zone/caa/main.bicep index 0a765276f0..cdd3e29c1f 100644 --- a/avm/res/network/dns-zone/caa/main.bicep +++ b/avm/res/network/dns-zone/caa/main.bicep @@ -82,7 +82,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/caa/main.json b/avm/res/network/dns-zone/caa/main.json index 443d74d263..750b76af1c 100644 --- a/avm/res/network/dns-zone/caa/main.json +++ b/avm/res/network/dns-zone/caa/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "4138689760480479820" + "version": "0.23.1.45101", + "templateHash": "14137420953130091892" }, "name": "Public DNS Zone CAA record", "description": "This module deploys a Public DNS Zone CAA record.", diff --git a/avm/res/network/dns-zone/cname/main.bicep b/avm/res/network/dns-zone/cname/main.bicep index 98ac0bb783..ebb5f48043 100644 --- a/avm/res/network/dns-zone/cname/main.bicep +++ b/avm/res/network/dns-zone/cname/main.bicep @@ -88,7 +88,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/cname/main.json b/avm/res/network/dns-zone/cname/main.json index 2bf60f8af5..d730668667 100644 --- a/avm/res/network/dns-zone/cname/main.json +++ b/avm/res/network/dns-zone/cname/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "742341444908883216" + "version": "0.23.1.45101", + "templateHash": "15202379687273336739" }, "name": "Public DNS Zone CNAME record", "description": "This module deploys a Public DNS Zone CNAME record.", diff --git a/avm/res/network/dns-zone/main.bicep b/avm/res/network/dns-zone/main.bicep index 938290ad07..44b52e5f9c 100644 --- a/avm/res/network/dns-zone/main.bicep +++ b/avm/res/network/dns-zone/main.bicep @@ -151,8 +151,8 @@ module dnsZone_MX 'mx/main.bicep' = [for (mxRecord, index) in (mx ?? []): { name: mxRecord.name metadata: mxRecord.?metadata mxRecords: mxRecord.?mxRecords - ttl: mxRecord.?ttl ?? 3600 - roleAssignments: mxRecord.?roleAssignments + ttl: mxRecord.?ttl ?? 3600 + roleAssignments: mxRecord.?roleAssignments } }] @@ -175,8 +175,8 @@ module dnsZone_PTR 'ptr/main.bicep' = [for (ptrRecord, index) in (ptr ?? []): { name: ptrRecord.name metadata: ptrRecord.?metadata ptrRecords: ptrRecord.?ptrRecords - ttl: ptrRecord.?ttl ?? 3600 - roleAssignments: ptrRecord.?roleAssignments + ttl: ptrRecord.?ttl ?? 3600 + roleAssignments: ptrRecord.?roleAssignments } }] @@ -211,8 +211,8 @@ module dnsZone_TXT 'txt/main.bicep' = [for (txtRecord, index) in (txt ?? []): { name: txtRecord.name metadata: txtRecord.?metadata txtRecords: txtRecord.?txtRecords - ttl: txtRecord.?ttl ?? 3600 - roleAssignments: txtRecord.?roleAssignments + ttl: txtRecord.?ttl ?? 3600 + roleAssignments: txtRecord.?roleAssignments } }] @@ -271,7 +271,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/main.json b/avm/res/network/dns-zone/main.json index 406ea95cc8..306d01aff2 100644 --- a/avm/res/network/dns-zone/main.json +++ b/avm/res/network/dns-zone/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "14472207312303462070" + "version": "0.23.1.45101", + "templateHash": "15615003934018920895" }, "name": "Public DNS Zones", "description": "This module deploys a Public DNS zone.", @@ -343,8 +343,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "13970238007833991411" + "version": "0.23.1.45101", + "templateHash": "5102357917037426899" }, "name": "Public DNS Zone A record", "description": "This module deploys a Public DNS Zone A record.", @@ -597,8 +597,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "4011930963432958713" + "version": "0.23.1.45101", + "templateHash": "15377155277897248268" }, "name": "Public DNS Zone AAAA record", "description": "This module deploys a Public DNS Zone AAAA record.", @@ -851,8 +851,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "742341444908883216" + "version": "0.23.1.45101", + "templateHash": "15202379687273336739" }, "name": "Public DNS Zone CNAME record", "description": "This module deploys a Public DNS Zone CNAME record.", @@ -1102,8 +1102,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "4138689760480479820" + "version": "0.23.1.45101", + "templateHash": "14137420953130091892" }, "name": "Public DNS Zone CAA record", "description": "This module deploys a Public DNS Zone CAA record.", @@ -1345,8 +1345,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "12071465969887723634" + "version": "0.23.1.45101", + "templateHash": "7290500674933661124" }, "name": "Public DNS Zone MX record", "description": "This module deploys a Public DNS Zone MX record.", @@ -1588,8 +1588,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "7935825339044820950" + "version": "0.23.1.45101", + "templateHash": "1612913715306979831" }, "name": "Public DNS Zone NS record", "description": "This module deploys a Public DNS Zone NS record.", @@ -1831,8 +1831,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "8624776736573936284" + "version": "0.23.1.45101", + "templateHash": "18439161764270488124" }, "name": "Public DNS Zone PTR record", "description": "This module deploys a Public DNS Zone PTR record.", @@ -2074,8 +2074,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "2525485228193651958" + "version": "0.23.1.45101", + "templateHash": "6819223668967518740" }, "name": "Public DNS Zone SOA record", "description": "This module deploys a Public DNS Zone SOA record.", @@ -2317,8 +2317,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "5933163301584263263" + "version": "0.23.1.45101", + "templateHash": "534263969679389743" }, "name": "Public DNS Zone SRV record", "description": "This module deploys a Public DNS Zone SRV record.", @@ -2560,8 +2560,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "15650485131518391359" + "version": "0.23.1.45101", + "templateHash": "8365521613212782334" }, "name": "Public DNS Zone TXT record", "description": "This module deploys a Public DNS Zone TXT record.", diff --git a/avm/res/network/dns-zone/mx/main.bicep b/avm/res/network/dns-zone/mx/main.bicep index f79f2bb5a5..a6e1e6fe13 100644 --- a/avm/res/network/dns-zone/mx/main.bicep +++ b/avm/res/network/dns-zone/mx/main.bicep @@ -82,7 +82,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/mx/main.json b/avm/res/network/dns-zone/mx/main.json index 46f9775d58..8025b838e3 100644 --- a/avm/res/network/dns-zone/mx/main.json +++ b/avm/res/network/dns-zone/mx/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "12071465969887723634" + "version": "0.23.1.45101", + "templateHash": "7290500674933661124" }, "name": "Public DNS Zone MX record", "description": "This module deploys a Public DNS Zone MX record.", diff --git a/avm/res/network/dns-zone/ns/main.bicep b/avm/res/network/dns-zone/ns/main.bicep index 5a32d93157..bae95154d0 100644 --- a/avm/res/network/dns-zone/ns/main.bicep +++ b/avm/res/network/dns-zone/ns/main.bicep @@ -81,7 +81,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/ns/main.json b/avm/res/network/dns-zone/ns/main.json index 31d668cbbd..632f9a6ada 100644 --- a/avm/res/network/dns-zone/ns/main.json +++ b/avm/res/network/dns-zone/ns/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "7935825339044820950" + "version": "0.23.1.45101", + "templateHash": "1612913715306979831" }, "name": "Public DNS Zone NS record", "description": "This module deploys a Public DNS Zone NS record.", diff --git a/avm/res/network/dns-zone/ptr/main.bicep b/avm/res/network/dns-zone/ptr/main.bicep index a28a7e314f..9c8b10bfe1 100644 --- a/avm/res/network/dns-zone/ptr/main.bicep +++ b/avm/res/network/dns-zone/ptr/main.bicep @@ -82,7 +82,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/ptr/main.json b/avm/res/network/dns-zone/ptr/main.json index 8e5ed34e44..03505a6b39 100644 --- a/avm/res/network/dns-zone/ptr/main.json +++ b/avm/res/network/dns-zone/ptr/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "8624776736573936284" + "version": "0.23.1.45101", + "templateHash": "18439161764270488124" }, "name": "Public DNS Zone PTR record", "description": "This module deploys a Public DNS Zone PTR record.", diff --git a/avm/res/network/dns-zone/soa/main.bicep b/avm/res/network/dns-zone/soa/main.bicep index d1f283cb2e..4aeacac21a 100644 --- a/avm/res/network/dns-zone/soa/main.bicep +++ b/avm/res/network/dns-zone/soa/main.bicep @@ -82,7 +82,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/soa/main.json b/avm/res/network/dns-zone/soa/main.json index 847de90301..90253daac5 100644 --- a/avm/res/network/dns-zone/soa/main.json +++ b/avm/res/network/dns-zone/soa/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "2525485228193651958" + "version": "0.23.1.45101", + "templateHash": "6819223668967518740" }, "name": "Public DNS Zone SOA record", "description": "This module deploys a Public DNS Zone SOA record.", diff --git a/avm/res/network/dns-zone/srv/main.bicep b/avm/res/network/dns-zone/srv/main.bicep index 8668a32f0b..30894ef208 100644 --- a/avm/res/network/dns-zone/srv/main.bicep +++ b/avm/res/network/dns-zone/srv/main.bicep @@ -81,7 +81,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/srv/main.json b/avm/res/network/dns-zone/srv/main.json index 7867ced3b3..bfd298a34a 100644 --- a/avm/res/network/dns-zone/srv/main.json +++ b/avm/res/network/dns-zone/srv/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "5933163301584263263" + "version": "0.23.1.45101", + "templateHash": "534263969679389743" }, "name": "Public DNS Zone SRV record", "description": "This module deploys a Public DNS Zone SRV record.", diff --git a/avm/res/network/dns-zone/txt/main.bicep b/avm/res/network/dns-zone/txt/main.bicep index 6de4531467..382f99677f 100644 --- a/avm/res/network/dns-zone/txt/main.bicep +++ b/avm/res/network/dns-zone/txt/main.bicep @@ -81,7 +81,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/dns-zone/txt/main.json b/avm/res/network/dns-zone/txt/main.json index 66ac1b7bdb..7343be271e 100644 --- a/avm/res/network/dns-zone/txt/main.json +++ b/avm/res/network/dns-zone/txt/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "15650485131518391359" + "version": "0.23.1.45101", + "templateHash": "8365521613212782334" }, "name": "Public DNS Zone TXT record", "description": "This module deploys a Public DNS Zone TXT record.", diff --git a/avm/res/network/dns-zone/version.json b/avm/res/network/dns-zone/version.json index 8def869ede..729ac87673 100644 --- a/avm/res/network/dns-zone/version.json +++ b/avm/res/network/dns-zone/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/network/network-interface/main.bicep b/avm/res/network/network-interface/main.bicep index c41c55ebec..4dd12f1b5d 100644 --- a/avm/res/network/network-interface/main.bicep +++ b/avm/res/network/network-interface/main.bicep @@ -214,7 +214,7 @@ type diagnosticSettingType = { }[]? @description('Optional. A string indicating whether the export to Log Analytics should use the default destination type, i.e. AzureDiagnostics, or use a destination type.') - logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics' | null)? + logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics')? @description('Optional. Resource ID of the diagnostic log analytics workspace. For security reasons, it is recommended to set diagnostic settings to send data to either storage account, log analytics workspace or event hub.') workspaceResourceId: string? @@ -240,7 +240,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/network-interface/main.json b/avm/res/network/network-interface/main.json index 79a29c2023..655dfce3a3 100644 --- a/avm/res/network/network-interface/main.json +++ b/avm/res/network/network-interface/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "10892206856491253667" + "version": "0.23.1.45101", + "templateHash": "4856546754568302519" }, "name": "Network Interface", "description": "This module deploys a Network Interface.", diff --git a/avm/res/network/network-interface/version.json b/avm/res/network/network-interface/version.json index 8def869ede..729ac87673 100644 --- a/avm/res/network/network-interface/version.json +++ b/avm/res/network/network-interface/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/network/private-dns-zone/a/main.bicep b/avm/res/network/private-dns-zone/a/main.bicep index a9713ff49f..dd8179828f 100644 --- a/avm/res/network/private-dns-zone/a/main.bicep +++ b/avm/res/network/private-dns-zone/a/main.bicep @@ -79,7 +79,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/a/main.json b/avm/res/network/private-dns-zone/a/main.json index df2b0f5ecf..e72a4acb2c 100644 --- a/avm/res/network/private-dns-zone/a/main.json +++ b/avm/res/network/private-dns-zone/a/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "5612155887076115903" + "version": "0.23.1.45101", + "templateHash": "3178897665223689126" }, "name": "Private DNS Zone A record", "description": "This module deploys a Private DNS Zone A record.", diff --git a/avm/res/network/private-dns-zone/aaaa/main.bicep b/avm/res/network/private-dns-zone/aaaa/main.bicep index 6b7dd56e55..a280069afb 100644 --- a/avm/res/network/private-dns-zone/aaaa/main.bicep +++ b/avm/res/network/private-dns-zone/aaaa/main.bicep @@ -79,7 +79,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/aaaa/main.json b/avm/res/network/private-dns-zone/aaaa/main.json index fa7b57c29a..ba3df83041 100644 --- a/avm/res/network/private-dns-zone/aaaa/main.json +++ b/avm/res/network/private-dns-zone/aaaa/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "9292720103710124317" + "version": "0.23.1.45101", + "templateHash": "13336554047293852625" }, "name": "Private DNS Zone AAAA record", "description": "This module deploys a Private DNS Zone AAAA record.", diff --git a/avm/res/network/private-dns-zone/cname/main.bicep b/avm/res/network/private-dns-zone/cname/main.bicep index 51dc5924be..bdc34c9128 100644 --- a/avm/res/network/private-dns-zone/cname/main.bicep +++ b/avm/res/network/private-dns-zone/cname/main.bicep @@ -79,7 +79,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/cname/main.json b/avm/res/network/private-dns-zone/cname/main.json index 7bba14c533..0627ed35cc 100644 --- a/avm/res/network/private-dns-zone/cname/main.json +++ b/avm/res/network/private-dns-zone/cname/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "8994659188826492200" + "version": "0.23.1.45101", + "templateHash": "15225042375721382797" }, "name": "Private DNS Zone CNAME record", "description": "This module deploys a Private DNS Zone CNAME record.", diff --git a/avm/res/network/private-dns-zone/main.bicep b/avm/res/network/private-dns-zone/main.bicep index 8acdbf0ab5..87e54bb8c8 100644 --- a/avm/res/network/private-dns-zone/main.bicep +++ b/avm/res/network/private-dns-zone/main.bicep @@ -235,7 +235,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/main.json b/avm/res/network/private-dns-zone/main.json index 1213632a0d..a45a1fe38f 100644 --- a/avm/res/network/private-dns-zone/main.json +++ b/avm/res/network/private-dns-zone/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "16185589732703099389" + "version": "0.23.1.45101", + "templateHash": "17577658862428842934" }, "name": "Private DNS Zones", "description": "This module deploys a Private DNS zone.", @@ -323,8 +323,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "5612155887076115903" + "version": "0.23.1.45101", + "templateHash": "3178897665223689126" }, "name": "Private DNS Zone A record", "description": "This module deploys a Private DNS Zone A record.", @@ -562,8 +562,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "9292720103710124317" + "version": "0.23.1.45101", + "templateHash": "13336554047293852625" }, "name": "Private DNS Zone AAAA record", "description": "This module deploys a Private DNS Zone AAAA record.", @@ -801,8 +801,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "8994659188826492200" + "version": "0.23.1.45101", + "templateHash": "15225042375721382797" }, "name": "Private DNS Zone CNAME record", "description": "This module deploys a Private DNS Zone CNAME record.", @@ -1040,8 +1040,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "7291828223713021559" + "version": "0.23.1.45101", + "templateHash": "15979724882776547112" }, "name": "Private DNS Zone MX record", "description": "This module deploys a Private DNS Zone MX record.", @@ -1279,8 +1279,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "14904442878386197851" + "version": "0.23.1.45101", + "templateHash": "13360561055754827389" }, "name": "Private DNS Zone PTR record", "description": "This module deploys a Private DNS Zone PTR record.", @@ -1518,8 +1518,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "1730811290085898902" + "version": "0.23.1.45101", + "templateHash": "2022546465907048440" }, "name": "Private DNS Zone SOA record", "description": "This module deploys a Private DNS Zone SOA record.", @@ -1757,8 +1757,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "3575656882006054466" + "version": "0.23.1.45101", + "templateHash": "11017781799470369462" }, "name": "Private DNS Zone SRV record", "description": "This module deploys a Private DNS Zone SRV record.", @@ -1996,8 +1996,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "3136035020013914368" + "version": "0.23.1.45101", + "templateHash": "13485919432065481500" }, "name": "Private DNS Zone TXT record", "description": "This module deploys a Private DNS Zone TXT record.", @@ -2235,8 +2235,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "6246010514847269903" + "version": "0.23.1.45101", + "templateHash": "9679510173036585057" }, "name": "Private DNS Zone Virtual Network Link", "description": "This module deploys a Private DNS Zone Virtual Network Link.", diff --git a/avm/res/network/private-dns-zone/mx/main.bicep b/avm/res/network/private-dns-zone/mx/main.bicep index 37906fa8b9..e404b598e1 100644 --- a/avm/res/network/private-dns-zone/mx/main.bicep +++ b/avm/res/network/private-dns-zone/mx/main.bicep @@ -79,7 +79,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/mx/main.json b/avm/res/network/private-dns-zone/mx/main.json index 029c93a397..c0d2834439 100644 --- a/avm/res/network/private-dns-zone/mx/main.json +++ b/avm/res/network/private-dns-zone/mx/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "7291828223713021559" + "version": "0.23.1.45101", + "templateHash": "15979724882776547112" }, "name": "Private DNS Zone MX record", "description": "This module deploys a Private DNS Zone MX record.", diff --git a/avm/res/network/private-dns-zone/ptr/main.bicep b/avm/res/network/private-dns-zone/ptr/main.bicep index 65132f54e2..8caeb1c47e 100644 --- a/avm/res/network/private-dns-zone/ptr/main.bicep +++ b/avm/res/network/private-dns-zone/ptr/main.bicep @@ -79,7 +79,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/ptr/main.json b/avm/res/network/private-dns-zone/ptr/main.json index bae097f7bb..55828119e3 100644 --- a/avm/res/network/private-dns-zone/ptr/main.json +++ b/avm/res/network/private-dns-zone/ptr/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "14904442878386197851" + "version": "0.23.1.45101", + "templateHash": "13360561055754827389" }, "name": "Private DNS Zone PTR record", "description": "This module deploys a Private DNS Zone PTR record.", diff --git a/avm/res/network/private-dns-zone/soa/main.bicep b/avm/res/network/private-dns-zone/soa/main.bicep index 2167f6e8a2..2663f8b1b2 100644 --- a/avm/res/network/private-dns-zone/soa/main.bicep +++ b/avm/res/network/private-dns-zone/soa/main.bicep @@ -79,7 +79,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/soa/main.json b/avm/res/network/private-dns-zone/soa/main.json index 0de8d7903f..9d51f4ee49 100644 --- a/avm/res/network/private-dns-zone/soa/main.json +++ b/avm/res/network/private-dns-zone/soa/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "1730811290085898902" + "version": "0.23.1.45101", + "templateHash": "2022546465907048440" }, "name": "Private DNS Zone SOA record", "description": "This module deploys a Private DNS Zone SOA record.", diff --git a/avm/res/network/private-dns-zone/srv/main.bicep b/avm/res/network/private-dns-zone/srv/main.bicep index 938a983ee1..d8555a7575 100644 --- a/avm/res/network/private-dns-zone/srv/main.bicep +++ b/avm/res/network/private-dns-zone/srv/main.bicep @@ -79,7 +79,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/srv/main.json b/avm/res/network/private-dns-zone/srv/main.json index 7cb731b686..c71d4c3911 100644 --- a/avm/res/network/private-dns-zone/srv/main.json +++ b/avm/res/network/private-dns-zone/srv/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "3575656882006054466" + "version": "0.23.1.45101", + "templateHash": "11017781799470369462" }, "name": "Private DNS Zone SRV record", "description": "This module deploys a Private DNS Zone SRV record.", diff --git a/avm/res/network/private-dns-zone/txt/main.bicep b/avm/res/network/private-dns-zone/txt/main.bicep index bf9090286f..6bbd25cfaa 100644 --- a/avm/res/network/private-dns-zone/txt/main.bicep +++ b/avm/res/network/private-dns-zone/txt/main.bicep @@ -79,7 +79,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? diff --git a/avm/res/network/private-dns-zone/txt/main.json b/avm/res/network/private-dns-zone/txt/main.json index 56734a6b7e..2f28605b56 100644 --- a/avm/res/network/private-dns-zone/txt/main.json +++ b/avm/res/network/private-dns-zone/txt/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "3136035020013914368" + "version": "0.23.1.45101", + "templateHash": "13485919432065481500" }, "name": "Private DNS Zone TXT record", "description": "This module deploys a Private DNS Zone TXT record.", diff --git a/avm/res/network/private-dns-zone/version.json b/avm/res/network/private-dns-zone/version.json index 8def869ede..729ac87673 100644 --- a/avm/res/network/private-dns-zone/version.json +++ b/avm/res/network/private-dns-zone/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file diff --git a/avm/res/network/private-dns-zone/virtual-network-link/main.json b/avm/res/network/private-dns-zone/virtual-network-link/main.json index 86af1c414a..2506403851 100644 --- a/avm/res/network/private-dns-zone/virtual-network-link/main.json +++ b/avm/res/network/private-dns-zone/virtual-network-link/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "6246010514847269903" + "version": "0.23.1.45101", + "templateHash": "9679510173036585057" }, "name": "Private DNS Zone Virtual Network Link", "description": "This module deploys a Private DNS Zone Virtual Network Link.", diff --git a/avm/res/network/public-ip-address/main.bicep b/avm/res/network/public-ip-address/main.bicep index 3f763eb9f4..5c0aa654df 100644 --- a/avm/res/network/public-ip-address/main.bicep +++ b/avm/res/network/public-ip-address/main.bicep @@ -195,7 +195,7 @@ type roleAssignmentType = { principalId: string @description('Optional. The principal type of the assigned principal ID.') - principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device' | null)? + principalType: ('ServicePrincipal' | 'Group' | 'User' | 'ForeignGroup' | 'Device')? @description('Optional. The description of the role assignment.') description: string? @@ -261,7 +261,7 @@ type diagnosticSettingType = { }[]? @description('Optional. A string indicating whether the export to Log Analytics should use the default destination type, i.e. AzureDiagnostics, or use a destination type.') - logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics' | null)? + logAnalyticsDestinationType: ('Dedicated' | 'AzureDiagnostics')? @description('Optional. Resource ID of the diagnostic log analytics workspace. For security reasons, it is recommended to set diagnostic settings to send data to either storage account, log analytics workspace or event hub.') workspaceResourceId: string? diff --git a/avm/res/network/public-ip-address/main.json b/avm/res/network/public-ip-address/main.json index e3f6d10f02..5b941ebfae 100644 --- a/avm/res/network/public-ip-address/main.json +++ b/avm/res/network/public-ip-address/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.22.6.54827", - "templateHash": "4196164240674285199" + "version": "0.23.1.45101", + "templateHash": "11486686724612026983" }, "name": "Public IP Addresses", "description": "This module deploys a Public IP Address.", diff --git a/avm/res/network/public-ip-address/version.json b/avm/res/network/public-ip-address/version.json index 7fa401bdf7..1c035df49f 100644 --- a/avm/res/network/public-ip-address/version.json +++ b/avm/res/network/public-ip-address/version.json @@ -1,7 +1,7 @@ { "$schema": "https://aka.ms/bicep-registry-module-version-file-schema#", - "version": "0.1", + "version": "0.2", "pathFilters": [ "./main.json" ] -} +} \ No newline at end of file