diff --git a/avm/ptn/azd/ml-project/main.json b/avm/ptn/azd/ml-project/main.json index a96f8c419f..0da41559b8 100644 --- a/avm/ptn/azd/ml-project/main.json +++ b/avm/ptn/azd/ml-project/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "17417659473441028736" + "version": "0.32.4.45862", + "templateHash": "8825282270564739482" }, "name": "Azd Machine Learning workspace", "description": "Create a machine learning workspace, configure the key vault access policy and assign role permissions to the machine learning instance.\n\n**Note:** This module is not intended for broad, generic use, as it was designed to cater for the requirements of the AZD CLI product. Feature requests and bug fix requests are welcome if they support the development of the AZD CLI but may not be incorporated if they aim to make this module more generic than what it needs to be for its primary use case.", @@ -167,7 +167,6 @@ ] }, "dependsOn": [ - "keyVault", "project" ] }, diff --git a/avm/ptn/data/private-analytical-workspace/main.json b/avm/ptn/data/private-analytical-workspace/main.json index 78d6897ac2..f5ee896b20 100644 --- a/avm/ptn/data/private-analytical-workspace/main.json +++ b/avm/ptn/data/private-analytical-workspace/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "4437449109602171238" + "version": "0.32.4.45862", + "templateHash": "14522697048784625124" }, "name": "private-analytical-workspace", "description": "This pattern module enables you to use Azure services that are typical for data analytics solutions. The goal is to help data scientists establish an environment for data analysis simply. It is secure by default for enterprise use. Data scientists should not spend much time on how to build infrastructure solution. They should mainly concentrate on the data analytics components they require for the solution.", @@ -518,10 +518,7 @@ "apiVersion": "2023-11-01", "subscriptionId": "[if(variables('createNewVNET'), subscription().id, split(parameters('virtualNetworkResourceId'), '/')[2])]", "resourceGroup": "[if(variables('createNewVNET'), resourceGroup().id, split(parameters('virtualNetworkResourceId'), '/')[4])]", - "name": "[format('{0}/{1}', if(variables('createNewVNET'), 'dummyName', last(split(parameters('virtualNetworkResourceId'), '/'))), coalesce(tryGet(tryGet(parameters('advancedOptions'), 'virtualNetwork'), 'subnetNamePrivateLink'), 'dummyName'))]", - "dependsOn": [ - "vnetExisting" - ] + "name": "[format('{0}/{1}', if(variables('createNewVNET'), 'dummyName', last(split(parameters('virtualNetworkResourceId'), '/'))), coalesce(tryGet(tryGet(parameters('advancedOptions'), 'virtualNetwork'), 'subnetNamePrivateLink'), 'dummyName'))]" }, "vnetExisting::subnetDbwFrontend": { "condition": "[and(not(variables('createNewVNET')), and(parameters('enableDatabricks'), not(empty(tryGet(tryGet(parameters('advancedOptions'), 'databricks'), 'subnetNameFrontend')))))]", @@ -530,10 +527,7 @@ "apiVersion": "2023-11-01", "subscriptionId": "[if(variables('createNewVNET'), subscription().id, split(parameters('virtualNetworkResourceId'), '/')[2])]", "resourceGroup": "[if(variables('createNewVNET'), resourceGroup().id, split(parameters('virtualNetworkResourceId'), '/')[4])]", - "name": "[format('{0}/{1}', if(variables('createNewVNET'), 'dummyName', last(split(parameters('virtualNetworkResourceId'), '/'))), coalesce(tryGet(tryGet(parameters('advancedOptions'), 'databricks'), 'subnetNameFrontend'), 'dummyName'))]", - "dependsOn": [ - "vnetExisting" - ] + "name": "[format('{0}/{1}', if(variables('createNewVNET'), 'dummyName', last(split(parameters('virtualNetworkResourceId'), '/'))), coalesce(tryGet(tryGet(parameters('advancedOptions'), 'databricks'), 'subnetNameFrontend'), 'dummyName'))]" }, "vnetExisting::subnetDbwBackend": { "condition": "[and(not(variables('createNewVNET')), and(parameters('enableDatabricks'), not(empty(tryGet(tryGet(parameters('advancedOptions'), 'databricks'), 'subnetNameBackend')))))]", @@ -542,10 +536,7 @@ "apiVersion": "2023-11-01", "subscriptionId": "[if(variables('createNewVNET'), subscription().id, split(parameters('virtualNetworkResourceId'), '/')[2])]", "resourceGroup": "[if(variables('createNewVNET'), resourceGroup().id, split(parameters('virtualNetworkResourceId'), '/')[4])]", - "name": "[format('{0}/{1}', if(variables('createNewVNET'), 'dummyName', last(split(parameters('virtualNetworkResourceId'), '/'))), coalesce(tryGet(tryGet(parameters('advancedOptions'), 'databricks'), 'subnetNameBackend'), 'dummyName'))]", - "dependsOn": [ - "vnetExisting" - ] + "name": "[format('{0}/{1}', if(variables('createNewVNET'), 'dummyName', last(split(parameters('virtualNetworkResourceId'), '/'))), coalesce(tryGet(tryGet(parameters('advancedOptions'), 'databricks'), 'subnetNameBackend'), 'dummyName'))]" }, "avmTelemetry": { "condition": "[parameters('enableTelemetry')]", diff --git a/avm/ptn/deployment-script/import-image-to-acr/main.json b/avm/ptn/deployment-script/import-image-to-acr/main.json index 72f37ed58c..8a5453c366 100644 --- a/avm/ptn/deployment-script/import-image-to-acr/main.json +++ b/avm/ptn/deployment-script/import-image-to-acr/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "11351051395125066237" + "version": "0.32.4.45862", + "templateHash": "12190996342558658599" }, "name": "import-image-to-acr", "description": "This modules deployes an image to an Azure Container Registry.", @@ -267,8 +267,6 @@ "principalType": "ServicePrincipal" }, "dependsOn": [ - "acr", - "[format('existingManagedIdentities[{0}]', range(0, length(if(parameters('assignRbacRole'), coalesce(tryGet(parameters('managedIdentities'), 'userAssignedResourceIds'), createArray()), createArray())))[copyIndex()])]", "[format('existingManagedIdentities[{0}]', range(0, length(if(parameters('assignRbacRole'), coalesce(tryGet(parameters('managedIdentities'), 'userAssignedResourceIds'), createArray()), createArray())))[copyIndex()])]" ] }, @@ -284,7 +282,6 @@ "principalType": "ServicePrincipal" }, "dependsOn": [ - "acr", "newManagedIdentity" ] }, diff --git a/avm/ptn/finops-toolkit/finops-hub/main.json b/avm/ptn/finops-toolkit/finops-hub/main.json index 3cf86b2d5e..ccef3a4b98 100644 --- a/avm/ptn/finops-toolkit/finops-hub/main.json +++ b/avm/ptn/finops-toolkit/finops-hub/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "2378205016082649078" + "version": "0.32.4.45862", + "templateHash": "9765836891414775937" }, "name": "Finops-hub", "description": "This module deploys a Finops hub from the Finops toolkit.", @@ -210,8 +210,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "4568813132024947706" + "version": "0.32.4.45862", + "templateHash": "5443326911538668556" } }, "parameters": { @@ -291,7 +291,7 @@ } }, "variables": { - "$fxv#0": "Write-Output 'Updating settings.json file...'\nWrite-Output \"Storage account: $env:storageAccountName\"\nWrite-Output \"Container: $env:containerName\"\n\n$validateScopes = { $_.Length -gt 45 }\n\n# Initialize variables\n$fileName = 'settings.json'\n$filePath = Join-Path -Path . -ChildPath $fileName\n$newScopes = $env:exportScopes.Split('|') | Where-Object $validateScopes | ForEach-Object { @{ scope = $_ } }\n\n# Get storage context\n$storageContext = @{\n Context = New-AzStorageContext -StorageAccountName $env:storageAccountName -UseConnectedAccount\n Container = $env:containerName\n}\n\n# Download existing settings, if they exist\n$blob = Get-AzStorageBlobContent @storageContext -Blob $fileName -Destination $filePath -Force\nif ($blob) {\n Write-Output 'Existing settings.json file found. Updating...'\n $text = Get-Content $filePath -Raw\n Write-Output '---------'\n Write-Output $text\n Write-Output '---------'\n $json = $text | ConvertFrom-Json\n\n # Rename exportScopes to scopes + convert to object array\n if ($json.exportScopes) {\n Write-Output ' Updating exportScopes...'\n if ($json.exportScopes[0] -is [string]) {\n Write-Output ' Converting string array to object array...'\n $json.exportScopes = $json.exportScopes | Where-Object $validateScopes | ForEach-Object { @{ scope = $_ } }\n if (-not ($json.exportScopes -is [array])) {\n Write-Output ' Converting single object to object array...'\n $json.exportScopes = @($json.exportScopes)\n }\n }\n\n Write-Output \" Renaming to 'scopes'...\"\n $json | Add-Member -MemberType NoteProperty -Name scopes -Value $json.exportScopes\n $json.PSObject.Properties.Remove('exportScopes')\n }\n}\n\n# Set default if not found\nif (!$json) {\n Write-Output 'No existing settings.json file found. Creating new file...'\n $json = [ordered]@{\n '$schema' = 'https://aka.ms/finops/hubs/settings-schema'\n type = 'HubInstance'\n version = ''\n learnMore = 'https://aka.ms/finops/hubs'\n scopes = @()\n }\n}\n\n# Updating settings\nWrite-Output \"Updating version to $env:ftkVersion...\"\n$json.version = $env:ftkVersion\nif ($newScopes) {\n Write-Output \"Merging $($newScopes.Count) scopes...\"\n $json.scopes = Compare-Object -ReferenceObject $json.scopes -DifferenceObject $newScopes -Property scope -PassThru -IncludeEqual\n\n # Remove the SideIndicator property from the Compare-Object output\n $json.scopes | ForEach-Object { $_.PSObject.Properties.Remove('SideIndicator') } | ConvertTo-Json\n\n if (-not ($json.scopes -is [array])) {\n $json.scopes = @($json.scopes)\n }\n Write-Output \"$($json.scopes.Count) scopes found.\"\n}\n$text = $json | ConvertTo-Json\nWrite-Output '---------'\nWrite-Output $text\nWrite-Output '---------'\n$text | Out-File $filePath\n\n# Upload new/updated settings\nWrite-Output 'Uploading settings.json file...'\nSet-AzStorageBlobContent @storageContext -File $filePath -Force\n" + "$fxv#0": "Write-Output 'Updating settings.json file...'\r\nWrite-Output \"Storage account: $env:storageAccountName\"\r\nWrite-Output \"Container: $env:containerName\"\r\n\r\n$validateScopes = { $_.Length -gt 45 }\r\n\r\n# Initialize variables\r\n$fileName = 'settings.json'\r\n$filePath = Join-Path -Path . -ChildPath $fileName\r\n$newScopes = $env:exportScopes.Split('|') | Where-Object $validateScopes | ForEach-Object { @{ scope = $_ } }\r\n\r\n# Get storage context\r\n$storageContext = @{\r\n Context = New-AzStorageContext -StorageAccountName $env:storageAccountName -UseConnectedAccount\r\n Container = $env:containerName\r\n}\r\n\r\n# Download existing settings, if they exist\r\n$blob = Get-AzStorageBlobContent @storageContext -Blob $fileName -Destination $filePath -Force\r\nif ($blob) {\r\n Write-Output 'Existing settings.json file found. Updating...'\r\n $text = Get-Content $filePath -Raw\r\n Write-Output '---------'\r\n Write-Output $text\r\n Write-Output '---------'\r\n $json = $text | ConvertFrom-Json\r\n\r\n # Rename exportScopes to scopes + convert to object array\r\n if ($json.exportScopes) {\r\n Write-Output ' Updating exportScopes...'\r\n if ($json.exportScopes[0] -is [string]) {\r\n Write-Output ' Converting string array to object array...'\r\n $json.exportScopes = $json.exportScopes | Where-Object $validateScopes | ForEach-Object { @{ scope = $_ } }\r\n if (-not ($json.exportScopes -is [array])) {\r\n Write-Output ' Converting single object to object array...'\r\n $json.exportScopes = @($json.exportScopes)\r\n }\r\n }\r\n\r\n Write-Output \" Renaming to 'scopes'...\"\r\n $json | Add-Member -MemberType NoteProperty -Name scopes -Value $json.exportScopes\r\n $json.PSObject.Properties.Remove('exportScopes')\r\n }\r\n}\r\n\r\n# Set default if not found\r\nif (!$json) {\r\n Write-Output 'No existing settings.json file found. Creating new file...'\r\n $json = [ordered]@{\r\n '$schema' = 'https://aka.ms/finops/hubs/settings-schema'\r\n type = 'HubInstance'\r\n version = ''\r\n learnMore = 'https://aka.ms/finops/hubs'\r\n scopes = @()\r\n }\r\n}\r\n\r\n# Updating settings\r\nWrite-Output \"Updating version to $env:ftkVersion...\"\r\n$json.version = $env:ftkVersion\r\nif ($newScopes) {\r\n Write-Output \"Merging $($newScopes.Count) scopes...\"\r\n $json.scopes = Compare-Object -ReferenceObject $json.scopes -DifferenceObject $newScopes -Property scope -PassThru -IncludeEqual\r\n\r\n # Remove the SideIndicator property from the Compare-Object output\r\n $json.scopes | ForEach-Object { $_.PSObject.Properties.Remove('SideIndicator') } | ConvertTo-Json\r\n\r\n if (-not ($json.scopes -is [array])) {\r\n $json.scopes = @($json.scopes)\r\n }\r\n Write-Output \"$($json.scopes.Count) scopes found.\"\r\n}\r\n$text = $json | ConvertTo-Json\r\nWrite-Output '---------'\r\nWrite-Output $text\r\nWrite-Output '---------'\r\n$text | Out-File $filePath\r\n\r\n# Upload new/updated settings\r\nWrite-Output 'Uploading settings.json file...'\r\nSet-AzStorageBlobContent @storageContext -File $filePath -Force\r\n" }, "resources": { "identity": { @@ -5614,8 +5614,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17793535838056076246" + "version": "0.32.4.45862", + "templateHash": "7347977327687469887" } }, "parameters": { @@ -5699,9 +5699,9 @@ } } ], - "$fxv#0": "# Init outputs\n$DeploymentScriptOutputs = @{}\n\n$adfParams = @{\n ResourceGroupName = $env:DataFactoryResourceGroup\n DataFactoryName = $env:DataFactoryName\n}\n\n# Delete old triggers\n$triggers = Get-AzDataFactoryV2Trigger @adfParams -ErrorAction SilentlyContinue `\n| Where-Object { $_.Name -match '^msexports?$' }\n$DeploymentScriptOutputs['stopTriggers'] = $triggers | Stop-AzDataFactoryV2Trigger -Force -ErrorAction SilentlyContinue\n$DeploymentScriptOutputs['deleteTriggers'] = $triggers | Remove-AzDataFactoryV2Trigger -Force -ErrorAction SilentlyContinue\n\n# Delete old pipelines\n$DeploymentScriptOutputs['pipelines'] = Get-AzDataFactoryV2Pipeline @adfParams -ErrorAction SilentlyContinue `\n| Where-Object { $_.Name -match '^msexports_(extract|transform)$' } `\n| Remove-AzDataFactoryV2Pipeline -Force -ErrorAction SilentlyContinue\n", - "$fxv#1": "Param(\n [switch] $Stop\n)\n# Init outputs\n$DeploymentScriptOutputs = @{}\n\nif (-not $Stop) {\n Start-Sleep -Seconds 10\n}\n\n# Loop through triggers\n$env:Triggers.Split('|') `\n| ForEach-Object {\n $trigger = $_\n if ($Stop) {\n Write-Host \"Stopping trigger $trigger...\" -NoNewline\n $triggerOutput = Stop-AzDataFactoryV2Trigger `\n -ResourceGroupName $env:DataFactoryResourceGroup `\n -DataFactoryName $env:DataFactoryName `\n -Name $trigger `\n -Force `\n -ErrorAction SilentlyContinue\n } else {\n Write-Host \"Starting trigger $trigger...\" -NoNewline\n $triggerOutput = Start-AzDataFactoryV2Trigger `\n -ResourceGroupName $env:DataFactoryResourceGroup `\n -DataFactoryName $env:DataFactoryName `\n -Name $trigger `\n -Force\n }\n if ($triggerOutput) {\n Write-Host 'done'\n } else {\n Write-Host 'failed'\n }\n $DeploymentScriptOutputs[$trigger] = $triggerOutput\n}\n\nif ($Stop) {\n Start-Sleep -Seconds 10\n}\n", - "$fxv#2": "Param(\n [switch] $Stop\n)\n# Init outputs\n$DeploymentScriptOutputs = @{}\n\nif (-not $Stop) {\n Start-Sleep -Seconds 10\n}\n\n# Loop through triggers\n$env:Triggers.Split('|') `\n| ForEach-Object {\n $trigger = $_\n if ($Stop) {\n Write-Host \"Stopping trigger $trigger...\" -NoNewline\n $triggerOutput = Stop-AzDataFactoryV2Trigger `\n -ResourceGroupName $env:DataFactoryResourceGroup `\n -DataFactoryName $env:DataFactoryName `\n -Name $trigger `\n -Force `\n -ErrorAction SilentlyContinue\n } else {\n Write-Host \"Starting trigger $trigger...\" -NoNewline\n $triggerOutput = Start-AzDataFactoryV2Trigger `\n -ResourceGroupName $env:DataFactoryResourceGroup `\n -DataFactoryName $env:DataFactoryName `\n -Name $trigger `\n -Force\n }\n if ($triggerOutput) {\n Write-Host 'done'\n } else {\n Write-Host 'failed'\n }\n $DeploymentScriptOutputs[$trigger] = $triggerOutput\n}\n\nif ($Stop) {\n Start-Sleep -Seconds 10\n}\n", + "$fxv#0": "# Init outputs\r\n$DeploymentScriptOutputs = @{}\r\n\r\n$adfParams = @{\r\n ResourceGroupName = $env:DataFactoryResourceGroup\r\n DataFactoryName = $env:DataFactoryName\r\n}\r\n\r\n# Delete old triggers\r\n$triggers = Get-AzDataFactoryV2Trigger @adfParams -ErrorAction SilentlyContinue `\r\n| Where-Object { $_.Name -match '^msexports?$' }\r\n$DeploymentScriptOutputs['stopTriggers'] = $triggers | Stop-AzDataFactoryV2Trigger -Force -ErrorAction SilentlyContinue\r\n$DeploymentScriptOutputs['deleteTriggers'] = $triggers | Remove-AzDataFactoryV2Trigger -Force -ErrorAction SilentlyContinue\r\n\r\n# Delete old pipelines\r\n$DeploymentScriptOutputs['pipelines'] = Get-AzDataFactoryV2Pipeline @adfParams -ErrorAction SilentlyContinue `\r\n| Where-Object { $_.Name -match '^msexports_(extract|transform)$' } `\r\n| Remove-AzDataFactoryV2Pipeline -Force -ErrorAction SilentlyContinue\r\n", + "$fxv#1": "Param(\r\n [switch] $Stop\r\n)\r\n# Init outputs\r\n$DeploymentScriptOutputs = @{}\r\n\r\nif (-not $Stop) {\r\n Start-Sleep -Seconds 10\r\n}\r\n\r\n# Loop through triggers\r\n$env:Triggers.Split('|') `\r\n| ForEach-Object {\r\n $trigger = $_\r\n if ($Stop) {\r\n Write-Host \"Stopping trigger $trigger...\" -NoNewline\r\n $triggerOutput = Stop-AzDataFactoryV2Trigger `\r\n -ResourceGroupName $env:DataFactoryResourceGroup `\r\n -DataFactoryName $env:DataFactoryName `\r\n -Name $trigger `\r\n -Force `\r\n -ErrorAction SilentlyContinue\r\n } else {\r\n Write-Host \"Starting trigger $trigger...\" -NoNewline\r\n $triggerOutput = Start-AzDataFactoryV2Trigger `\r\n -ResourceGroupName $env:DataFactoryResourceGroup `\r\n -DataFactoryName $env:DataFactoryName `\r\n -Name $trigger `\r\n -Force\r\n }\r\n if ($triggerOutput) {\r\n Write-Host 'done'\r\n } else {\r\n Write-Host 'failed'\r\n }\r\n $DeploymentScriptOutputs[$trigger] = $triggerOutput\r\n}\r\n\r\nif ($Stop) {\r\n Start-Sleep -Seconds 10\r\n}\r\n", + "$fxv#2": "Param(\r\n [switch] $Stop\r\n)\r\n# Init outputs\r\n$DeploymentScriptOutputs = @{}\r\n\r\nif (-not $Stop) {\r\n Start-Sleep -Seconds 10\r\n}\r\n\r\n# Loop through triggers\r\n$env:Triggers.Split('|') `\r\n| ForEach-Object {\r\n $trigger = $_\r\n if ($Stop) {\r\n Write-Host \"Stopping trigger $trigger...\" -NoNewline\r\n $triggerOutput = Stop-AzDataFactoryV2Trigger `\r\n -ResourceGroupName $env:DataFactoryResourceGroup `\r\n -DataFactoryName $env:DataFactoryName `\r\n -Name $trigger `\r\n -Force `\r\n -ErrorAction SilentlyContinue\r\n } else {\r\n Write-Host \"Starting trigger $trigger...\" -NoNewline\r\n $triggerOutput = Start-AzDataFactoryV2Trigger `\r\n -ResourceGroupName $env:DataFactoryResourceGroup `\r\n -DataFactoryName $env:DataFactoryName `\r\n -Name $trigger `\r\n -Force\r\n }\r\n if ($triggerOutput) {\r\n Write-Host 'done'\r\n } else {\r\n Write-Host 'failed'\r\n }\r\n $DeploymentScriptOutputs[$trigger] = $triggerOutput\r\n}\r\n\r\nif ($Stop) {\r\n Start-Sleep -Seconds 10\r\n}\r\n", "datasetPropsDelimitedText": { "columnDelimiter": ",", "compressionLevel": "Optimal", @@ -6140,7 +6140,6 @@ "principalType": "ServicePrincipal" }, "dependsOn": [ - "dataFactory", "identity" ] }, @@ -6163,7 +6162,6 @@ } }, "dependsOn": [ - "dataFactory", "keyVault" ] }, @@ -6188,7 +6186,6 @@ } }, "dependsOn": [ - "dataFactory", "linkedService_keyVault", "storageAccount" ] @@ -6216,7 +6213,6 @@ } }, "dependsOn": [ - "dataFactory", "linkedService_keyVault", "linkedService_storageAccount" ] @@ -6244,7 +6240,6 @@ } }, "dependsOn": [ - "dataFactory", "linkedService_keyVault", "linkedService_storageAccount" ] @@ -6285,10 +6280,8 @@ } }, "dependsOn": [ - "dataFactory", "pipeline_ExecuteETL", - "stopHubTriggers", - "storageAccount" + "stopHubTriggers" ] }, "pipeline_ExecuteETL": { @@ -6332,7 +6325,6 @@ "annotations": [] }, "dependsOn": [ - "dataFactory", "pipeline_msexports_ETL_ingestion" ] }, @@ -6667,7 +6659,6 @@ "annotations": [] }, "dependsOn": [ - "dataFactory", "dataset_ingestion", "dataset_msexports" ] @@ -7210,7 +7201,6 @@ } }, "dependsOn": [ - "dataFactory", "identity", "identityRoleAssignments" ] @@ -7760,7 +7750,6 @@ } }, "dependsOn": [ - "dataFactory", "identity", "identityRoleAssignments" ] @@ -8307,7 +8296,6 @@ } }, "dependsOn": [ - "dataFactory", "identity", "identityRoleAssignments", "trigger_msexports_FileAdded" @@ -8386,8 +8374,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "2016642433151139575" + "version": "0.32.4.45862", + "templateHash": "4828414419580547531" } }, "parameters": { @@ -10969,10 +10957,7 @@ } } } - }, - "dependsOn": [ - "storageRef" - ] + } } }, "outputs": { diff --git a/avm/ptn/network/hub-networking/main.json b/avm/ptn/network/hub-networking/main.json index 3c536e1b8f..372dbf5f01 100644 --- a/avm/ptn/network/hub-networking/main.json +++ b/avm/ptn/network/hub-networking/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3094748618491851368" + "version": "0.32.4.45862", + "templateHash": "2451390268367753375" }, "name": "Hub Networking", "description": "This module is designed to simplify the creation of multi-region hub networks in Azure. It will create a number of virtual networks and subnets, and optionally peer them together in a mesh topology with routing.", @@ -703,8 +703,6 @@ }, "dependsOn": [ "hubVirtualNetwork", - "[format('hubVirtualNetworkPeer_local[{0}]', copyIndex())]", - "[format('hubVirtualNetworkPeer_local[{0}]', copyIndex())]", "[format('hubVirtualNetworkPeer_remote[{0}]', copyIndex())]" ] }, @@ -723,8 +721,6 @@ }, "dependsOn": [ "[format('hubAzureFirewall[{0}]', copyIndex())]", - "[format('hubVirtualNetworkPeer_local[{0}]', copyIndex())]", - "[format('hubVirtualNetworkPeer_local[{0}]', copyIndex())]", "[format('hubVirtualNetworkPeer_remote[{0}]', copyIndex())]", "hubVirtualNetworkPeering" ] @@ -2345,8 +2341,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "5407453106862679302" + "version": "0.32.4.45862", + "templateHash": "4177030311595855308" }, "name": "Virtual Networks", "description": "This module deploys a Virtual Network.", @@ -6473,8 +6469,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "16076301727176806098" + "version": "0.32.4.45862", + "templateHash": "1933725775015836334" }, "name": "Existing Virtual Network Subnets", "description": "This module retrieves an existing Virtual Network Subnet.", @@ -6556,8 +6552,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3114934486774261221" + "version": "0.32.4.45862", + "templateHash": "8143181163953716366" }, "name": "Virtual Network Subnets", "description": "This module deploys a Virtual Network Subnet.", @@ -6792,10 +6788,7 @@ "applicationGatewayIPConfigurations": "[parameters('applicationGatewayIPConfigurations')]", "ipAllocations": "[parameters('ipAllocations')]", "serviceEndpointPolicies": "[parameters('serviceEndpointPolicies')]" - }, - "dependsOn": [ - "virtualNetwork" - ] + } }, "subnet_roleAssignments": { "copy": { diff --git a/avm/res/batch/batch-account/main.json b/avm/res/batch/batch-account/main.json index fa12259d09..3ada86a30c 100644 --- a/avm/res/batch/batch-account/main.json +++ b/avm/res/batch/batch-account/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "9326027237179724855" + "version": "0.32.4.45862", + "templateHash": "2704459100274899670" }, "name": "Batch Accounts", "description": "This module deploys a Batch Account.", @@ -723,10 +723,7 @@ "apiVersion": "2023-02-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "avmTelemetry": { "condition": "[parameters('enableTelemetry')]", @@ -788,7 +785,7 @@ }, "dependsOn": [ "batchKeyVaultReference", - "cMKKeyVault" + "cMKKeyVault::cMKKey" ] }, "batchAccount_lock": { diff --git a/avm/res/communication/email-service/domain/main.json b/avm/res/communication/email-service/domain/main.json index 77358725a6..bf03872d23 100644 --- a/avm/res/communication/email-service/domain/main.json +++ b/avm/res/communication/email-service/domain/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "8505145703963186641" + "version": "0.32.4.45862", + "templateHash": "13257581356656266104" }, "name": "Email Services Domains", "description": "This module deploys an Email Service Domain", @@ -216,10 +216,7 @@ "properties": { "domainManagement": "[parameters('domainManagement')]", "userEngagementTracking": "[parameters('userEngagementTracking')]" - }, - "dependsOn": [ - "emailService" - ] + } }, "domain_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -293,8 +290,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "13801162652865106188" + "version": "0.32.4.45862", + "templateHash": "15079268999081259084" }, "name": "Sender Usernames", "description": "This module deploys an Sender", @@ -370,8 +367,7 @@ } }, "dependsOn": [ - "domain", - "emailService" + "domain" ] } }, diff --git a/avm/res/communication/email-service/domain/sender-username/main.json b/avm/res/communication/email-service/domain/sender-username/main.json index 09d9805b15..4bd2abdca6 100644 --- a/avm/res/communication/email-service/domain/sender-username/main.json +++ b/avm/res/communication/email-service/domain/sender-username/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "13801162652865106188" + "version": "0.32.4.45862", + "templateHash": "15079268999081259084" }, "name": "Sender Usernames", "description": "This module deploys an Sender", diff --git a/avm/res/communication/email-service/main.json b/avm/res/communication/email-service/main.json index 086ffffd7b..a5975852f4 100644 --- a/avm/res/communication/email-service/main.json +++ b/avm/res/communication/email-service/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "8014779167577667866" + "version": "0.32.4.45862", + "templateHash": "14150480546717020778" }, "name": "Email Services", "description": "This module deploys an Email Service", @@ -300,8 +300,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "8505145703963186641" + "version": "0.32.4.45862", + "templateHash": "13257581356656266104" }, "name": "Email Services Domains", "description": "This module deploys an Email Service Domain", @@ -511,10 +511,7 @@ "properties": { "domainManagement": "[parameters('domainManagement')]", "userEngagementTracking": "[parameters('userEngagementTracking')]" - }, - "dependsOn": [ - "emailService" - ] + } }, "domain_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -588,8 +585,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "13801162652865106188" + "version": "0.32.4.45862", + "templateHash": "15079268999081259084" }, "name": "Sender Usernames", "description": "This module deploys an Sender", @@ -665,8 +662,7 @@ } }, "dependsOn": [ - "domain", - "emailService" + "domain" ] } }, diff --git a/avm/res/compute/disk-encryption-set/main.json b/avm/res/compute/disk-encryption-set/main.json index 2aca7e0108..d6f9728c23 100644 --- a/avm/res/compute/disk-encryption-set/main.json +++ b/avm/res/compute/disk-encryption-set/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "8183595108547103937" + "version": "0.32.4.45862", + "templateHash": "8601235787008524496" }, "name": "Disk Encryption Sets", "description": "This module deploys a Disk Encryption Set. The module will attempt to set permissions on the provided Key Vault for any used user-assigned identity.", @@ -258,10 +258,7 @@ "apiVersion": "2021-10-01", "subscriptionId": "[split(parameters('keyVaultResourceId'), '/')[2]]", "resourceGroup": "[split(parameters('keyVaultResourceId'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(parameters('keyVaultResourceId'), '/')), parameters('keyName'))]", - "dependsOn": [ - "keyVault" - ] + "name": "[format('{0}/{1}', last(split(parameters('keyVaultResourceId'), '/')), parameters('keyName'))]" }, "avmTelemetry": { "condition": "[parameters('enableTelemetry')]", @@ -310,7 +307,7 @@ "rotationToLatestKeyVersionEnabled": "[parameters('rotationToLatestKeyVersionEnabled')]" }, "dependsOn": [ - "keyVault", + "keyVault::key", "keyVaultPermissions" ] }, @@ -388,8 +385,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "7332173426743050645" + "version": "0.32.4.45862", + "templateHash": "12513975041606321751" } }, "parameters": { @@ -476,8 +473,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "11254343639333423548" + "version": "0.32.4.45862", + "templateHash": "1955756120806412580" }, "name": "Key Vault Access Policies", "description": "This module deploys a Key Vault Access Policy.", @@ -658,10 +655,7 @@ "name": "[format('{0}/{1}', parameters('keyVaultName'), 'add')]", "properties": { "accessPolicies": "[variables('formattedAccessPolicies')]" - }, - "dependsOn": [ - "keyVault" - ] + } } }, "outputs": { diff --git a/avm/res/compute/gallery/application/main.json b/avm/res/compute/gallery/application/main.json index 40a581919c..57a6e3bf23 100644 --- a/avm/res/compute/gallery/application/main.json +++ b/avm/res/compute/gallery/application/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "11162019331609283814" + "version": "0.32.4.45862", + "templateHash": "4306934588544765678" }, "name": "Compute Galleries Applications", "description": "This module deploys an Azure Compute Gallery Application.", @@ -299,10 +299,7 @@ "privacyStatementUri": "[parameters('privacyStatementUri')]", "releaseNoteUri": "[parameters('releaseNoteUri')]", "supportedOSType": "[parameters('supportedOSType')]" - }, - "dependsOn": [ - "gallery" - ] + } }, "application_roleAssignments": { "copy": { diff --git a/avm/res/compute/gallery/image/main.json b/avm/res/compute/gallery/image/main.json index 2f2e76b96f..dc7f0244ff 100644 --- a/avm/res/compute/gallery/image/main.json +++ b/avm/res/compute/gallery/image/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "14463616698185324661" + "version": "0.32.4.45862", + "templateHash": "6427866343651026352" }, "name": "Compute Galleries Image Definitions", "description": "This module deploys an Azure Compute Gallery Image Definition.", @@ -417,10 +417,7 @@ "memory": "[parameters('memory')]" }, "releaseNoteUri": "[parameters('releaseNoteUri')]" - }, - "dependsOn": [ - "gallery" - ] + } }, "image_roleAssignments": { "copy": { diff --git a/avm/res/compute/gallery/main.json b/avm/res/compute/gallery/main.json index 1ca4ab8293..ca51aab242 100644 --- a/avm/res/compute/gallery/main.json +++ b/avm/res/compute/gallery/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "13069593327789090653" + "version": "0.32.4.45862", + "templateHash": "14986245916786870273" }, "name": "Azure Compute Galleries", "description": "This module deploys an Azure Compute Gallery (formerly known as Shared Image Gallery).", @@ -758,8 +758,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "11162019331609283814" + "version": "0.32.4.45862", + "templateHash": "4306934588544765678" }, "name": "Compute Galleries Applications", "description": "This module deploys an Azure Compute Gallery Application.", @@ -1052,10 +1052,7 @@ "privacyStatementUri": "[parameters('privacyStatementUri')]", "releaseNoteUri": "[parameters('releaseNoteUri')]", "supportedOSType": "[parameters('supportedOSType')]" - }, - "dependsOn": [ - "gallery" - ] + } }, "application_roleAssignments": { "copy": { @@ -1206,8 +1203,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "14463616698185324661" + "version": "0.32.4.45862", + "templateHash": "6427866343651026352" }, "name": "Compute Galleries Image Definitions", "description": "This module deploys an Azure Compute Gallery Image Definition.", @@ -1618,10 +1615,7 @@ "memory": "[parameters('memory')]" }, "releaseNoteUri": "[parameters('releaseNoteUri')]" - }, - "dependsOn": [ - "gallery" - ] + } }, "image_roleAssignments": { "copy": { diff --git a/avm/res/compute/image/main.json b/avm/res/compute/image/main.json index 23474de449..35af750f8f 100644 --- a/avm/res/compute/image/main.json +++ b/avm/res/compute/image/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "2070352454044907203" + "version": "0.32.4.45862", + "templateHash": "5852863975337426972" }, "name": "Images", "description": "This module deploys a Compute Image.", diff --git a/avm/res/container-instance/container-group/main.json b/avm/res/container-instance/container-group/main.json index 956400eff9..2f710064e7 100644 --- a/avm/res/container-instance/container-group/main.json +++ b/avm/res/container-instance/container-group/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "16278061396561058580" + "version": "0.32.4.45862", + "templateHash": "10455329917126813819" }, "name": "Container Instances Container Groups", "description": "This module deploys a Container Instance Container Group.", @@ -665,10 +665,7 @@ "apiVersion": "2023-02-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "avmTelemetry": { "condition": "[parameters('enableTelemetry')]", @@ -717,8 +714,8 @@ "tags": "[parameters('tags')]", "properties": "[union(createObject('containers', parameters('containers'), 'encryptionProperties', if(not(empty(parameters('customerManagedKey'))), createObject('identity', if(not(empty(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), ''))), extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), '//'), '/')[2], split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), '////'), '/')[4]), 'Microsoft.ManagedIdentity/userAssignedIdentities', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), 'dummyMsi'), '/'))), null()), 'keyName', parameters('customerManagedKey').keyName, 'keyVersion', if(not(empty(coalesce(tryGet(parameters('customerManagedKey'), 'keyVersion'), ''))), parameters('customerManagedKey').keyVersion, if(coalesce(tryGet(parameters('customerManagedKey'), 'autoRotationEnabled'), true()), null(), last(split(reference('cMKKeyVault::cMKKey').keyUriWithVersion, '/')))), 'vaultBaseUrl', reference('cMKKeyVault').vaultUri), null()), 'imageRegistryCredentials', parameters('imageRegistryCredentials'), 'initContainers', parameters('initContainers'), 'restartPolicy', parameters('restartPolicy'), 'osType', parameters('osType'), 'ipAddress', createObject('type', parameters('ipAddressType'), 'autoGeneratedDomainNameLabelScope', if(not(empty(parameters('dnsNameServers'))), parameters('autoGeneratedDomainNameLabelScope'), null()), 'dnsNameLabel', parameters('dnsNameLabel'), 'ports', parameters('ipAddressPorts')), 'sku', parameters('sku'), 'subnetIds', if(not(empty(parameters('subnetResourceId'))), createArray(createObject('id', parameters('subnetResourceId'))), null()), 'volumes', parameters('volumes')), if(not(empty(parameters('dnsNameServers'))), createObject('dnsConfig', createObject('nameServers', parameters('dnsNameServers'), 'searchDomains', parameters('dnsSearchDomains'))), createObject()))]", "dependsOn": [ - "cMKKeyVault", - "cMKUserAssignedIdentity" + "cMKKeyVault::cMKKey", + "cMKKeyVault" ] }, "containergroup_lock": { diff --git a/avm/res/container-registry/registry/cache-rule/main.json b/avm/res/container-registry/registry/cache-rule/main.json index 4635d8cb66..4e88f8e07b 100644 --- a/avm/res/container-registry/registry/cache-rule/main.json +++ b/avm/res/container-registry/registry/cache-rule/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.3.12046", - "templateHash": "17205938486061573561" + "version": "0.32.4.45862", + "templateHash": "14613404195108533908" }, "name": "Container Registries Cache", "description": "Cache for Azure Container Registry (Preview) feature allows users to cache container images in a private container registry. Cache for ACR, is a preview feature available in Basic, Standard, and Premium service tiers ([ref](https://learn.microsoft.com/en-us/azure/container-registry/tutorial-registry-cache)).", diff --git a/avm/res/container-registry/registry/credential-set/main.json b/avm/res/container-registry/registry/credential-set/main.json index 1b1f243390..08f8cf3486 100644 --- a/avm/res/container-registry/registry/credential-set/main.json +++ b/avm/res/container-registry/registry/credential-set/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.3.12046", - "templateHash": "13281764602355848660" + "version": "0.32.4.45862", + "templateHash": "13759527494082170327" }, "name": "Container Registries Credential Sets", "description": "This module deploys an ACR Credential Set.", @@ -102,10 +102,7 @@ "properties": { "authCredentials": "[parameters('authCredentials')]", "loginServer": "[parameters('loginServer')]" - }, - "dependsOn": [ - "registry" - ] + } } }, "outputs": { diff --git a/avm/res/container-registry/registry/main.json b/avm/res/container-registry/registry/main.json index 5e42d035ac..0d58f8e35c 100644 --- a/avm/res/container-registry/registry/main.json +++ b/avm/res/container-registry/registry/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "2277340268999354626" + "version": "0.32.4.45862", + "templateHash": "6946860018452981899" }, "name": "Azure Container Registries (ACR)", "description": "This module deploys an Azure Container Registry (ACR).", @@ -836,10 +836,7 @@ "apiVersion": "2023-02-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "avmTelemetry": { "condition": "[parameters('enableTelemetry')]", @@ -913,7 +910,7 @@ "zoneRedundancy": "[if(equals(parameters('acrSku'), 'Premium'), parameters('zoneRedundancy'), null())]" }, "dependsOn": [ - "cMKKeyVault", + "cMKKeyVault::cMKKey", "cMKUserAssignedIdentity" ] }, @@ -1028,8 +1025,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "17963190751439748514" + "version": "0.32.4.45862", + "templateHash": "6478760541409131297" }, "name": "Container Registries scopeMaps", "description": "This module deploys an Azure Container Registry (ACR) scopeMap.", @@ -1080,10 +1077,7 @@ "properties": { "actions": "[parameters('actions')]", "description": "[parameters('description')]" - }, - "dependsOn": [ - "registry" - ] + } } }, "outputs": { @@ -1155,8 +1149,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "4997004041066797666" + "version": "0.32.4.45862", + "templateHash": "15524157492175197471" }, "name": "Azure Container Registry (ACR) Replications", "description": "This module deploys an Azure Container Registry (ACR) Replication.", @@ -1224,10 +1218,7 @@ "properties": { "regionEndpointEnabled": "[parameters('regionEndpointEnabled')]", "zoneRedundancy": "[parameters('zoneRedundancy')]" - }, - "dependsOn": [ - "registry" - ] + } } }, "outputs": { @@ -1303,8 +1294,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "7759513970094711275" + "version": "0.32.4.45862", + "templateHash": "13759527494082170327" }, "name": "Container Registries Credential Sets", "description": "This module deploys an ACR Credential Set.", @@ -1400,10 +1391,7 @@ "properties": { "authCredentials": "[parameters('authCredentials')]", "loginServer": "[parameters('loginServer')]" - }, - "dependsOn": [ - "registry" - ] + } } }, "outputs": { @@ -1478,8 +1466,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "1396902957012921251" + "version": "0.32.4.45862", + "templateHash": "14613404195108533908" }, "name": "Container Registries Cache", "description": "Cache for Azure Container Registry (Preview) feature allows users to cache container images in a private container registry. Cache for ACR, is a preview feature available in Basic, Standard, and Premium service tiers ([ref](https://learn.microsoft.com/en-us/azure/container-registry/tutorial-registry-cache)).", @@ -1610,8 +1598,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "10216591470402784498" + "version": "0.32.4.45862", + "templateHash": "7106022181114238286" }, "name": "Azure Container Registry (ACR) Webhooks", "description": "This module deploys an Azure Container Registry (ACR) Webhook.", @@ -1711,10 +1699,7 @@ "scope": "[parameters('scope')]", "serviceUri": "[parameters('serviceUri')]", "status": "[parameters('status')]" - }, - "dependsOn": [ - "registry" - ] + } } }, "outputs": { diff --git a/avm/res/container-registry/registry/replication/main.json b/avm/res/container-registry/registry/replication/main.json index beca1e3cec..eea9088835 100644 --- a/avm/res/container-registry/registry/replication/main.json +++ b/avm/res/container-registry/registry/replication/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.3.12046", - "templateHash": "11507205381257602922" + "version": "0.32.4.45862", + "templateHash": "15524157492175197471" }, "name": "Azure Container Registry (ACR) Replications", "description": "This module deploys an Azure Container Registry (ACR) Replication.", @@ -74,10 +74,7 @@ "properties": { "regionEndpointEnabled": "[parameters('regionEndpointEnabled')]", "zoneRedundancy": "[parameters('zoneRedundancy')]" - }, - "dependsOn": [ - "registry" - ] + } } }, "outputs": { diff --git a/avm/res/container-registry/registry/scope-map/main.json b/avm/res/container-registry/registry/scope-map/main.json index c19212c9a3..bd72e0b34a 100644 --- a/avm/res/container-registry/registry/scope-map/main.json +++ b/avm/res/container-registry/registry/scope-map/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.3.12046", - "templateHash": "17045733538280748766" + "version": "0.32.4.45862", + "templateHash": "6478760541409131297" }, "name": "Container Registries scopeMaps", "description": "This module deploys an Azure Container Registry (ACR) scopeMap.", @@ -57,10 +57,7 @@ "properties": { "actions": "[parameters('actions')]", "description": "[parameters('description')]" - }, - "dependsOn": [ - "registry" - ] + } } }, "outputs": { diff --git a/avm/res/container-registry/registry/webhook/main.json b/avm/res/container-registry/registry/webhook/main.json index d5805e9f69..b59c27ee02 100644 --- a/avm/res/container-registry/registry/webhook/main.json +++ b/avm/res/container-registry/registry/webhook/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.3.12046", - "templateHash": "3542060088842117365" + "version": "0.32.4.45862", + "templateHash": "7106022181114238286" }, "name": "Azure Container Registry (ACR) Webhooks", "description": "This module deploys an Azure Container Registry (ACR) Webhook.", @@ -106,10 +106,7 @@ "scope": "[parameters('scope')]", "serviceUri": "[parameters('serviceUri')]", "status": "[parameters('status')]" - }, - "dependsOn": [ - "registry" - ] + } } }, "outputs": { diff --git a/avm/res/desktop-virtualization/application-group/application/main.json b/avm/res/desktop-virtualization/application-group/application/main.json index 32d61cf76b..2aae5303cd 100644 --- a/avm/res/desktop-virtualization/application-group/application/main.json +++ b/avm/res/desktop-virtualization/application-group/application/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10838639279177354544" + "version": "0.32.4.45862", + "templateHash": "16918773705933776039" }, "name": "Azure Virtual Desktop Application Group Application", "description": "This module deploys an Azure Virtual Desktop Application Group Application.", diff --git a/avm/res/desktop-virtualization/application-group/main.json b/avm/res/desktop-virtualization/application-group/main.json index f626bd560d..a0a97e57ba 100644 --- a/avm/res/desktop-virtualization/application-group/main.json +++ b/avm/res/desktop-virtualization/application-group/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "14277084174605049439" + "version": "0.32.4.45862", + "templateHash": "6833492627380953004" }, "name": "Azure Virtual Desktop Application Group", "description": "This module deploys an Azure Virtual Desktop Application Group.", @@ -363,10 +363,7 @@ "friendlyName": "[parameters('friendlyName')]", "description": "[parameters('description')]", "applicationGroupType": "[parameters('applicationGroupType')]" - }, - "dependsOn": [ - "appGroup_hostpool" - ] + } }, "appGroup_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -473,8 +470,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10838639279177354544" + "version": "0.32.4.45862", + "templateHash": "16918773705933776039" }, "name": "Azure Virtual Desktop Application Group Application", "description": "This module deploys an Azure Virtual Desktop Application Group Application.", diff --git a/avm/res/dev-test-lab/lab/artifactsource/main.json b/avm/res/dev-test-lab/lab/artifactsource/main.json index 8f1f70d432..fe5d76088e 100644 --- a/avm/res/dev-test-lab/lab/artifactsource/main.json +++ b/avm/res/dev-test-lab/lab/artifactsource/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "14783992773855757023" + "version": "0.32.4.45862", + "templateHash": "15987847567505288979" }, "name": "DevTest Lab Artifact Sources", "description": "This module deploys a DevTest Lab Artifact Source.\n\nAn artifact source allows you to create custom artifacts for the VMs in the lab, or use Azure Resource Manager templates to create a custom test environment. You must add a private Git repository for the artifacts or Resource Manager templates that your team creates. The repository can be hosted on GitHub or on Azure DevOps Services.", @@ -118,10 +118,7 @@ "sourceType": "[parameters('sourceType')]", "status": "[parameters('status')]", "uri": "[parameters('uri')]" - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { diff --git a/avm/res/dev-test-lab/lab/cost/main.json b/avm/res/dev-test-lab/lab/cost/main.json index 337be1657f..ac06e0ad9a 100644 --- a/avm/res/dev-test-lab/lab/cost/main.json +++ b/avm/res/dev-test-lab/lab/cost/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "11453149540789698717" + "version": "0.32.4.45862", + "templateHash": "5097530253256865964" }, "name": "DevTest Lab Costs", "description": "This module deploys a DevTest Lab Cost.\n\nManage lab costs by setting a spending target that can be viewed in the Monthly Estimated Cost Trend chart. DevTest Labs can send a notification when spending reaches the specified target threshold.", @@ -251,10 +251,7 @@ } ] } - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { diff --git a/avm/res/dev-test-lab/lab/main.json b/avm/res/dev-test-lab/lab/main.json index edefb378d9..8eea46f947 100644 --- a/avm/res/dev-test-lab/lab/main.json +++ b/avm/res/dev-test-lab/lab/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "16337037731346424792" + "version": "0.32.4.45862", + "templateHash": "11609548636042160381" }, "name": "DevTest Labs", "description": "This module deploys a DevTest Lab.", @@ -1308,8 +1308,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "136709431680015650" + "version": "0.32.4.45862", + "templateHash": "6588565032345183133" }, "name": "DevTest Lab Virtual Networks", "description": "This module deploys a DevTest Lab Virtual Network.\n\nLab virtual machines must be deployed into a virtual network. This resource type allows configuring the virtual network and subnet settings used for the lab virtual machines.", @@ -1507,10 +1507,7 @@ "externalProviderResourceId": "[parameters('externalProviderResourceId')]", "allowedSubnets": "[parameters('allowedSubnets')]", "subnetOverrides": "[parameters('subnetOverrides')]" - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { @@ -1587,8 +1584,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15278651865125879516" + "version": "0.32.4.45862", + "templateHash": "14772587239006370946" }, "name": "DevTest Lab Policy Sets Policies", "description": "This module deploys a DevTest Lab Policy Sets Policy.\n\nDevTest lab policies are used to modify the lab settings such as only allowing certain VM Size SKUs, marketplace image types, number of VMs allowed per user and other settings.", @@ -1766,8 +1763,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "5104168587634139273" + "version": "0.32.4.45862", + "templateHash": "13638649976661412429" }, "name": "DevTest Lab Schedules", "description": "This module deploys a DevTest Lab Schedule.\n\nLab schedules are used to modify the settings for auto-shutdown, auto-start for lab virtual machines.", @@ -1982,10 +1979,7 @@ "targetResourceId": "[parameters('targetResourceId')]", "timeZoneId": "[parameters('timeZoneId')]", "notificationSettings": "[parameters('notificationSettings')]" - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { @@ -2063,8 +2057,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "1470030882457989802" + "version": "0.32.4.45862", + "templateHash": "1242120487437062161" }, "name": "DevTest Lab Notification Channels", "description": "This module deploys a DevTest Lab Notification Channel.\n\nNotification channels are used by the schedule resource type in order to send notifications or events to email addresses and/or webhooks.", @@ -2155,10 +2149,7 @@ "emailRecipient": "[parameters('emailRecipient')]", "webHookUrl": "[parameters('webHookUrl')]", "notificationLocale": "[parameters('notificationLocale')]" - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { @@ -2245,8 +2236,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "14783992773855757023" + "version": "0.32.4.45862", + "templateHash": "15987847567505288979" }, "name": "DevTest Lab Artifact Sources", "description": "This module deploys a DevTest Lab Artifact Source.\n\nAn artifact source allows you to create custom artifacts for the VMs in the lab, or use Azure Resource Manager templates to create a custom test environment. You must add a private Git repository for the artifacts or Resource Manager templates that your team creates. The repository can be hosted on GitHub or on Azure DevOps Services.", @@ -2358,10 +2349,7 @@ "sourceType": "[parameters('sourceType')]", "status": "[parameters('status')]", "uri": "[parameters('uri')]" - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { @@ -2466,8 +2454,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "11453149540789698717" + "version": "0.32.4.45862", + "templateHash": "5097530253256865964" }, "name": "DevTest Lab Costs", "description": "This module deploys a DevTest Lab Cost.\n\nManage lab costs by setting a spending target that can be viewed in the Monthly Estimated Cost Trend chart. DevTest Labs can send a notification when spending reaches the specified target threshold.", @@ -2712,10 +2700,7 @@ } ] } - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { diff --git a/avm/res/dev-test-lab/lab/notificationchannel/main.json b/avm/res/dev-test-lab/lab/notificationchannel/main.json index 33bd02efc9..2304c3384b 100644 --- a/avm/res/dev-test-lab/lab/notificationchannel/main.json +++ b/avm/res/dev-test-lab/lab/notificationchannel/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "1470030882457989802" + "version": "0.32.4.45862", + "templateHash": "1242120487437062161" }, "name": "DevTest Lab Notification Channels", "description": "This module deploys a DevTest Lab Notification Channel.\n\nNotification channels are used by the schedule resource type in order to send notifications or events to email addresses and/or webhooks.", @@ -97,10 +97,7 @@ "emailRecipient": "[parameters('emailRecipient')]", "webHookUrl": "[parameters('webHookUrl')]", "notificationLocale": "[parameters('notificationLocale')]" - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { diff --git a/avm/res/dev-test-lab/lab/policyset/policy/main.json b/avm/res/dev-test-lab/lab/policyset/policy/main.json index 1ed8cb6525..24cb4695ae 100644 --- a/avm/res/dev-test-lab/lab/policyset/policy/main.json +++ b/avm/res/dev-test-lab/lab/policyset/policy/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15278651865125879516" + "version": "0.32.4.45862", + "templateHash": "14772587239006370946" }, "name": "DevTest Lab Policy Sets Policies", "description": "This module deploys a DevTest Lab Policy Sets Policy.\n\nDevTest lab policies are used to modify the lab settings such as only allowing certain VM Size SKUs, marketplace image types, number of VMs allowed per user and other settings.", diff --git a/avm/res/dev-test-lab/lab/schedule/main.json b/avm/res/dev-test-lab/lab/schedule/main.json index fb6d5f03bf..fd2054c29e 100644 --- a/avm/res/dev-test-lab/lab/schedule/main.json +++ b/avm/res/dev-test-lab/lab/schedule/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "5104168587634139273" + "version": "0.32.4.45862", + "templateHash": "13638649976661412429" }, "name": "DevTest Lab Schedules", "description": "This module deploys a DevTest Lab Schedule.\n\nLab schedules are used to modify the settings for auto-shutdown, auto-start for lab virtual machines.", @@ -221,10 +221,7 @@ "targetResourceId": "[parameters('targetResourceId')]", "timeZoneId": "[parameters('timeZoneId')]", "notificationSettings": "[parameters('notificationSettings')]" - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { diff --git a/avm/res/dev-test-lab/lab/virtualnetwork/main.json b/avm/res/dev-test-lab/lab/virtualnetwork/main.json index d8f4e11608..6e3e5437f3 100644 --- a/avm/res/dev-test-lab/lab/virtualnetwork/main.json +++ b/avm/res/dev-test-lab/lab/virtualnetwork/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "136709431680015650" + "version": "0.32.4.45862", + "templateHash": "6588565032345183133" }, "name": "DevTest Lab Virtual Networks", "description": "This module deploys a DevTest Lab Virtual Network.\n\nLab virtual machines must be deployed into a virtual network. This resource type allows configuring the virtual network and subnet settings used for the lab virtual machines.", @@ -204,10 +204,7 @@ "externalProviderResourceId": "[parameters('externalProviderResourceId')]", "allowedSubnets": "[parameters('allowedSubnets')]", "subnetOverrides": "[parameters('subnetOverrides')]" - }, - "dependsOn": [ - "lab" - ] + } } }, "outputs": { diff --git a/avm/res/digital-twins/digital-twins-instance/endpoint--event-grid/main.json b/avm/res/digital-twins/digital-twins-instance/endpoint--event-grid/main.json index ea78396495..3cc9c4dc57 100644 --- a/avm/res/digital-twins/digital-twins-instance/endpoint--event-grid/main.json +++ b/avm/res/digital-twins/digital-twins-instance/endpoint--event-grid/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.26.54.24096", - "templateHash": "11981298053277690078" + "version": "0.32.4.45862", + "templateHash": "14357918051528584394" }, "name": "Digital Twins Instance Event Grid Endpoints", "description": "This module deploys a Digital Twins Instance Event Grid Endpoint.", diff --git a/avm/res/digital-twins/digital-twins-instance/endpoint--event-hub/main.json b/avm/res/digital-twins/digital-twins-instance/endpoint--event-hub/main.json index 77de42e1f5..881940b38a 100644 --- a/avm/res/digital-twins/digital-twins-instance/endpoint--event-hub/main.json +++ b/avm/res/digital-twins/digital-twins-instance/endpoint--event-hub/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.26.54.24096", - "templateHash": "1964184668152537300" + "version": "0.32.4.45862", + "templateHash": "13923156882372448729" }, "name": "Digital Twins Instance EventHub Endpoint", "description": "This module deploys a Digital Twins Instance EventHub Endpoint.", @@ -132,10 +132,7 @@ "endpointUri": "[parameters('endpointUri')]", "entityPath": "[parameters('entityPath')]", "identity": "[variables('identity')]" - }, - "dependsOn": [ - "digitalTwinsInstance" - ] + } } }, "outputs": { diff --git a/avm/res/digital-twins/digital-twins-instance/endpoint--service-bus/main.json b/avm/res/digital-twins/digital-twins-instance/endpoint--service-bus/main.json index b1386e5656..6abe3328fe 100644 --- a/avm/res/digital-twins/digital-twins-instance/endpoint--service-bus/main.json +++ b/avm/res/digital-twins/digital-twins-instance/endpoint--service-bus/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.26.54.24096", - "templateHash": "16761257324786961037" + "version": "0.32.4.45862", + "templateHash": "9917080858184002423" }, "name": "Digital Twins Instance ServiceBus Endpoint", "description": "This module deploys a Digital Twins Instance ServiceBus Endpoint.", @@ -132,10 +132,7 @@ "primaryConnectionString": "[parameters('primaryConnectionString')]", "secondaryConnectionString": "[parameters('secondaryConnectionString')]", "identity": "[variables('identity')]" - }, - "dependsOn": [ - "digitalTwinsInstance" - ] + } } }, "outputs": { diff --git a/avm/res/digital-twins/digital-twins-instance/main.json b/avm/res/digital-twins/digital-twins-instance/main.json index ee05f0f0bd..0b234bd50d 100644 --- a/avm/res/digital-twins/digital-twins-instance/main.json +++ b/avm/res/digital-twins/digital-twins-instance/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "11503001274179673847" + "version": "0.32.4.45862", + "templateHash": "16243868201799712200" }, "name": "Digital Twins Instances", "description": "This module deploys an Azure Digital Twins Instance.", @@ -695,8 +695,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "16914787878954195877" + "version": "0.32.4.45862", + "templateHash": "13923156882372448729" }, "name": "Digital Twins Instance EventHub Endpoint", "description": "This module deploys a Digital Twins Instance EventHub Endpoint.", @@ -822,10 +822,7 @@ "endpointUri": "[parameters('endpointUri')]", "entityPath": "[parameters('entityPath')]", "identity": "[variables('identity')]" - }, - "dependsOn": [ - "digitalTwinsInstance" - ] + } } }, "outputs": { @@ -893,8 +890,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "17261842587165157796" + "version": "0.32.4.45862", + "templateHash": "14357918051528584394" }, "name": "Digital Twins Instance Event Grid Endpoints", "description": "This module deploys a Digital Twins Instance Event Grid Endpoint.", @@ -1020,8 +1017,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "843606537345038481" + "version": "0.32.4.45862", + "templateHash": "9917080858184002423" }, "name": "Digital Twins Instance ServiceBus Endpoint", "description": "This module deploys a Digital Twins Instance ServiceBus Endpoint.", @@ -1147,10 +1144,7 @@ "primaryConnectionString": "[parameters('primaryConnectionString')]", "secondaryConnectionString": "[parameters('secondaryConnectionString')]", "identity": "[variables('identity')]" - }, - "dependsOn": [ - "digitalTwinsInstance" - ] + } } }, "outputs": { diff --git a/avm/res/document-db/mongo-cluster/firewall-rule/main.json b/avm/res/document-db/mongo-cluster/firewall-rule/main.json index 227ec11c2e..662d6fa047 100644 --- a/avm/res/document-db/mongo-cluster/firewall-rule/main.json +++ b/avm/res/document-db/mongo-cluster/firewall-rule/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.27.1.19265", - "templateHash": "11076682219298980277" + "version": "0.32.4.45862", + "templateHash": "12976219964590265329" }, "name": "Azure Cosmos DB MongoDB vCore Cluster Config FireWall Rules", "description": "This module config firewall rules for the Azure Cosmos DB MongoDB vCore cluster.", diff --git a/avm/res/document-db/mongo-cluster/main.json b/avm/res/document-db/mongo-cluster/main.json index e132b34995..6b2cc5e852 100644 --- a/avm/res/document-db/mongo-cluster/main.json +++ b/avm/res/document-db/mongo-cluster/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "11382084554700938270" + "version": "0.32.4.45862", + "templateHash": "2703211074566743315" }, "name": "Azure Cosmos DB MongoDB vCore cluster", "description": "This module deploys a Azure Cosmos DB MongoDB vCore cluster.\n\n**Note:** This module is not intended for broad, generic use, as it was designed to cater for the requirements of the AZD CLI product. Feature requests and bug fix requests are welcome if they support the development of the AZD CLI but may not be incorporated if they aim to make this module more generic than what it needs to be for its primary use case.", @@ -845,8 +845,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "2708665515541247345" + "version": "0.32.4.45862", + "templateHash": "12976219964590265329" }, "name": "Azure Cosmos DB MongoDB vCore Cluster Config FireWall Rules", "description": "This module config firewall rules for the Azure Cosmos DB MongoDB vCore cluster.", @@ -945,8 +945,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "16142913599202614386" + "version": "0.32.4.45862", + "templateHash": "7635336304585068699" } }, "definitions": { @@ -1022,10 +1022,7 @@ "name": "[format('{0}/{1}', parameters('keyVaultName'), parameters('secretsToSet')[copyIndex()].name)]", "properties": { "value": "[parameters('secretsToSet')[copyIndex()].value]" - }, - "dependsOn": [ - "keyVault" - ] + } } }, "outputs": { diff --git a/avm/res/elastic-san/elastic-san/main.json b/avm/res/elastic-san/elastic-san/main.json index 935a64b31f..95a5692959 100644 --- a/avm/res/elastic-san/elastic-san/main.json +++ b/avm/res/elastic-san/elastic-san/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "13500839064429348540" + "version": "0.32.4.45862", + "templateHash": "4871919836027506814" }, "name": "Elastic SANs", "description": "This module deploys an Elastic SAN.", @@ -1102,8 +1102,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "14826437696199531275" + "version": "0.32.4.45862", + "templateHash": "17866697259753306398" }, "name": "Elastic SAN Volume Groups", "description": "This module deploys an Elastic SAN Volume Group.", @@ -1811,10 +1811,7 @@ "apiVersion": "2023-07-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "elasticSan": { "existing": true, @@ -1852,9 +1849,8 @@ "protocolType": "Iscsi" }, "dependsOn": [ - "cMKKeyVault", - "cMKUserAssignedIdentity", - "elasticSan" + "cMKKeyVault::cMKKey", + "cMKKeyVault" ] }, "volumeGroup_volumes": { @@ -1897,8 +1893,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "7294045171019589380" + "version": "0.32.4.45862", + "templateHash": "11533734899359138908" }, "name": "Elastic SAN Volumes", "description": "This module deploys an Elastic SAN Volume.", @@ -2011,10 +2007,7 @@ "existing": true, "type": "Microsoft.ElasticSan/elasticSans/volumegroups", "apiVersion": "2023-01-01", - "name": "[format('{0}/{1}', parameters('elasticSanName'), parameters('volumeGroupName'))]", - "dependsOn": [ - "elasticSan" - ] + "name": "[format('{0}/{1}', parameters('elasticSanName'), parameters('volumeGroupName'))]" }, "elasticSan": { "existing": true, @@ -2028,10 +2021,7 @@ "name": "[format('{0}/{1}/{2}', parameters('elasticSanName'), parameters('volumeGroupName'), parameters('name'))]", "properties": { "sizeGiB": "[parameters('sizeGiB')]" - }, - "dependsOn": [ - "elasticSan::volumeGroup" - ] + } }, "volume_snapshots": { "copy": { @@ -2069,8 +2059,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "12385278995369535477" + "version": "0.32.4.45862", + "templateHash": "6447606357697817784" }, "name": "Elastic SAN Volume Snapshots", "description": "This module deploys an Elastic SAN Volume Snapshot.", @@ -2163,7 +2153,6 @@ } }, "dependsOn": [ - "elasticSan", "volume" ] } @@ -2247,7 +2236,6 @@ } }, "dependsOn": [ - "elasticSan", "volumeGroup" ] }, @@ -3053,7 +3041,6 @@ } }, "dependsOn": [ - "elasticSan", "volumeGroup" ] } diff --git a/avm/res/elastic-san/elastic-san/volume-group/main.json b/avm/res/elastic-san/elastic-san/volume-group/main.json index f4365a056c..d05b5f4192 100644 --- a/avm/res/elastic-san/elastic-san/volume-group/main.json +++ b/avm/res/elastic-san/elastic-san/volume-group/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "14826437696199531275" + "version": "0.32.4.45862", + "templateHash": "17866697259753306398" }, "name": "Elastic SAN Volume Groups", "description": "This module deploys an Elastic SAN Volume Group.", @@ -714,10 +714,7 @@ "apiVersion": "2023-07-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "elasticSan": { "existing": true, @@ -755,9 +752,8 @@ "protocolType": "Iscsi" }, "dependsOn": [ - "cMKKeyVault", - "cMKUserAssignedIdentity", - "elasticSan" + "cMKKeyVault::cMKKey", + "cMKKeyVault" ] }, "volumeGroup_volumes": { @@ -800,8 +796,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "7294045171019589380" + "version": "0.32.4.45862", + "templateHash": "11533734899359138908" }, "name": "Elastic SAN Volumes", "description": "This module deploys an Elastic SAN Volume.", @@ -914,10 +910,7 @@ "existing": true, "type": "Microsoft.ElasticSan/elasticSans/volumegroups", "apiVersion": "2023-01-01", - "name": "[format('{0}/{1}', parameters('elasticSanName'), parameters('volumeGroupName'))]", - "dependsOn": [ - "elasticSan" - ] + "name": "[format('{0}/{1}', parameters('elasticSanName'), parameters('volumeGroupName'))]" }, "elasticSan": { "existing": true, @@ -931,10 +924,7 @@ "name": "[format('{0}/{1}/{2}', parameters('elasticSanName'), parameters('volumeGroupName'), parameters('name'))]", "properties": { "sizeGiB": "[parameters('sizeGiB')]" - }, - "dependsOn": [ - "elasticSan::volumeGroup" - ] + } }, "volume_snapshots": { "copy": { @@ -972,8 +962,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "12385278995369535477" + "version": "0.32.4.45862", + "templateHash": "6447606357697817784" }, "name": "Elastic SAN Volume Snapshots", "description": "This module deploys an Elastic SAN Volume Snapshot.", @@ -1066,7 +1056,6 @@ } }, "dependsOn": [ - "elasticSan", "volume" ] } @@ -1150,7 +1139,6 @@ } }, "dependsOn": [ - "elasticSan", "volumeGroup" ] }, @@ -1956,7 +1944,6 @@ } }, "dependsOn": [ - "elasticSan", "volumeGroup" ] } diff --git a/avm/res/elastic-san/elastic-san/volume-group/snapshot/main.json b/avm/res/elastic-san/elastic-san/volume-group/snapshot/main.json index cfc8e8ff3a..abeb218bb1 100644 --- a/avm/res/elastic-san/elastic-san/volume-group/snapshot/main.json +++ b/avm/res/elastic-san/elastic-san/volume-group/snapshot/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "12385278995369535477" + "version": "0.32.4.45862", + "templateHash": "6447606357697817784" }, "name": "Elastic SAN Volume Snapshots", "description": "This module deploys an Elastic SAN Volume Snapshot.", diff --git a/avm/res/elastic-san/elastic-san/volume-group/volume/main.json b/avm/res/elastic-san/elastic-san/volume-group/volume/main.json index 17b33276a0..8becf3e1fc 100644 --- a/avm/res/elastic-san/elastic-san/volume-group/volume/main.json +++ b/avm/res/elastic-san/elastic-san/volume-group/volume/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "7294045171019589380" + "version": "0.32.4.45862", + "templateHash": "11533734899359138908" }, "name": "Elastic SAN Volumes", "description": "This module deploys an Elastic SAN Volume.", @@ -119,10 +119,7 @@ "existing": true, "type": "Microsoft.ElasticSan/elasticSans/volumegroups", "apiVersion": "2023-01-01", - "name": "[format('{0}/{1}', parameters('elasticSanName'), parameters('volumeGroupName'))]", - "dependsOn": [ - "elasticSan" - ] + "name": "[format('{0}/{1}', parameters('elasticSanName'), parameters('volumeGroupName'))]" }, "elasticSan": { "existing": true, @@ -136,10 +133,7 @@ "name": "[format('{0}/{1}/{2}', parameters('elasticSanName'), parameters('volumeGroupName'), parameters('name'))]", "properties": { "sizeGiB": "[parameters('sizeGiB')]" - }, - "dependsOn": [ - "elasticSan::volumeGroup" - ] + } }, "volume_snapshots": { "copy": { @@ -177,8 +171,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "12385278995369535477" + "version": "0.32.4.45862", + "templateHash": "6447606357697817784" }, "name": "Elastic SAN Volume Snapshots", "description": "This module deploys an Elastic SAN Volume Snapshot.", @@ -271,7 +265,6 @@ } }, "dependsOn": [ - "elasticSan", "volume" ] } diff --git a/avm/res/event-grid/namespace/ca-certificate/main.json b/avm/res/event-grid/namespace/ca-certificate/main.json index ac1ee23280..ba0d3c4eeb 100644 --- a/avm/res/event-grid/namespace/ca-certificate/main.json +++ b/avm/res/event-grid/namespace/ca-certificate/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "12750364857938782710" + "version": "0.32.4.45862", + "templateHash": "15103885327105727578" }, "name": "Eventgrid Namespace CA Certificates", "description": "This module deploys an Eventgrid Namespace CA Certificate.", @@ -53,10 +53,7 @@ "properties": { "description": "[parameters('description')]", "encodedCertificate": "[parameters('encodedCertificate')]" - }, - "dependsOn": [ - "namespace" - ] + } } }, "outputs": { diff --git a/avm/res/event-grid/namespace/client-group/main.json b/avm/res/event-grid/namespace/client-group/main.json index 2c699d01b0..90fed72806 100644 --- a/avm/res/event-grid/namespace/client-group/main.json +++ b/avm/res/event-grid/namespace/client-group/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "16551042161872604300" + "version": "0.32.4.45862", + "templateHash": "11660537828961696327" }, "name": "Eventgrid Namespace Client Groups", "description": "This module deploys an Eventgrid Namespace Client Group.", @@ -53,10 +53,7 @@ "properties": { "description": "[parameters('description')]", "query": "[parameters('query')]" - }, - "dependsOn": [ - "namespace" - ] + } } }, "outputs": { diff --git a/avm/res/event-grid/namespace/client/main.json b/avm/res/event-grid/namespace/client/main.json index 01ecbb05fa..431380c032 100644 --- a/avm/res/event-grid/namespace/client/main.json +++ b/avm/res/event-grid/namespace/client/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10456542411882263533" + "version": "0.32.4.45862", + "templateHash": "10938336378655510581" }, "name": "Eventgrid Namespace Clients", "description": "This module deploys an Eventgrid Namespace Client.", @@ -101,10 +101,7 @@ "allowedThumbprints": "[if(equals(parameters('clientCertificateAuthenticationValidationSchema'), 'ThumbprintMatch'), parameters('clientCertificateAuthenticationAllowedThumbprints'), null())]" }, "state": "[parameters('state')]" - }, - "dependsOn": [ - "namespace" - ] + } } }, "outputs": { diff --git a/avm/res/event-grid/namespace/main.json b/avm/res/event-grid/namespace/main.json index cc71b84a53..422560fdfd 100644 --- a/avm/res/event-grid/namespace/main.json +++ b/avm/res/event-grid/namespace/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "5783764026071462654" + "version": "0.32.4.45862", + "templateHash": "2925659785209502181" }, "name": "Event Grid Namespaces", "description": "This module deploys an Event Grid Namespace.", @@ -1615,8 +1615,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "13432369313513953808" + "version": "0.32.4.45862", + "templateHash": "3182244710211975967" }, "name": "Eventgrid Namespace Topics", "description": "This module deploys an Eventgrid Namespace Topic.", @@ -1817,10 +1817,7 @@ "eventRetentionInDays": "[parameters('eventRetentionInDays')]", "inputSchema": "[parameters('inputSchema')]", "publisherType": "[parameters('publisherType')]" - }, - "dependsOn": [ - "namespace" - ] + } }, "topic_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -1901,8 +1898,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "17089589089044607764" + "version": "0.32.4.45862", + "templateHash": "8865122447833049009" }, "name": "Event Subscriptions", "description": "This module deploys an Event Subscription.", @@ -2059,10 +2056,7 @@ "existing": true, "type": "Microsoft.EventGrid/namespaces/topics", "apiVersion": "2023-12-15-preview", - "name": "[format('{0}/{1}', parameters('namespaceName'), parameters('topicName'))]", - "dependsOn": [ - "namespace" - ] + "name": "[format('{0}/{1}', parameters('namespaceName'), parameters('topicName'))]" }, "namespace": { "existing": true, @@ -2078,10 +2072,7 @@ "deliveryConfiguration": "[parameters('deliveryConfiguration')]", "eventDeliverySchema": "[parameters('eventDeliverySchema')]", "filtersConfiguration": "[parameters('filtersConfiguration')]" - }, - "dependsOn": [ - "namespace::topic" - ] + } }, "eventSubscription_roleAssignments": { "copy": { @@ -2132,7 +2123,6 @@ } }, "dependsOn": [ - "namespace", "topic" ] } @@ -2201,8 +2191,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "10521341575239164612" + "version": "0.32.4.45862", + "templateHash": "15103885327105727578" }, "name": "Eventgrid Namespace CA Certificates", "description": "This module deploys an Eventgrid Namespace CA Certificate.", @@ -2249,10 +2239,7 @@ "properties": { "description": "[parameters('description')]", "encodedCertificate": "[parameters('encodedCertificate')]" - }, - "dependsOn": [ - "namespace" - ] + } } }, "outputs": { @@ -2331,8 +2318,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "18108409387147428195" + "version": "0.32.4.45862", + "templateHash": "10938336378655510581" }, "name": "Eventgrid Namespace Clients", "description": "This module deploys an Eventgrid Namespace Client.", @@ -2427,10 +2414,7 @@ "allowedThumbprints": "[if(equals(parameters('clientCertificateAuthenticationValidationSchema'), 'ThumbprintMatch'), parameters('clientCertificateAuthenticationAllowedThumbprints'), null())]" }, "state": "[parameters('state')]" - }, - "dependsOn": [ - "namespace" - ] + } } }, "outputs": { @@ -2497,8 +2481,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "16390720769511049629" + "version": "0.32.4.45862", + "templateHash": "11660537828961696327" }, "name": "Eventgrid Namespace Client Groups", "description": "This module deploys an Eventgrid Namespace Client Group.", @@ -2545,10 +2529,7 @@ "properties": { "description": "[parameters('description')]", "query": "[parameters('query')]" - }, - "dependsOn": [ - "namespace" - ] + } } }, "outputs": { @@ -2618,8 +2599,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "9421201119756189566" + "version": "0.32.4.45862", + "templateHash": "6625543502444650153" }, "name": "Eventgrid Namespace Topic Spaces", "description": "This module deploys an Eventgrid Namespace Topic Space.", @@ -2772,10 +2753,7 @@ "properties": { "description": "[parameters('description')]", "topicTemplates": "[parameters('topicTemplates')]" - }, - "dependsOn": [ - "namespace" - ] + } }, "topicSpace_roleAssignments": { "copy": { @@ -2870,8 +2848,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "1634258312310183641" + "version": "0.32.4.45862", + "templateHash": "6730455547297766679" }, "name": "Eventgrid Namespace Permissions Bindings", "description": "This module deploys an Eventgrid Namespace Permission Binding.", @@ -2936,10 +2914,7 @@ "description": "[parameters('description')]", "permission": "[parameters('permission')]", "topicSpaceName": "[parameters('topicSpaceName')]" - }, - "dependsOn": [ - "namespace" - ] + } } }, "outputs": { diff --git a/avm/res/event-grid/namespace/permission-binding/main.json b/avm/res/event-grid/namespace/permission-binding/main.json index 48f7e420f5..96fcf42a71 100644 --- a/avm/res/event-grid/namespace/permission-binding/main.json +++ b/avm/res/event-grid/namespace/permission-binding/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "8789192089964505787" + "version": "0.32.4.45862", + "templateHash": "6730455547297766679" }, "name": "Eventgrid Namespace Permissions Bindings", "description": "This module deploys an Eventgrid Namespace Permission Binding.", @@ -71,10 +71,7 @@ "description": "[parameters('description')]", "permission": "[parameters('permission')]", "topicSpaceName": "[parameters('topicSpaceName')]" - }, - "dependsOn": [ - "namespace" - ] + } } }, "outputs": { diff --git a/avm/res/event-grid/namespace/topic-space/main.json b/avm/res/event-grid/namespace/topic-space/main.json index 1b59f33e4c..2b06f5cb3e 100644 --- a/avm/res/event-grid/namespace/topic-space/main.json +++ b/avm/res/event-grid/namespace/topic-space/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "13412075546334276790" + "version": "0.32.4.45862", + "templateHash": "6625543502444650153" }, "name": "Eventgrid Namespace Topic Spaces", "description": "This module deploys an Eventgrid Namespace Topic Space.", @@ -159,10 +159,7 @@ "properties": { "description": "[parameters('description')]", "topicTemplates": "[parameters('topicTemplates')]" - }, - "dependsOn": [ - "namespace" - ] + } }, "topicSpace_roleAssignments": { "copy": { diff --git a/avm/res/event-grid/namespace/topic/event-subscription/main.json b/avm/res/event-grid/namespace/topic/event-subscription/main.json index 3c60ffd081..d0577949c0 100644 --- a/avm/res/event-grid/namespace/topic/event-subscription/main.json +++ b/avm/res/event-grid/namespace/topic/event-subscription/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "484752655079146569" + "version": "0.32.4.45862", + "templateHash": "8865122447833049009" }, "name": "Event Subscriptions", "description": "This module deploys an Event Subscription.", @@ -163,10 +163,7 @@ "existing": true, "type": "Microsoft.EventGrid/namespaces/topics", "apiVersion": "2023-12-15-preview", - "name": "[format('{0}/{1}', parameters('namespaceName'), parameters('topicName'))]", - "dependsOn": [ - "namespace" - ] + "name": "[format('{0}/{1}', parameters('namespaceName'), parameters('topicName'))]" }, "namespace": { "existing": true, @@ -182,10 +179,7 @@ "deliveryConfiguration": "[parameters('deliveryConfiguration')]", "eventDeliverySchema": "[parameters('eventDeliverySchema')]", "filtersConfiguration": "[parameters('filtersConfiguration')]" - }, - "dependsOn": [ - "namespace::topic" - ] + } }, "eventSubscription_roleAssignments": { "copy": { diff --git a/avm/res/event-grid/namespace/topic/main.json b/avm/res/event-grid/namespace/topic/main.json index a66e54d064..2ddb65d918 100644 --- a/avm/res/event-grid/namespace/topic/main.json +++ b/avm/res/event-grid/namespace/topic/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "2384224485883500454" + "version": "0.32.4.45862", + "templateHash": "3182244710211975967" }, "name": "Eventgrid Namespace Topics", "description": "This module deploys an Eventgrid Namespace Topic.", @@ -207,10 +207,7 @@ "eventRetentionInDays": "[parameters('eventRetentionInDays')]", "inputSchema": "[parameters('inputSchema')]", "publisherType": "[parameters('publisherType')]" - }, - "dependsOn": [ - "namespace" - ] + } }, "topic_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -291,8 +288,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "484752655079146569" + "version": "0.32.4.45862", + "templateHash": "8865122447833049009" }, "name": "Event Subscriptions", "description": "This module deploys an Event Subscription.", @@ -449,10 +446,7 @@ "existing": true, "type": "Microsoft.EventGrid/namespaces/topics", "apiVersion": "2023-12-15-preview", - "name": "[format('{0}/{1}', parameters('namespaceName'), parameters('topicName'))]", - "dependsOn": [ - "namespace" - ] + "name": "[format('{0}/{1}', parameters('namespaceName'), parameters('topicName'))]" }, "namespace": { "existing": true, @@ -468,10 +462,7 @@ "deliveryConfiguration": "[parameters('deliveryConfiguration')]", "eventDeliverySchema": "[parameters('eventDeliverySchema')]", "filtersConfiguration": "[parameters('filtersConfiguration')]" - }, - "dependsOn": [ - "namespace::topic" - ] + } }, "eventSubscription_roleAssignments": { "copy": { @@ -522,7 +513,6 @@ } }, "dependsOn": [ - "namespace", "topic" ] } diff --git a/avm/res/healthcare-apis/workspace/dicomservice/main.json b/avm/res/healthcare-apis/workspace/dicomservice/main.json index 337cdf0ae8..4eb68768e9 100644 --- a/avm/res/healthcare-apis/workspace/dicomservice/main.json +++ b/avm/res/healthcare-apis/workspace/dicomservice/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "8075255504556528583" + "version": "0.32.4.45862", + "templateHash": "5239077988285512611" }, "name": "Healthcare API Workspace DICOM Services", "description": "This module deploys a Healthcare API Workspace DICOM Service.", @@ -310,10 +310,7 @@ "origins": "[parameters('corsOrigins')]" }, "publicNetworkAccess": "[parameters('publicNetworkAccess')]" - }, - "dependsOn": [ - "workspace" - ] + } }, "dicom_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", diff --git a/avm/res/healthcare-apis/workspace/fhirservice/main.json b/avm/res/healthcare-apis/workspace/fhirservice/main.json index 2b8bc41785..496691317d 100644 --- a/avm/res/healthcare-apis/workspace/fhirservice/main.json +++ b/avm/res/healthcare-apis/workspace/fhirservice/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "14455646643849754189" + "version": "0.32.4.45862", + "templateHash": "2858322501760724975" }, "name": "Healthcare API Workspace FHIR Services", "description": "This module deploys a Healthcare API Workspace FHIR Service.", @@ -545,10 +545,7 @@ "loginServers": "[parameters('acrLoginServers')]", "ociArtifacts": "[parameters('acrOciArtifacts')]" } - }, - "dependsOn": [ - "workspace" - ] + } }, "fhir_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", diff --git a/avm/res/healthcare-apis/workspace/iotconnector/fhirdestination/main.json b/avm/res/healthcare-apis/workspace/iotconnector/fhirdestination/main.json index dd32895bd1..f84075e309 100644 --- a/avm/res/healthcare-apis/workspace/iotconnector/fhirdestination/main.json +++ b/avm/res/healthcare-apis/workspace/iotconnector/fhirdestination/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "9211958556323045062" + "version": "0.32.4.45862", + "templateHash": "11549574411337350390" }, "name": "Healthcare API Workspace IoT Connector FHIR Destinations", "description": "This module deploys a Healthcare API Workspace IoT Connector FHIR Destination.", diff --git a/avm/res/healthcare-apis/workspace/iotconnector/main.json b/avm/res/healthcare-apis/workspace/iotconnector/main.json index c8865cad8b..0670173f8a 100644 --- a/avm/res/healthcare-apis/workspace/iotconnector/main.json +++ b/avm/res/healthcare-apis/workspace/iotconnector/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "960125802721112117" + "version": "0.32.4.45862", + "templateHash": "6338145646645616333" }, "name": "Healthcare API Workspace IoT Connectors", "description": "This module deploys a Healthcare API Workspace IoT Connector.", @@ -293,10 +293,7 @@ "deviceMapping": { "content": "[parameters('deviceMapping')]" } - }, - "dependsOn": [ - "workspace" - ] + } }, "iotConnector_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -392,8 +389,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "9211958556323045062" + "version": "0.32.4.45862", + "templateHash": "11549574411337350390" }, "name": "Healthcare API Workspace IoT Connector FHIR Destinations", "description": "This module deploys a Healthcare API Workspace IoT Connector FHIR Destination.", diff --git a/avm/res/healthcare-apis/workspace/main.json b/avm/res/healthcare-apis/workspace/main.json index 4361adabe7..30ab43173c 100644 --- a/avm/res/healthcare-apis/workspace/main.json +++ b/avm/res/healthcare-apis/workspace/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "17701323057909267930" + "version": "0.32.4.45862", + "templateHash": "1517116079261831480" }, "name": "Healthcare API Workspaces", "description": "This module deploys a Healthcare API Workspace.", @@ -394,8 +394,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "14455646643849754189" + "version": "0.32.4.45862", + "templateHash": "2858322501760724975" }, "name": "Healthcare API Workspace FHIR Services", "description": "This module deploys a Healthcare API Workspace FHIR Service.", @@ -934,10 +934,7 @@ "loginServers": "[parameters('acrLoginServers')]", "ociArtifacts": "[parameters('acrOciArtifacts')]" } - }, - "dependsOn": [ - "workspace" - ] + } }, "fhir_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -1128,8 +1125,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "8075255504556528583" + "version": "0.32.4.45862", + "templateHash": "5239077988285512611" }, "name": "Healthcare API Workspace DICOM Services", "description": "This module deploys a Healthcare API Workspace DICOM Service.", @@ -1433,10 +1430,7 @@ "origins": "[parameters('corsOrigins')]" }, "publicNetworkAccess": "[parameters('publicNetworkAccess')]" - }, - "dependsOn": [ - "workspace" - ] + } }, "dicom_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -1595,8 +1589,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "960125802721112117" + "version": "0.32.4.45862", + "templateHash": "6338145646645616333" }, "name": "Healthcare API Workspace IoT Connectors", "description": "This module deploys a Healthcare API Workspace IoT Connector.", @@ -1883,10 +1877,7 @@ "deviceMapping": { "content": "[parameters('deviceMapping')]" } - }, - "dependsOn": [ - "workspace" - ] + } }, "iotConnector_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -1982,8 +1973,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "9211958556323045062" + "version": "0.32.4.45862", + "templateHash": "11549574411337350390" }, "name": "Healthcare API Workspace IoT Connector FHIR Destinations", "description": "This module deploys a Healthcare API Workspace IoT Connector FHIR Destination.", diff --git a/avm/res/hybrid-compute/machine/extension/main.json b/avm/res/hybrid-compute/machine/extension/main.json index 01c3691774..c1522adf33 100644 --- a/avm/res/hybrid-compute/machine/extension/main.json +++ b/avm/res/hybrid-compute/machine/extension/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "12739944716751137956" + "version": "0.32.4.45862", + "templateHash": "7050591888814861236" }, "name": "Arc Machine Extensions", "description": "This module deploys a Arc Machine Extension. This module should be used as a standalone deployment after the Arc agent has connected to the Arc Machine resource.", @@ -113,10 +113,7 @@ "forceUpdateTag": "[if(not(empty(parameters('forceUpdateTag'))), parameters('forceUpdateTag'), null())]", "settings": "[if(not(empty(parameters('settings'))), parameters('settings'), null())]", "protectedSettings": "[if(not(empty(parameters('protectedSettings'))), parameters('protectedSettings'), null())]" - }, - "dependsOn": [ - "machine" - ] + } } }, "outputs": { diff --git a/avm/res/hybrid-compute/machine/main.json b/avm/res/hybrid-compute/machine/main.json index 7237f53e51..3475f96db9 100644 --- a/avm/res/hybrid-compute/machine/main.json +++ b/avm/res/hybrid-compute/machine/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10951579314283362107" + "version": "0.32.4.45862", + "templateHash": "3399656609816992315" }, "name": "Hybrid Compute Machines", "description": "This module deploys an Arc Machine for use with Arc Resource Bridge for Azure Stack HCI or VMware. In these scenarios, this resource module will be used in combination with another resource module to create the require Virtual Machine Instance extension resource on this Arc Machine resource. This module should not be used for other Arc-enabled server scenarios, where the Arc Machine resource is created automatically by the onboarding process.", diff --git a/avm/res/insights/component/linkedStorageAccounts/main.json b/avm/res/insights/component/linkedStorageAccounts/main.json index 9bb22a6e89..42d6a1f2ad 100644 --- a/avm/res/insights/component/linkedStorageAccounts/main.json +++ b/avm/res/insights/component/linkedStorageAccounts/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.34.60546", - "templateHash": "16330852520711792816" + "version": "0.32.4.45862", + "templateHash": "14705419803255524703" }, "name": "Application Insights Linked Storage Account", "description": "This component deploys an Application Insights Linked Storage Account.", diff --git a/avm/res/insights/component/main.json b/avm/res/insights/component/main.json index 210dd993f9..2c92ca3030 100644 --- a/avm/res/insights/component/main.json +++ b/avm/res/insights/component/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.34.60546", - "templateHash": "2627482903423190891" + "version": "0.32.4.45862", + "templateHash": "6147059661452531763" }, "name": "Application Insights", "description": "This component deploys an Application Insights instance.", @@ -508,8 +508,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.34.60546", - "templateHash": "16330852520711792816" + "version": "0.32.4.45862", + "templateHash": "14705419803255524703" }, "name": "Application Insights Linked Storage Account", "description": "This component deploys an Application Insights Linked Storage Account.", diff --git a/avm/res/insights/data-collection-rule/main.json b/avm/res/insights/data-collection-rule/main.json index 149cf1d812..5f79441541 100644 --- a/avm/res/insights/data-collection-rule/main.json +++ b/avm/res/insights/data-collection-rule/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "14881778773754127105" + "version": "0.32.4.45862", + "templateHash": "5749720752654125558" }, "name": "Data Collection Rules", "description": "This module deploys a Data Collection Rule.", @@ -533,8 +533,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "9020805060946792832" + "version": "0.32.4.45862", + "templateHash": "7374245221905320535" } }, "definitions": { @@ -709,10 +709,7 @@ "condition": "[tryGet(coalesce(variables('formattedRoleAssignments'), createArray())[copyIndex()], 'condition')]", "conditionVersion": "[if(not(empty(tryGet(coalesce(variables('formattedRoleAssignments'), createArray())[copyIndex()], 'condition'))), coalesce(tryGet(coalesce(variables('formattedRoleAssignments'), createArray())[copyIndex()], 'conditionVersion'), '2.0'), null())]", "delegatedManagedIdentityResourceId": "[tryGet(coalesce(variables('formattedRoleAssignments'), createArray())[copyIndex()], 'delegatedManagedIdentityResourceId')]" - }, - "dependsOn": [ - "dataCollectionRule" - ] + } }, "dataCollectionRule_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -723,10 +720,7 @@ "properties": { "level": "[coalesce(tryGet(parameters('lock'), 'kind'), '')]", "notes": "[if(equals(tryGet(parameters('lock'), 'kind'), 'CanNotDelete'), 'Cannot delete resource or child resources.', 'Cannot delete or modify the resource or child resources.')]" - }, - "dependsOn": [ - "dataCollectionRule" - ] + } } } } diff --git a/avm/res/key-vault/vault/access-policy/main.json b/avm/res/key-vault/vault/access-policy/main.json index 04f32ddaa3..0618c7e29a 100644 --- a/avm/res/key-vault/vault/access-policy/main.json +++ b/avm/res/key-vault/vault/access-policy/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "2943121976508120416" + "version": "0.32.4.45862", + "templateHash": "3969955574908853094" }, "name": "Key Vault Access Policies", "description": "This module deploys a Key Vault Access Policy.", @@ -190,10 +190,7 @@ "name": "[format('{0}/{1}', parameters('keyVaultName'), 'add')]", "properties": { "accessPolicies": "[variables('formattedAccessPolicies')]" - }, - "dependsOn": [ - "keyVault" - ] + } } }, "outputs": { diff --git a/avm/res/key-vault/vault/key/main.json b/avm/res/key-vault/vault/key/main.json index 9ee349978f..7742b5612e 100644 --- a/avm/res/key-vault/vault/key/main.json +++ b/avm/res/key-vault/vault/key/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "16374679780625197074" + "version": "0.32.4.45862", + "templateHash": "15613133519974526575" }, "name": "Key Vault Keys", "description": "This module deploys a Key Vault Key.", @@ -238,10 +238,7 @@ "apiVersion": "2022-07-01", "name": "[format('{0}/{1}', parameters('keyVaultName'), parameters('name'))]", "tags": "[parameters('tags')]", - "properties": "[shallowMerge(createArray(createObject('attributes', createObject('enabled', parameters('attributesEnabled'), 'exp', parameters('attributesExp'), 'nbf', parameters('attributesNbf')), 'curveName', parameters('curveName'), 'keyOps', parameters('keyOps'), 'keySize', parameters('keySize'), 'kty', parameters('kty'), 'release_policy', coalesce(parameters('releasePolicy'), createObject())), if(not(empty(parameters('rotationPolicy'))), createObject('rotationPolicy', parameters('rotationPolicy')), createObject())))]", - "dependsOn": [ - "keyVault" - ] + "properties": "[shallowMerge(createArray(createObject('attributes', createObject('enabled', parameters('attributesEnabled'), 'exp', parameters('attributesExp'), 'nbf', parameters('attributesNbf')), 'curveName', parameters('curveName'), 'keyOps', parameters('keyOps'), 'keySize', parameters('keySize'), 'kty', parameters('kty'), 'release_policy', coalesce(parameters('releasePolicy'), createObject())), if(not(empty(parameters('rotationPolicy'))), createObject('rotationPolicy', parameters('rotationPolicy')), createObject())))]" }, "key_roleAssignments": { "copy": { diff --git a/avm/res/key-vault/vault/main.json b/avm/res/key-vault/vault/main.json index df68949209..d89c9bf8a9 100644 --- a/avm/res/key-vault/vault/main.json +++ b/avm/res/key-vault/vault/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15386799594233335228" + "version": "0.32.4.45862", + "templateHash": "9360899285262740387" }, "name": "Key Vaults", "description": "This module deploys a Key Vault.", @@ -1378,8 +1378,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "2943121976508120416" + "version": "0.32.4.45862", + "templateHash": "3969955574908853094" }, "name": "Key Vault Access Policies", "description": "This module deploys a Key Vault Access Policy.", @@ -1563,10 +1563,7 @@ "name": "[format('{0}/{1}', parameters('keyVaultName'), 'add')]", "properties": { "accessPolicies": "[variables('formattedAccessPolicies')]" - }, - "dependsOn": [ - "keyVault" - ] + } } }, "outputs": { @@ -1647,8 +1644,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15057494123851631617" + "version": "0.32.4.45862", + "templateHash": "17861251076091988255" }, "name": "Key Vault Secrets", "description": "This module deploys a Key Vault Secret.", @@ -1837,10 +1834,7 @@ "nbf": "[parameters('attributesNbf')]" }, "value": "[parameters('value')]" - }, - "dependsOn": [ - "keyVault" - ] + } }, "secret_roleAssignments": { "copy": { @@ -1965,8 +1959,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "16374679780625197074" + "version": "0.32.4.45862", + "templateHash": "15613133519974526575" }, "name": "Key Vault Keys", "description": "This module deploys a Key Vault Key.", @@ -2198,10 +2192,7 @@ "apiVersion": "2022-07-01", "name": "[format('{0}/{1}', parameters('keyVaultName'), parameters('name'))]", "tags": "[parameters('tags')]", - "properties": "[shallowMerge(createArray(createObject('attributes', createObject('enabled', parameters('attributesEnabled'), 'exp', parameters('attributesExp'), 'nbf', parameters('attributesNbf')), 'curveName', parameters('curveName'), 'keyOps', parameters('keyOps'), 'keySize', parameters('keySize'), 'kty', parameters('kty'), 'release_policy', coalesce(parameters('releasePolicy'), createObject())), if(not(empty(parameters('rotationPolicy'))), createObject('rotationPolicy', parameters('rotationPolicy')), createObject())))]", - "dependsOn": [ - "keyVault" - ] + "properties": "[shallowMerge(createArray(createObject('attributes', createObject('enabled', parameters('attributesEnabled'), 'exp', parameters('attributesExp'), 'nbf', parameters('attributesNbf')), 'curveName', parameters('curveName'), 'keyOps', parameters('keyOps'), 'keySize', parameters('keySize'), 'kty', parameters('kty'), 'release_policy', coalesce(parameters('releasePolicy'), createObject())), if(not(empty(parameters('rotationPolicy'))), createObject('rotationPolicy', parameters('rotationPolicy')), createObject())))]" }, "key_roleAssignments": { "copy": { diff --git a/avm/res/key-vault/vault/secret/main.json b/avm/res/key-vault/vault/secret/main.json index 7a3bd69b67..b395d3e978 100644 --- a/avm/res/key-vault/vault/secret/main.json +++ b/avm/res/key-vault/vault/secret/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15057494123851631617" + "version": "0.32.4.45862", + "templateHash": "17861251076091988255" }, "name": "Key Vault Secrets", "description": "This module deploys a Key Vault Secret.", @@ -195,10 +195,7 @@ "nbf": "[parameters('attributesNbf')]" }, "value": "[parameters('value')]" - }, - "dependsOn": [ - "keyVault" - ] + } }, "secret_roleAssignments": { "copy": { diff --git a/avm/res/kubernetes-configuration/extension/main.json b/avm/res/kubernetes-configuration/extension/main.json index 1609f8624b..1c7e9f7081 100644 --- a/avm/res/kubernetes-configuration/extension/main.json +++ b/avm/res/kubernetes-configuration/extension/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "1500434239147541571" + "version": "0.32.4.45862", + "templateHash": "4983644790291723565" }, "name": "Kubernetes Configuration Extensions", "description": "This module deploys a Kubernetes Configuration Extension.", @@ -138,10 +138,7 @@ "namespace": "[if(not(empty(coalesce(parameters('targetNamespace'), ''))), createObject('targetNamespace', parameters('targetNamespace')), null())]" }, "version": "[parameters('version')]" - }, - "dependsOn": [ - "managedCluster" - ] + } }, "fluxConfiguration": { "copy": { @@ -364,8 +361,7 @@ } }, "dependsOn": [ - "extension", - "managedCluster" + "extension" ] } }, diff --git a/avm/res/kubernetes-configuration/flux-configuration/main.json b/avm/res/kubernetes-configuration/flux-configuration/main.json index ff775093cd..36757f6470 100644 --- a/avm/res/kubernetes-configuration/flux-configuration/main.json +++ b/avm/res/kubernetes-configuration/flux-configuration/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "542320603270173721" + "version": "0.32.4.45862", + "templateHash": "4127974464346115024" }, "name": "Kubernetes Configuration Flux Configurations", "description": "This module deploys a Kubernetes Configuration Flux Configuration.", @@ -141,10 +141,7 @@ "scope": "[parameters('scope')]", "sourceKind": "[parameters('sourceKind')]", "suspend": "[parameters('suspend')]" - }, - "dependsOn": [ - "managedCluster" - ] + } } }, "outputs": { diff --git a/avm/res/kusto/cluster/main.json b/avm/res/kusto/cluster/main.json index 5e34903c47..2b30e761b4 100644 --- a/avm/res/kusto/cluster/main.json +++ b/avm/res/kusto/cluster/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "4900908853804494979" + "version": "0.32.4.45862", + "templateHash": "15367877000338557713" }, "name": "Kusto Cluster", "description": "This module deploys a Kusto Cluster.", @@ -997,10 +997,7 @@ "apiVersion": "2023-07-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "avmTelemetry": { "condition": "[parameters('enableTelemetry')]", @@ -1072,6 +1069,7 @@ }, "zones": "[if(parameters('enableZoneRedundant'), createArray('1', '2', '3'), null())]", "dependsOn": [ + "cMKKeyVault::cMKKey", "cMKKeyVault" ] }, @@ -1188,8 +1186,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8181427043902078904" + "version": "0.32.4.45862", + "templateHash": "13618100155303497836" }, "name": "Kusto Cluster Principal Assignments", "description": "This module deploys a Kusto Cluster Principal Assignment.", diff --git a/avm/res/kusto/cluster/principal-assignment/main.json b/avm/res/kusto/cluster/principal-assignment/main.json index eec865b49e..6879a3ff4d 100644 --- a/avm/res/kusto/cluster/principal-assignment/main.json +++ b/avm/res/kusto/cluster/principal-assignment/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8181427043902078904" + "version": "0.32.4.45862", + "templateHash": "13618100155303497836" }, "name": "Kusto Cluster Principal Assignments", "description": "This module deploys a Kusto Cluster Principal Assignment.", diff --git a/avm/res/load-test-service/load-test/main.json b/avm/res/load-test-service/load-test/main.json index 6cb6419de7..6b8b259507 100644 --- a/avm/res/load-test-service/load-test/main.json +++ b/avm/res/load-test-service/load-test/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "6522012079937819109" + "version": "0.32.4.45862", + "templateHash": "10799569622118484973" }, "name": "Load Testing Service", "description": "This module deploys a Load test.", @@ -277,10 +277,7 @@ "apiVersion": "2023-02-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "loadTest_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -346,8 +343,7 @@ "encryption": "[if(not(empty(parameters('customerManagedKey'))), createObject('identity', createObject('type', 'UserAssigned', 'resourceId', if(not(empty(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'))), extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), '//'), '/')[2], split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), '////'), '/')[4]), 'Microsoft.ManagedIdentity/userAssignedIdentities', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), 'dummyMsi'), '/'))), null())), 'keyUrl', if(not(empty(tryGet(parameters('customerManagedKey'), 'keyVersion'))), format('{0}/{1}', reference('cMKKeyVault::cMKKey').keyUri, parameters('customerManagedKey').keyVersion), reference('cMKKeyVault::cMKKey').keyUriWithVersion)), null())]" }, "dependsOn": [ - "cMKKeyVault", - "cMKUserAssignedIdentity" + "cMKKeyVault::cMKKey" ] }, "loadTest_roleAssignments": { diff --git a/avm/res/network/dns-forwarding-ruleset/forwarding-rule/main.json b/avm/res/network/dns-forwarding-ruleset/forwarding-rule/main.json index f592f4e4ec..d22aa7bd21 100644 --- a/avm/res/network/dns-forwarding-ruleset/forwarding-rule/main.json +++ b/avm/res/network/dns-forwarding-ruleset/forwarding-rule/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "10407418001531703281" + "version": "0.32.4.45862", + "templateHash": "17165864764044430627" }, "name": "Dns Forwarding Rulesets Forwarding Rules", "description": "This template deploys Forwarding Rule in a Dns Forwarding Ruleset.", @@ -69,10 +69,7 @@ "forwardingRuleState": "[parameters('forwardingRuleState')]", "metadata": "[parameters('metadata')]", "targetDnsServers": "[parameters('targetDnsServers')]" - }, - "dependsOn": [ - "dnsForwardingRuleset" - ] + } } }, "outputs": { diff --git a/avm/res/network/dns-forwarding-ruleset/main.json b/avm/res/network/dns-forwarding-ruleset/main.json index 6d4f098492..77d66347d3 100644 --- a/avm/res/network/dns-forwarding-ruleset/main.json +++ b/avm/res/network/dns-forwarding-ruleset/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "4145709731033849736" + "version": "0.32.4.45862", + "templateHash": "16077001068365100119" }, "name": "Dns Forwarding Rulesets", "description": "This template deploys an dns forwarding ruleset.", @@ -394,8 +394,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "10407418001531703281" + "version": "0.32.4.45862", + "templateHash": "17165864764044430627" }, "name": "Dns Forwarding Rulesets Forwarding Rules", "description": "This template deploys Forwarding Rule in a Dns Forwarding Ruleset.", @@ -458,10 +458,7 @@ "forwardingRuleState": "[parameters('forwardingRuleState')]", "metadata": "[parameters('metadata')]", "targetDnsServers": "[parameters('targetDnsServers')]" - }, - "dependsOn": [ - "dnsForwardingRuleset" - ] + } } }, "outputs": { @@ -522,8 +519,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "7319659019579418232" + "version": "0.32.4.45862", + "templateHash": "15571195771593309920" }, "name": "Dns Forwarding Rulesets Virtual Network Links", "description": "This template deploys Virtual Network Link in a Dns Forwarding Ruleset.", @@ -573,10 +570,7 @@ "id": "[parameters('virtualNetworkResourceId')]" }, "metadata": "[parameters('metadata')]" - }, - "dependsOn": [ - "dnsForwardingRuleset" - ] + } } }, "outputs": { diff --git a/avm/res/network/dns-forwarding-ruleset/virtual-network-link/main.json b/avm/res/network/dns-forwarding-ruleset/virtual-network-link/main.json index 8cdbb65fc7..4b54b82000 100644 --- a/avm/res/network/dns-forwarding-ruleset/virtual-network-link/main.json +++ b/avm/res/network/dns-forwarding-ruleset/virtual-network-link/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "7319659019579418232" + "version": "0.32.4.45862", + "templateHash": "15571195771593309920" }, "name": "Dns Forwarding Rulesets Virtual Network Links", "description": "This template deploys Virtual Network Link in a Dns Forwarding Ruleset.", @@ -56,10 +56,7 @@ "id": "[parameters('virtualNetworkResourceId')]" }, "metadata": "[parameters('metadata')]" - }, - "dependsOn": [ - "dnsForwardingRuleset" - ] + } } }, "outputs": { diff --git a/avm/res/network/dns-resolver/inbound-endpoint/main.json b/avm/res/network/dns-resolver/inbound-endpoint/main.json index 9a658a36a5..673162903f 100644 --- a/avm/res/network/dns-resolver/inbound-endpoint/main.json +++ b/avm/res/network/dns-resolver/inbound-endpoint/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10392660876237354468" + "version": "0.32.4.45862", + "templateHash": "6624880039751785583" }, "name": "DNS Resolver Inbound Endpoint", "description": "This module deploys a DNS Resolver Inbound Endpoint.", @@ -84,10 +84,7 @@ "privateIpAllocationMethod": "[parameters('privateIpAllocationMethod')]" } ] - }, - "dependsOn": [ - "dnsResolver" - ] + } } }, "outputs": { diff --git a/avm/res/network/dns-resolver/main.json b/avm/res/network/dns-resolver/main.json index 9cf99b4b2f..d6974395a3 100644 --- a/avm/res/network/dns-resolver/main.json +++ b/avm/res/network/dns-resolver/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "4241820354615246390" + "version": "0.32.4.45862", + "templateHash": "15625169789280490544" }, "name": "DNS Resolver", "description": "This module deploys a DNS Resolver.", @@ -393,8 +393,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10392660876237354468" + "version": "0.32.4.45862", + "templateHash": "6624880039751785583" }, "name": "DNS Resolver Inbound Endpoint", "description": "This module deploys a DNS Resolver Inbound Endpoint.", @@ -472,10 +472,7 @@ "privateIpAllocationMethod": "[parameters('privateIpAllocationMethod')]" } ] - }, - "dependsOn": [ - "dnsResolver" - ] + } } }, "outputs": { @@ -544,8 +541,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "5025100485259764817" + "version": "0.32.4.45862", + "templateHash": "4211052041110233359" }, "name": "DNS Resolver Outbound Endpoint", "description": "This module deploys a DNS Resolver Outbound Endpoint.", @@ -603,10 +600,7 @@ "subnet": { "id": "[parameters('subnetResourceId')]" } - }, - "dependsOn": [ - "dnsResolver" - ] + } } }, "outputs": { diff --git a/avm/res/network/dns-resolver/outbound-endpoint/main.json b/avm/res/network/dns-resolver/outbound-endpoint/main.json index b3417d056e..6db02f41da 100644 --- a/avm/res/network/dns-resolver/outbound-endpoint/main.json +++ b/avm/res/network/dns-resolver/outbound-endpoint/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "5025100485259764817" + "version": "0.32.4.45862", + "templateHash": "4211052041110233359" }, "name": "DNS Resolver Outbound Endpoint", "description": "This module deploys a DNS Resolver Outbound Endpoint.", @@ -64,10 +64,7 @@ "subnet": { "id": "[parameters('subnetResourceId')]" } - }, - "dependsOn": [ - "dnsResolver" - ] + } } }, "outputs": { diff --git a/avm/res/network/dns-zone/a/main.json b/avm/res/network/dns-zone/a/main.json index e6f51bbffa..e4cddfd81f 100644 --- a/avm/res/network/dns-zone/a/main.json +++ b/avm/res/network/dns-zone/a/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17184746855591114267" + "version": "0.32.4.45862", + "templateHash": "2326491541446487905" }, "name": "Public DNS Zone A record", "description": "This module deploys a Public DNS Zone A record.", @@ -173,10 +173,7 @@ "metadata": "[parameters('metadata')]", "TTL": "[parameters('ttl')]", "targetResource": "[if(not(empty(parameters('targetResourceId'))), createObject('id', parameters('targetResourceId')), null())]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "A_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/aaaa/main.json b/avm/res/network/dns-zone/aaaa/main.json index 052ad33a1c..c4c76748ea 100644 --- a/avm/res/network/dns-zone/aaaa/main.json +++ b/avm/res/network/dns-zone/aaaa/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "7817764105789679714" + "version": "0.32.4.45862", + "templateHash": "17050721962929786080" }, "name": "Public DNS Zone AAAA record", "description": "This module deploys a Public DNS Zone AAAA record.", @@ -173,10 +173,7 @@ "metadata": "[parameters('metadata')]", "TTL": "[parameters('ttl')]", "targetResource": "[if(not(empty(parameters('targetResourceId'))), createObject('id', parameters('targetResourceId')), null())]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "AAAA_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/caa/main.json b/avm/res/network/dns-zone/caa/main.json index b384c36531..2fdfa5934d 100644 --- a/avm/res/network/dns-zone/caa/main.json +++ b/avm/res/network/dns-zone/caa/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "7392290278324947651" + "version": "0.32.4.45862", + "templateHash": "9019647418715778214" }, "name": "Public DNS Zone CAA record", "description": "This module deploys a Public DNS Zone CAA record.", @@ -165,10 +165,7 @@ "metadata": "[parameters('metadata')]", "caaRecords": "[parameters('caaRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "CAA_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/cname/main.json b/avm/res/network/dns-zone/cname/main.json index 5d88e2d542..401dd5c0d2 100644 --- a/avm/res/network/dns-zone/cname/main.json +++ b/avm/res/network/dns-zone/cname/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "14841477015461182740" + "version": "0.32.4.45862", + "templateHash": "7801716337979819896" }, "name": "Public DNS Zone CNAME record", "description": "This module deploys a Public DNS Zone CNAME record.", @@ -173,10 +173,7 @@ "metadata": "[parameters('metadata')]", "TTL": "[parameters('ttl')]", "targetResource": "[if(not(empty(parameters('targetResourceId'))), createObject('id', parameters('targetResourceId')), null())]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "CNAME_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/main.json b/avm/res/network/dns-zone/main.json index f11e90583f..402d1dd44a 100644 --- a/avm/res/network/dns-zone/main.json +++ b/avm/res/network/dns-zone/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "3210797771365278499" + "version": "0.32.4.45862", + "templateHash": "4064950797693018837" }, "name": "Public DNS Zones", "description": "This module deploys a Public DNS zone.", @@ -969,8 +969,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17184746855591114267" + "version": "0.32.4.45862", + "templateHash": "2326491541446487905" }, "name": "Public DNS Zone A record", "description": "This module deploys a Public DNS Zone A record.", @@ -1137,10 +1137,7 @@ "metadata": "[parameters('metadata')]", "TTL": "[parameters('ttl')]", "targetResource": "[if(not(empty(parameters('targetResourceId'))), createObject('id', parameters('targetResourceId')), null())]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "A_roleAssignments": { "copy": { @@ -1237,8 +1234,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "7817764105789679714" + "version": "0.32.4.45862", + "templateHash": "17050721962929786080" }, "name": "Public DNS Zone AAAA record", "description": "This module deploys a Public DNS Zone AAAA record.", @@ -1405,10 +1402,7 @@ "metadata": "[parameters('metadata')]", "TTL": "[parameters('ttl')]", "targetResource": "[if(not(empty(parameters('targetResourceId'))), createObject('id', parameters('targetResourceId')), null())]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "AAAA_roleAssignments": { "copy": { @@ -1505,8 +1499,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "14841477015461182740" + "version": "0.32.4.45862", + "templateHash": "7801716337979819896" }, "name": "Public DNS Zone CNAME record", "description": "This module deploys a Public DNS Zone CNAME record.", @@ -1673,10 +1667,7 @@ "metadata": "[parameters('metadata')]", "TTL": "[parameters('ttl')]", "targetResource": "[if(not(empty(parameters('targetResourceId'))), createObject('id', parameters('targetResourceId')), null())]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "CNAME_roleAssignments": { "copy": { @@ -1770,8 +1761,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "7392290278324947651" + "version": "0.32.4.45862", + "templateHash": "9019647418715778214" }, "name": "Public DNS Zone CAA record", "description": "This module deploys a Public DNS Zone CAA record.", @@ -1930,10 +1921,7 @@ "metadata": "[parameters('metadata')]", "caaRecords": "[parameters('caaRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "CAA_roleAssignments": { "copy": { @@ -2027,8 +2015,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "6270819353969968995" + "version": "0.32.4.45862", + "templateHash": "6127933726132900344" }, "name": "Public DNS Zone MX record", "description": "This module deploys a Public DNS Zone MX record.", @@ -2187,10 +2175,7 @@ "metadata": "[parameters('metadata')]", "MXRecords": "[parameters('mxRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "MX_roleAssignments": { "copy": { @@ -2284,8 +2269,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "14380397644512533588" + "version": "0.32.4.45862", + "templateHash": "5272805845421818843" }, "name": "Public DNS Zone NS record", "description": "This module deploys a Public DNS Zone NS record.", @@ -2444,10 +2429,7 @@ "metadata": "[parameters('metadata')]", "NSRecords": "[parameters('nsRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "NS_roleAssignments": { "copy": { @@ -2541,8 +2523,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "832235689182152716" + "version": "0.32.4.45862", + "templateHash": "7174722682201993647" }, "name": "Public DNS Zone PTR record", "description": "This module deploys a Public DNS Zone PTR record.", @@ -2701,10 +2683,7 @@ "metadata": "[parameters('metadata')]", "PTRRecords": "[parameters('ptrRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "PTR_roleAssignments": { "copy": { @@ -2798,8 +2777,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "18205185605727276078" + "version": "0.32.4.45862", + "templateHash": "8699513060398264509" }, "name": "Public DNS Zone SOA record", "description": "This module deploys a Public DNS Zone SOA record.", @@ -2958,10 +2937,7 @@ "metadata": "[parameters('metadata')]", "SOARecord": "[parameters('soaRecord')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "SOA_roleAssignments": { "copy": { @@ -3055,8 +3031,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17838962507786847676" + "version": "0.32.4.45862", + "templateHash": "9201580860688784326" }, "name": "Public DNS Zone SRV record", "description": "This module deploys a Public DNS Zone SRV record.", @@ -3215,10 +3191,7 @@ "metadata": "[parameters('metadata')]", "SRVRecords": "[parameters('srvRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "SRV_roleAssignments": { "copy": { @@ -3312,8 +3285,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "8037353991621891503" + "version": "0.32.4.45862", + "templateHash": "12041383892639375688" }, "name": "Public DNS Zone TXT record", "description": "This module deploys a Public DNS Zone TXT record.", @@ -3472,10 +3445,7 @@ "metadata": "[parameters('metadata')]", "TTL": "[parameters('ttl')]", "TXTRecords": "[parameters('txtRecords')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "TXT_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/mx/main.json b/avm/res/network/dns-zone/mx/main.json index 8e631bdce2..775334424a 100644 --- a/avm/res/network/dns-zone/mx/main.json +++ b/avm/res/network/dns-zone/mx/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "6270819353969968995" + "version": "0.32.4.45862", + "templateHash": "6127933726132900344" }, "name": "Public DNS Zone MX record", "description": "This module deploys a Public DNS Zone MX record.", @@ -165,10 +165,7 @@ "metadata": "[parameters('metadata')]", "MXRecords": "[parameters('mxRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "MX_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/ns/main.json b/avm/res/network/dns-zone/ns/main.json index 06fd77734a..e7f944982e 100644 --- a/avm/res/network/dns-zone/ns/main.json +++ b/avm/res/network/dns-zone/ns/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "14380397644512533588" + "version": "0.32.4.45862", + "templateHash": "5272805845421818843" }, "name": "Public DNS Zone NS record", "description": "This module deploys a Public DNS Zone NS record.", @@ -165,10 +165,7 @@ "metadata": "[parameters('metadata')]", "NSRecords": "[parameters('nsRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "NS_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/ptr/main.json b/avm/res/network/dns-zone/ptr/main.json index 9e982b7373..0153c13b56 100644 --- a/avm/res/network/dns-zone/ptr/main.json +++ b/avm/res/network/dns-zone/ptr/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "832235689182152716" + "version": "0.32.4.45862", + "templateHash": "7174722682201993647" }, "name": "Public DNS Zone PTR record", "description": "This module deploys a Public DNS Zone PTR record.", @@ -165,10 +165,7 @@ "metadata": "[parameters('metadata')]", "PTRRecords": "[parameters('ptrRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "PTR_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/soa/main.json b/avm/res/network/dns-zone/soa/main.json index 59d9439bb1..f10c10faee 100644 --- a/avm/res/network/dns-zone/soa/main.json +++ b/avm/res/network/dns-zone/soa/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "18205185605727276078" + "version": "0.32.4.45862", + "templateHash": "8699513060398264509" }, "name": "Public DNS Zone SOA record", "description": "This module deploys a Public DNS Zone SOA record.", @@ -165,10 +165,7 @@ "metadata": "[parameters('metadata')]", "SOARecord": "[parameters('soaRecord')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "SOA_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/srv/main.json b/avm/res/network/dns-zone/srv/main.json index 4f8506f0e7..26139ebca3 100644 --- a/avm/res/network/dns-zone/srv/main.json +++ b/avm/res/network/dns-zone/srv/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17838962507786847676" + "version": "0.32.4.45862", + "templateHash": "9201580860688784326" }, "name": "Public DNS Zone SRV record", "description": "This module deploys a Public DNS Zone SRV record.", @@ -165,10 +165,7 @@ "metadata": "[parameters('metadata')]", "SRVRecords": "[parameters('srvRecords')]", "TTL": "[parameters('ttl')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "SRV_roleAssignments": { "copy": { diff --git a/avm/res/network/dns-zone/txt/main.json b/avm/res/network/dns-zone/txt/main.json index ef9385fe38..2db51cf999 100644 --- a/avm/res/network/dns-zone/txt/main.json +++ b/avm/res/network/dns-zone/txt/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "8037353991621891503" + "version": "0.32.4.45862", + "templateHash": "12041383892639375688" }, "name": "Public DNS Zone TXT record", "description": "This module deploys a Public DNS Zone TXT record.", @@ -165,10 +165,7 @@ "metadata": "[parameters('metadata')]", "TTL": "[parameters('ttl')]", "TXTRecords": "[parameters('txtRecords')]" - }, - "dependsOn": [ - "dnsZone" - ] + } }, "TXT_roleAssignments": { "copy": { diff --git a/avm/res/network/firewall-policy/main.json b/avm/res/network/firewall-policy/main.json index 299b7947a5..9d6a01ad06 100644 --- a/avm/res/network/firewall-policy/main.json +++ b/avm/res/network/firewall-policy/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "15412546608723758936" + "version": "0.32.4.45862", + "templateHash": "8101726979251102257" }, "name": "Firewall Policies", "description": "This module deploys a Firewall Policy.", @@ -471,8 +471,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "4286918441341976962" + "version": "0.32.4.45862", + "templateHash": "16690847140692561221" }, "name": "Firewall Policy Rule Collection Groups", "description": "This module deploys a Firewall Policy Rule Collection Group.", @@ -519,10 +519,7 @@ "properties": { "priority": "[parameters('priority')]", "ruleCollections": "[coalesce(parameters('ruleCollections'), createArray())]" - }, - "dependsOn": [ - "firewallPolicy" - ] + } } }, "outputs": { diff --git a/avm/res/network/firewall-policy/rule-collection-group/main.json b/avm/res/network/firewall-policy/rule-collection-group/main.json index c3276a62ed..c40dd439d8 100644 --- a/avm/res/network/firewall-policy/rule-collection-group/main.json +++ b/avm/res/network/firewall-policy/rule-collection-group/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "4286918441341976962" + "version": "0.32.4.45862", + "templateHash": "16690847140692561221" }, "name": "Firewall Policy Rule Collection Groups", "description": "This module deploys a Firewall Policy Rule Collection Group.", @@ -53,10 +53,7 @@ "properties": { "priority": "[parameters('priority')]", "ruleCollections": "[coalesce(parameters('ruleCollections'), createArray())]" - }, - "dependsOn": [ - "firewallPolicy" - ] + } } }, "outputs": { diff --git a/avm/res/network/load-balancer/backend-address-pool/main.json b/avm/res/network/load-balancer/backend-address-pool/main.json index c91188cf10..de6a2fd055 100644 --- a/avm/res/network/load-balancer/backend-address-pool/main.json +++ b/avm/res/network/load-balancer/backend-address-pool/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "3982666655179652966" + "version": "0.32.4.45862", + "templateHash": "17961169732410014510" }, "name": "Load Balancer Backend Address Pools", "description": "This module deploys a Load Balancer Backend Address Pools.", diff --git a/avm/res/network/load-balancer/inbound-nat-rule/main.json b/avm/res/network/load-balancer/inbound-nat-rule/main.json index 2e0551e452..3031d16af5 100644 --- a/avm/res/network/load-balancer/inbound-nat-rule/main.json +++ b/avm/res/network/load-balancer/inbound-nat-rule/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "6803574874056484597" + "version": "0.32.4.45862", + "templateHash": "11972266991775052277" }, "name": "Load Balancer Inbound NAT Rules", "description": "This module deploys a Load Balancer Inbound NAT Rules.", @@ -131,10 +131,7 @@ "frontendPortRangeEnd": "[parameters('frontendPortRangeEnd')]", "idleTimeoutInMinutes": "[parameters('idleTimeoutInMinutes')]", "protocol": "[parameters('protocol')]" - }, - "dependsOn": [ - "loadBalancer" - ] + } } }, "outputs": { diff --git a/avm/res/network/load-balancer/main.json b/avm/res/network/load-balancer/main.json index 5ea80aaab2..d71f5eb2a2 100644 --- a/avm/res/network/load-balancer/main.json +++ b/avm/res/network/load-balancer/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "3722345365989936168" + "version": "0.32.4.45862", + "templateHash": "5891499018083711599" }, "name": "Load Balancers", "description": "This module deploys a Load Balancer.", @@ -579,8 +579,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "3982666655179652966" + "version": "0.32.4.45862", + "templateHash": "17961169732410014510" }, "name": "Load Balancer Backend Address Pools", "description": "This module deploys a Load Balancer Backend Address Pools.", @@ -733,8 +733,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "6803574874056484597" + "version": "0.32.4.45862", + "templateHash": "11972266991775052277" }, "name": "Load Balancer Inbound NAT Rules", "description": "This module deploys a Load Balancer Inbound NAT Rules.", @@ -859,10 +859,7 @@ "frontendPortRangeEnd": "[parameters('frontendPortRangeEnd')]", "idleTimeoutInMinutes": "[parameters('idleTimeoutInMinutes')]", "protocol": "[parameters('protocol')]" - }, - "dependsOn": [ - "loadBalancer" - ] + } } }, "outputs": { diff --git a/avm/res/network/network-manager/connectivity-configuration/main.json b/avm/res/network/network-manager/connectivity-configuration/main.json index df61b0ba14..62a2fe4589 100644 --- a/avm/res/network/network-manager/connectivity-configuration/main.json +++ b/avm/res/network/network-manager/connectivity-configuration/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "12034113765565179248" + "version": "0.32.4.45862", + "templateHash": "9454472323100733583" }, "name": "Network Manager Connectivity Configurations", "description": "This module deploys a Network Manager Connectivity Configuration.\nConnectivity configurations define hub-and-spoke or mesh topologies applied to one or more network groups.", @@ -153,10 +153,7 @@ "description": "[coalesce(parameters('description'), '')]", "hubs": "[if(equals(parameters('connectivityTopology'), 'HubAndSpoke'), parameters('hubs'), createArray())]", "isGlobal": "[string(parameters('isGlobal'))]" - }, - "dependsOn": [ - "networkManager" - ] + } } }, "outputs": { diff --git a/avm/res/network/network-manager/main.json b/avm/res/network/network-manager/main.json index 6b63cf272d..f0c9304890 100644 --- a/avm/res/network/network-manager/main.json +++ b/avm/res/network/network-manager/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "13151738570302546386" + "version": "0.32.4.45862", + "templateHash": "2327598248014825071" }, "name": "Network Managers", "description": "This module deploys a Network Manager.", @@ -767,8 +767,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "801055427127865897" + "version": "0.32.4.45862", + "templateHash": "8871976301945912789" }, "name": "Network Manager Network Groups", "description": "This module deploys a Network Manager Network Group.\nA network group is a collection of same-type network resources that you can associate with network manager configurations. You can add same-type network resources after you create the network group.", @@ -839,10 +839,7 @@ "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('name'))]", "properties": { "description": "[coalesce(parameters('description'), '')]" - }, - "dependsOn": [ - "networkManager" - ] + } }, "networkGroup_staticMembers": { "copy": { @@ -877,8 +874,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "13401706108335869614" + "version": "0.32.4.45862", + "templateHash": "17179520824104313247" }, "name": "Network Manager Network Group Static Members", "description": "This module deploys a Network Manager Network Group Static Member.\nStatic membership allows you to explicitly add virtual networks to a group by manually selecting individual virtual networks.", @@ -946,8 +943,7 @@ } }, "dependsOn": [ - "networkGroup", - "networkManager" + "networkGroup" ] } }, @@ -1026,8 +1022,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "12034113765565179248" + "version": "0.32.4.45862", + "templateHash": "9454472323100733583" }, "name": "Network Manager Connectivity Configurations", "description": "This module deploys a Network Manager Connectivity Configuration.\nConnectivity configurations define hub-and-spoke or mesh topologies applied to one or more network groups.", @@ -1174,10 +1170,7 @@ "description": "[coalesce(parameters('description'), '')]", "hubs": "[if(equals(parameters('connectivityTopology'), 'HubAndSpoke'), parameters('hubs'), createArray())]", "isGlobal": "[string(parameters('isGlobal'))]" - }, - "dependsOn": [ - "networkManager" - ] + } } }, "outputs": { @@ -1247,8 +1240,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "15080082205181838369" + "version": "0.32.4.45862", + "templateHash": "15079843378119506037" }, "name": "Network Manager Scope Connections", "description": "This module deploys a Network Manager Scope Connection.\nCreate a cross-tenant connection to manage a resource from another tenant.", @@ -1304,10 +1297,7 @@ "description": "[coalesce(parameters('description'), '')]", "resourceId": "[parameters('resourceId')]", "tenantId": "[parameters('tenantId')]" - }, - "dependsOn": [ - "networkManager" - ] + } } }, "outputs": { @@ -1376,8 +1366,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10895784239828351157" + "version": "0.32.4.45862", + "templateHash": "1513499222839675769" }, "name": "Network Manager Security Admin Configurations", "description": "This module deploys an Network Manager Security Admin Configuration.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules.", @@ -1625,10 +1615,7 @@ "properties": { "description": "[coalesce(parameters('description'), '')]", "applyOnNetworkIntentPolicyBasedServices": "[parameters('applyOnNetworkIntentPolicyBasedServices')]" - }, - "dependsOn": [ - "networkManager" - ] + } }, "securityAdminConfigurations_ruleCollections": { "copy": { @@ -1670,8 +1657,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10012310325610818113" + "version": "0.32.4.45862", + "templateHash": "2660798758480993366" }, "name": "Network Manager Security Admin Configuration Rule Collections", "description": "This module deploys an Network Manager Security Admin Configuration Rule Collection.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules. Security admin rules allows enforcing security policy criteria that matches the conditions set. Warning: A rule collection without rule will cause a deployment configuration for security admin goal state in network manager to fail.", @@ -1880,10 +1867,7 @@ "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]", - "dependsOn": [ - "networkManager" - ] + "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]" }, "networkManager": { "existing": true, @@ -1898,10 +1882,7 @@ "properties": { "description": "[coalesce(parameters('description'), '')]", "appliesToGroups": "[map(parameters('appliesToGroups'), lambda('group', createObject('networkGroupId', lambdaVariables('group').networkGroupResourceId)))]" - }, - "dependsOn": [ - "networkManager::securityAdminConfiguration" - ] + } }, "securityAdminConfigurations_rules": { "copy": { @@ -1964,8 +1945,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17218572797495425587" + "version": "0.32.4.45862", + "templateHash": "17715910169740786334" }, "name": "Network Manager Security Admin Configuration Rule Collection Rules", "description": "This module deploys an Azure Virtual Network Manager (AVNM) Security Admin Configuration Rule Collection Rule.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules.", @@ -2152,19 +2133,13 @@ "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}/{2}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'), parameters('ruleCollectionName'))]", - "dependsOn": [ - "networkManager::securityAdminConfiguration" - ] + "name": "[format('{0}/{1}/{2}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'), parameters('ruleCollectionName'))]" }, "networkManager::securityAdminConfiguration": { "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]", - "dependsOn": [ - "networkManager" - ] + "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]" }, "networkManager": { "existing": true, @@ -2187,10 +2162,7 @@ "protocol": "[parameters('protocol')]", "sourcePortRanges": "[parameters('sourcePortRanges')]", "sources": "[parameters('sources')]" - }, - "dependsOn": [ - "networkManager::securityAdminConfiguration::ruleCollection" - ] + } } }, "outputs": { @@ -2219,7 +2191,6 @@ } }, "dependsOn": [ - "networkManager", "ruleCollection" ] } @@ -2250,7 +2221,6 @@ } }, "dependsOn": [ - "networkManager", "securityAdminConfigurations" ] } diff --git a/avm/res/network/network-manager/network-group/main.json b/avm/res/network/network-manager/network-group/main.json index f1a3507779..67733f979a 100644 --- a/avm/res/network/network-manager/network-group/main.json +++ b/avm/res/network/network-manager/network-group/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "801055427127865897" + "version": "0.32.4.45862", + "templateHash": "8871976301945912789" }, "name": "Network Manager Network Groups", "description": "This module deploys a Network Manager Network Group.\nA network group is a collection of same-type network resources that you can associate with network manager configurations. You can add same-type network resources after you create the network group.", @@ -77,10 +77,7 @@ "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('name'))]", "properties": { "description": "[coalesce(parameters('description'), '')]" - }, - "dependsOn": [ - "networkManager" - ] + } }, "networkGroup_staticMembers": { "copy": { @@ -115,8 +112,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "13401706108335869614" + "version": "0.32.4.45862", + "templateHash": "17179520824104313247" }, "name": "Network Manager Network Group Static Members", "description": "This module deploys a Network Manager Network Group Static Member.\nStatic membership allows you to explicitly add virtual networks to a group by manually selecting individual virtual networks.", @@ -184,8 +181,7 @@ } }, "dependsOn": [ - "networkGroup", - "networkManager" + "networkGroup" ] } }, diff --git a/avm/res/network/network-manager/network-group/static-member/main.json b/avm/res/network/network-manager/network-group/static-member/main.json index 9fa6afbfbb..001b6db29c 100644 --- a/avm/res/network/network-manager/network-group/static-member/main.json +++ b/avm/res/network/network-manager/network-group/static-member/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "13401706108335869614" + "version": "0.32.4.45862", + "templateHash": "17179520824104313247" }, "name": "Network Manager Network Group Static Members", "description": "This module deploys a Network Manager Network Group Static Member.\nStatic membership allows you to explicitly add virtual networks to a group by manually selecting individual virtual networks.", diff --git a/avm/res/network/network-manager/scope-connection/main.json b/avm/res/network/network-manager/scope-connection/main.json index ec24288164..90a8185dd3 100644 --- a/avm/res/network/network-manager/scope-connection/main.json +++ b/avm/res/network/network-manager/scope-connection/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "15080082205181838369" + "version": "0.32.4.45862", + "templateHash": "15079843378119506037" }, "name": "Network Manager Scope Connections", "description": "This module deploys a Network Manager Scope Connection.\nCreate a cross-tenant connection to manage a resource from another tenant.", @@ -62,10 +62,7 @@ "description": "[coalesce(parameters('description'), '')]", "resourceId": "[parameters('resourceId')]", "tenantId": "[parameters('tenantId')]" - }, - "dependsOn": [ - "networkManager" - ] + } } }, "outputs": { diff --git a/avm/res/network/network-manager/security-admin-configuration/main.json b/avm/res/network/network-manager/security-admin-configuration/main.json index e032b526fd..00a3898765 100644 --- a/avm/res/network/network-manager/security-admin-configuration/main.json +++ b/avm/res/network/network-manager/security-admin-configuration/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10895784239828351157" + "version": "0.32.4.45862", + "templateHash": "1513499222839675769" }, "name": "Network Manager Security Admin Configurations", "description": "This module deploys an Network Manager Security Admin Configuration.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules.", @@ -254,10 +254,7 @@ "properties": { "description": "[coalesce(parameters('description'), '')]", "applyOnNetworkIntentPolicyBasedServices": "[parameters('applyOnNetworkIntentPolicyBasedServices')]" - }, - "dependsOn": [ - "networkManager" - ] + } }, "securityAdminConfigurations_ruleCollections": { "copy": { @@ -299,8 +296,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10012310325610818113" + "version": "0.32.4.45862", + "templateHash": "2660798758480993366" }, "name": "Network Manager Security Admin Configuration Rule Collections", "description": "This module deploys an Network Manager Security Admin Configuration Rule Collection.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules. Security admin rules allows enforcing security policy criteria that matches the conditions set. Warning: A rule collection without rule will cause a deployment configuration for security admin goal state in network manager to fail.", @@ -509,10 +506,7 @@ "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]", - "dependsOn": [ - "networkManager" - ] + "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]" }, "networkManager": { "existing": true, @@ -527,10 +521,7 @@ "properties": { "description": "[coalesce(parameters('description'), '')]", "appliesToGroups": "[map(parameters('appliesToGroups'), lambda('group', createObject('networkGroupId', lambdaVariables('group').networkGroupResourceId)))]" - }, - "dependsOn": [ - "networkManager::securityAdminConfiguration" - ] + } }, "securityAdminConfigurations_rules": { "copy": { @@ -593,8 +584,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17218572797495425587" + "version": "0.32.4.45862", + "templateHash": "17715910169740786334" }, "name": "Network Manager Security Admin Configuration Rule Collection Rules", "description": "This module deploys an Azure Virtual Network Manager (AVNM) Security Admin Configuration Rule Collection Rule.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules.", @@ -781,19 +772,13 @@ "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}/{2}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'), parameters('ruleCollectionName'))]", - "dependsOn": [ - "networkManager::securityAdminConfiguration" - ] + "name": "[format('{0}/{1}/{2}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'), parameters('ruleCollectionName'))]" }, "networkManager::securityAdminConfiguration": { "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]", - "dependsOn": [ - "networkManager" - ] + "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]" }, "networkManager": { "existing": true, @@ -816,10 +801,7 @@ "protocol": "[parameters('protocol')]", "sourcePortRanges": "[parameters('sourcePortRanges')]", "sources": "[parameters('sources')]" - }, - "dependsOn": [ - "networkManager::securityAdminConfiguration::ruleCollection" - ] + } } }, "outputs": { @@ -848,7 +830,6 @@ } }, "dependsOn": [ - "networkManager", "ruleCollection" ] } @@ -879,7 +860,6 @@ } }, "dependsOn": [ - "networkManager", "securityAdminConfigurations" ] } diff --git a/avm/res/network/network-manager/security-admin-configuration/rule-collection/main.json b/avm/res/network/network-manager/security-admin-configuration/rule-collection/main.json index 79b3cfd98c..15d60bd4c2 100644 --- a/avm/res/network/network-manager/security-admin-configuration/rule-collection/main.json +++ b/avm/res/network/network-manager/security-admin-configuration/rule-collection/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "10012310325610818113" + "version": "0.32.4.45862", + "templateHash": "2660798758480993366" }, "name": "Network Manager Security Admin Configuration Rule Collections", "description": "This module deploys an Network Manager Security Admin Configuration Rule Collection.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules. Security admin rules allows enforcing security policy criteria that matches the conditions set. Warning: A rule collection without rule will cause a deployment configuration for security admin goal state in network manager to fail.", @@ -215,10 +215,7 @@ "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]", - "dependsOn": [ - "networkManager" - ] + "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]" }, "networkManager": { "existing": true, @@ -233,10 +230,7 @@ "properties": { "description": "[coalesce(parameters('description'), '')]", "appliesToGroups": "[map(parameters('appliesToGroups'), lambda('group', createObject('networkGroupId', lambdaVariables('group').networkGroupResourceId)))]" - }, - "dependsOn": [ - "networkManager::securityAdminConfiguration" - ] + } }, "securityAdminConfigurations_rules": { "copy": { @@ -299,8 +293,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17218572797495425587" + "version": "0.32.4.45862", + "templateHash": "17715910169740786334" }, "name": "Network Manager Security Admin Configuration Rule Collection Rules", "description": "This module deploys an Azure Virtual Network Manager (AVNM) Security Admin Configuration Rule Collection Rule.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules.", @@ -487,19 +481,13 @@ "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}/{2}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'), parameters('ruleCollectionName'))]", - "dependsOn": [ - "networkManager::securityAdminConfiguration" - ] + "name": "[format('{0}/{1}/{2}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'), parameters('ruleCollectionName'))]" }, "networkManager::securityAdminConfiguration": { "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]", - "dependsOn": [ - "networkManager" - ] + "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]" }, "networkManager": { "existing": true, @@ -522,10 +510,7 @@ "protocol": "[parameters('protocol')]", "sourcePortRanges": "[parameters('sourcePortRanges')]", "sources": "[parameters('sources')]" - }, - "dependsOn": [ - "networkManager::securityAdminConfiguration::ruleCollection" - ] + } } }, "outputs": { @@ -554,7 +539,6 @@ } }, "dependsOn": [ - "networkManager", "ruleCollection" ] } diff --git a/avm/res/network/network-manager/security-admin-configuration/rule-collection/rule/main.json b/avm/res/network/network-manager/security-admin-configuration/rule-collection/rule/main.json index 1cf0e8035c..c6aab07910 100644 --- a/avm/res/network/network-manager/security-admin-configuration/rule-collection/rule/main.json +++ b/avm/res/network/network-manager/security-admin-configuration/rule-collection/rule/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "17218572797495425587" + "version": "0.32.4.45862", + "templateHash": "17715910169740786334" }, "name": "Network Manager Security Admin Configuration Rule Collection Rules", "description": "This module deploys an Azure Virtual Network Manager (AVNM) Security Admin Configuration Rule Collection Rule.\nA security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules.", @@ -193,19 +193,13 @@ "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}/{2}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'), parameters('ruleCollectionName'))]", - "dependsOn": [ - "networkManager::securityAdminConfiguration" - ] + "name": "[format('{0}/{1}/{2}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'), parameters('ruleCollectionName'))]" }, "networkManager::securityAdminConfiguration": { "existing": true, "type": "Microsoft.Network/networkManagers/securityAdminConfigurations", "apiVersion": "2023-11-01", - "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]", - "dependsOn": [ - "networkManager" - ] + "name": "[format('{0}/{1}', parameters('networkManagerName'), parameters('securityAdminConfigurationName'))]" }, "networkManager": { "existing": true, @@ -228,10 +222,7 @@ "protocol": "[parameters('protocol')]", "sourcePortRanges": "[parameters('sourcePortRanges')]", "sources": "[parameters('sources')]" - }, - "dependsOn": [ - "networkManager::securityAdminConfiguration::ruleCollection" - ] + } } }, "outputs": { diff --git a/avm/res/network/network-watcher/connection-monitor/main.json b/avm/res/network/network-watcher/connection-monitor/main.json index 499727cc05..69b3bdfa0d 100644 --- a/avm/res/network/network-watcher/connection-monitor/main.json +++ b/avm/res/network/network-watcher/connection-monitor/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "1395789016631295523" + "version": "0.32.4.45862", + "templateHash": "5171031514480063459" }, "name": "Network Watchers Connection Monitors", "description": "This module deploys a Network Watcher Connection Monitor.", @@ -87,10 +87,7 @@ "testConfigurations": "[parameters('testConfigurations')]", "testGroups": "[parameters('testGroups')]", "outputs": "[if(not(empty(parameters('workspaceResourceId'))), createArray(createObject('type', 'Workspace', 'workspaceSettings', createObject('workspaceResourceId', parameters('workspaceResourceId')))), null())]" - }, - "dependsOn": [ - "networkWatcher" - ] + } } }, "outputs": { diff --git a/avm/res/network/network-watcher/flow-log/main.json b/avm/res/network/network-watcher/flow-log/main.json index 625358d232..f562d78010 100644 --- a/avm/res/network/network-watcher/flow-log/main.json +++ b/avm/res/network/network-watcher/flow-log/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "2231753294747447946" + "version": "0.32.4.45862", + "templateHash": "3458210252337234612" }, "name": "NSG Flow Logs", "description": "This module controls the Network Security Group Flow Logs and analytics settings.\n**Note: this module must be run on the Resource Group where Network Watcher is deployed**", @@ -128,10 +128,7 @@ "version": "[parameters('formatVersion')]" }, "flowAnalyticsConfiguration": "[variables('flowAnalyticsConfiguration')]" - }, - "dependsOn": [ - "networkWatcher" - ] + } } }, "outputs": { diff --git a/avm/res/network/network-watcher/main.json b/avm/res/network/network-watcher/main.json index 1c40e0d2f7..c080d12d4e 100644 --- a/avm/res/network/network-watcher/main.json +++ b/avm/res/network/network-watcher/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "1861651489182627832" + "version": "0.32.4.45862", + "templateHash": "6074776926159807675" }, "name": "Network Watchers", "description": "This module deploys a Network Watcher.", @@ -286,8 +286,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "1395789016631295523" + "version": "0.32.4.45862", + "templateHash": "5171031514480063459" }, "name": "Network Watchers Connection Monitors", "description": "This module deploys a Network Watcher Connection Monitor.", @@ -368,10 +368,7 @@ "testConfigurations": "[parameters('testConfigurations')]", "testGroups": "[parameters('testGroups')]", "outputs": "[if(not(empty(parameters('workspaceResourceId'))), createArray(createObject('type', 'Workspace', 'workspaceSettings', createObject('workspaceResourceId', parameters('workspaceResourceId')))), null())]" - }, - "dependsOn": [ - "networkWatcher" - ] + } } }, "outputs": { @@ -448,8 +445,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.29.47.4906", - "templateHash": "2231753294747447946" + "version": "0.32.4.45862", + "templateHash": "3458210252337234612" }, "name": "NSG Flow Logs", "description": "This module controls the Network Security Group Flow Logs and analytics settings.\n**Note: this module must be run on the Resource Group where Network Watcher is deployed**", @@ -571,10 +568,7 @@ "version": "[parameters('formatVersion')]" }, "flowAnalyticsConfiguration": "[variables('flowAnalyticsConfiguration')]" - }, - "dependsOn": [ - "networkWatcher" - ] + } } }, "outputs": { diff --git a/avm/res/network/private-endpoint/main.json b/avm/res/network/private-endpoint/main.json index eb5ff7f266..5eff2b26ba 100644 --- a/avm/res/network/private-endpoint/main.json +++ b/avm/res/network/private-endpoint/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "602726199400096960" + "version": "0.32.4.45862", + "templateHash": "8226330975866159938" }, "name": "Private Endpoints", "description": "This module deploys a Private Endpoint.", @@ -566,8 +566,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "12329174801198479603" + "version": "0.32.4.45862", + "templateHash": "14591244586837935522" }, "name": "Private Endpoint Private DNS Zone Groups", "description": "This module deploys a Private Endpoint Private DNS Zone Group.", @@ -649,10 +649,7 @@ "name": "[format('{0}/{1}', parameters('privateEndpointName'), parameters('name'))]", "properties": { "privateDnsZoneConfigs": "[variables('privateDnsZoneConfigsVar')]" - }, - "dependsOn": [ - "privateEndpoint" - ] + } } }, "outputs": { diff --git a/avm/res/network/private-endpoint/private-dns-zone-group/main.json b/avm/res/network/private-endpoint/private-dns-zone-group/main.json index 30a4592a54..93b8449154 100644 --- a/avm/res/network/private-endpoint/private-dns-zone-group/main.json +++ b/avm/res/network/private-endpoint/private-dns-zone-group/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "12329174801198479603" + "version": "0.32.4.45862", + "templateHash": "14591244586837935522" }, "name": "Private Endpoint Private DNS Zone Groups", "description": "This module deploys a Private Endpoint Private DNS Zone Group.", @@ -88,10 +88,7 @@ "name": "[format('{0}/{1}', parameters('privateEndpointName'), parameters('name'))]", "properties": { "privateDnsZoneConfigs": "[variables('privateDnsZoneConfigsVar')]" - }, - "dependsOn": [ - "privateEndpoint" - ] + } } }, "outputs": { diff --git a/avm/res/network/public-ip-address/README.md b/avm/res/network/public-ip-address/README.md index e972b42769..b392a84ddd 100644 --- a/avm/res/network/public-ip-address/README.md +++ b/avm/res/network/public-ip-address/README.md @@ -29,8 +29,8 @@ The following section provides usage examples for the module, which were used to >**Note**: To reference the module, please use the following syntax `br/public:avm/res/network/public-ip-address:`. - [Using only defaults](#example-1-using-only-defaults) -- [Max](#example-2-max) -- [Waf-Aligned](#example-3-waf-aligned) +- [Using large parameter set](#example-2-using-large-parameter-set) +- [WAF-aligned](#example-3-waf-aligned) ### Example 1: _Using only defaults_ @@ -96,7 +96,10 @@ param location = ''

-### Example 2: _Max_ +### Example 2: _Using large parameter set_ + +This instance deploys the module with most of its features enabled. +

@@ -348,7 +351,10 @@ param zones = [

-### Example 3: _Waf-Aligned_ +### Example 3: _WAF-aligned_ + +This instance deploys the module in alignment with the best-practices of the Azure Well-Architected Framework. +

diff --git a/avm/res/network/public-ip-address/main.json b/avm/res/network/public-ip-address/main.json index 1052a87909..011c559ce6 100644 --- a/avm/res/network/public-ip-address/main.json +++ b/avm/res/network/public-ip-address/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "11325859316909755285" + "version": "0.32.4.45862", + "templateHash": "16694039693135179642" }, "name": "Public IP Addresses", "description": "This module deploys a Public IP Address.", diff --git a/avm/res/network/virtual-network-gateway/main.json b/avm/res/network/virtual-network-gateway/main.json index 24ec2a7c45..8ea98d578e 100644 --- a/avm/res/network/virtual-network-gateway/main.json +++ b/avm/res/network/virtual-network-gateway/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "1499507825797406827" + "version": "0.32.4.45862", + "templateHash": "1701161903666745494" }, "name": "Virtual Network Gateways", "description": "This module deploys a Virtual Network Gateway.", @@ -1482,8 +1482,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "15500017864202979057" + "version": "0.32.4.45862", + "templateHash": "2235037112727909278" }, "name": "VPN Gateway NAT Rules", "description": "This module deploys a Virtual Network Gateway NAT Rule.", diff --git a/avm/res/network/virtual-network-gateway/nat-rule/main.json b/avm/res/network/virtual-network-gateway/nat-rule/main.json index bbbe1187e9..78feb63338 100644 --- a/avm/res/network/virtual-network-gateway/nat-rule/main.json +++ b/avm/res/network/virtual-network-gateway/nat-rule/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "15500017864202979057" + "version": "0.32.4.45862", + "templateHash": "2235037112727909278" }, "name": "VPN Gateway NAT Rules", "description": "This module deploys a Virtual Network Gateway NAT Rule.", diff --git a/avm/res/network/virtual-network/main.json b/avm/res/network/virtual-network/main.json index 70188e91b4..705d835f28 100644 --- a/avm/res/network/virtual-network/main.json +++ b/avm/res/network/virtual-network/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "17189690206142535748" + "version": "0.32.4.45862", + "templateHash": "1491337934694739005" }, "name": "Virtual Networks", "description": "This module deploys a Virtual Network (vNet).", @@ -826,8 +826,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "6385219422012602265" + "version": "0.32.4.45862", + "templateHash": "16307553544578422105" }, "name": "Virtual Network Subnets", "description": "This module deploys a Virtual Network Subnet.", @@ -1095,10 +1095,7 @@ "serviceEndpointPolicies": "[parameters('serviceEndpointPolicies')]", "defaultOutboundAccess": "[parameters('defaultOutboundAccess')]", "sharingScope": "[parameters('sharingScope')]" - }, - "dependsOn": [ - "virtualNetwork" - ] + } }, "subnet_roleAssignments": { "copy": { @@ -1211,8 +1208,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "345394220621166229" + "version": "0.32.4.45862", + "templateHash": "8973052275744789294" }, "name": "Virtual Network Peerings", "description": "This module deploys a Virtual Network Peering.", @@ -1369,8 +1366,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "345394220621166229" + "version": "0.32.4.45862", + "templateHash": "8973052275744789294" }, "name": "Virtual Network Peerings", "description": "This module deploys a Virtual Network Peering.", diff --git a/avm/res/network/virtual-network/subnet/main.json b/avm/res/network/virtual-network/subnet/main.json index 4fdc5bc155..6005b966bb 100644 --- a/avm/res/network/virtual-network/subnet/main.json +++ b/avm/res/network/virtual-network/subnet/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "6385219422012602265" + "version": "0.32.4.45862", + "templateHash": "16307553544578422105" }, "name": "Virtual Network Subnets", "description": "This module deploys a Virtual Network Subnet.", @@ -274,10 +274,7 @@ "serviceEndpointPolicies": "[parameters('serviceEndpointPolicies')]", "defaultOutboundAccess": "[parameters('defaultOutboundAccess')]", "sharingScope": "[parameters('sharingScope')]" - }, - "dependsOn": [ - "virtualNetwork" - ] + } }, "subnet_roleAssignments": { "copy": { diff --git a/avm/res/network/virtual-network/virtual-network-peering/main.json b/avm/res/network/virtual-network/virtual-network-peering/main.json index 1c86fd7544..dae7cea866 100644 --- a/avm/res/network/virtual-network/virtual-network-peering/main.json +++ b/avm/res/network/virtual-network/virtual-network-peering/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "345394220621166229" + "version": "0.32.4.45862", + "templateHash": "8973052275744789294" }, "name": "Virtual Network Peerings", "description": "This module deploys a Virtual Network Peering.", diff --git a/avm/res/network/vpn-gateway/main.json b/avm/res/network/vpn-gateway/main.json index 9a8bf754b3..adb607cd00 100644 --- a/avm/res/network/vpn-gateway/main.json +++ b/avm/res/network/vpn-gateway/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "926318145633714589" + "version": "0.32.4.45862", + "templateHash": "8473230975051576034" }, "name": "VPN Gateways", "description": "This module deploys a VPN Gateway.", @@ -235,8 +235,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "7845337943961022453" + "version": "0.32.4.45862", + "templateHash": "15612745804641436550" }, "name": "VPN Gateway NAT Rules", "description": "This module deploys a VPN Gateway NAT Rule.", @@ -316,10 +316,7 @@ "ipConfigurationId": "[parameters('ipConfigurationId')]", "mode": "[parameters('mode')]", "type": "[parameters('type')]" - }, - "dependsOn": [ - "vpnGateway" - ] + } } }, "outputs": { @@ -404,6 +401,9 @@ "vpnConnectionProtocolType": { "value": "[tryGet(parameters('vpnConnections')[copyIndex()], 'vpnConnectionProtocolType')]" }, + "ipsecPolicies": { + "value": "[tryGet(parameters('vpnConnections')[copyIndex()], 'ipsecPolicies')]" + }, "trafficSelectorPolicies": { "value": "[tryGet(parameters('vpnConnections')[copyIndex()], 'trafficSelectorPolicies')]" }, @@ -417,8 +417,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "15901314411176214938" + "version": "0.32.4.45862", + "templateHash": "7898038972076024212" }, "name": "VPN Gateway VPN Connections", "description": "This module deploys a VPN Gateway VPN Connection.", diff --git a/avm/res/network/vpn-gateway/nat-rule/main.json b/avm/res/network/vpn-gateway/nat-rule/main.json index efeb649095..229d409eac 100644 --- a/avm/res/network/vpn-gateway/nat-rule/main.json +++ b/avm/res/network/vpn-gateway/nat-rule/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.26.54.24096", - "templateHash": "15540036539979482149" + "version": "0.32.4.45862", + "templateHash": "15612745804641436550" }, "name": "VPN Gateway NAT Rules", "description": "This module deploys a VPN Gateway NAT Rule.", @@ -86,10 +86,7 @@ "ipConfigurationId": "[parameters('ipConfigurationId')]", "mode": "[parameters('mode')]", "type": "[parameters('type')]" - }, - "dependsOn": [ - "vpnGateway" - ] + } } }, "outputs": { diff --git a/avm/res/network/vpn-gateway/vpn-connection/main.json b/avm/res/network/vpn-gateway/vpn-connection/main.json index 06889f1399..94bd297e95 100644 --- a/avm/res/network/vpn-gateway/vpn-connection/main.json +++ b/avm/res/network/vpn-gateway/vpn-connection/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.26.54.24096", - "templateHash": "13703101435058090684" + "version": "0.32.4.45862", + "templateHash": "7898038972076024212" }, "name": "VPN Gateway VPN Connections", "description": "This module deploys a VPN Gateway VPN Connection.", diff --git a/avm/res/operational-insights/workspace/data-export/main.json b/avm/res/operational-insights/workspace/data-export/main.json index e7827b942f..82d78002ec 100644 --- a/avm/res/operational-insights/workspace/data-export/main.json +++ b/avm/res/operational-insights/workspace/data-export/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8392467222383128491" + "version": "0.32.4.45862", + "templateHash": "4044138176233388426" }, "name": "Log Analytics Workspace Data Exports", "description": "This module deploys a Log Analytics Workspace Data Export.", @@ -100,10 +100,7 @@ "destination": "[parameters('destination')]", "enable": "[parameters('enable')]", "tableNames": "[parameters('tableNames')]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { diff --git a/avm/res/operational-insights/workspace/data-source/main.json b/avm/res/operational-insights/workspace/data-source/main.json index 6e154c67ac..e81a8d541e 100644 --- a/avm/res/operational-insights/workspace/data-source/main.json +++ b/avm/res/operational-insights/workspace/data-source/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3019400626196043317" + "version": "0.32.4.45862", + "templateHash": "17349115996815882874" }, "name": "Log Analytics Workspace Datasources", "description": "This module deploys a Log Analytics Workspace Data Source.", @@ -152,10 +152,7 @@ "syslogName": "[if(and(not(empty(parameters('kind'))), equals(parameters('kind'), 'LinuxSyslog')), parameters('syslogName'), null())]", "syslogSeverities": "[if(and(not(empty(parameters('kind'))), or(equals(parameters('kind'), 'LinuxSyslog'), equals(parameters('kind'), 'LinuxPerformanceObject'))), parameters('syslogSeverities'), null())]", "performanceCounters": "[if(and(not(empty(parameters('kind'))), equals(parameters('kind'), 'LinuxPerformanceObject')), parameters('performanceCounters'), null())]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { diff --git a/avm/res/operational-insights/workspace/linked-service/main.json b/avm/res/operational-insights/workspace/linked-service/main.json index b4305d5972..2b8a5e954e 100644 --- a/avm/res/operational-insights/workspace/linked-service/main.json +++ b/avm/res/operational-insights/workspace/linked-service/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "815879010072595898" + "version": "0.32.4.45862", + "templateHash": "7966743093368602805" }, "name": "Log Analytics Workspace Linked Services", "description": "This module deploys a Log Analytics Workspace Linked Service.", @@ -62,10 +62,7 @@ "properties": { "resourceId": "[parameters('resourceId')]", "writeAccessResourceId": "[parameters('writeAccessResourceId')]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { diff --git a/avm/res/operational-insights/workspace/linked-storage-account/main.json b/avm/res/operational-insights/workspace/linked-storage-account/main.json index 8e76c78f95..9ceb59fa68 100644 --- a/avm/res/operational-insights/workspace/linked-storage-account/main.json +++ b/avm/res/operational-insights/workspace/linked-storage-account/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15129623170213660788" + "version": "0.32.4.45862", + "templateHash": "5881171536836718740" }, "name": "Log Analytics Workspace Linked Storage Accounts", "description": "This module deploys a Log Analytics Workspace Linked Storage Account.", @@ -55,10 +55,7 @@ "name": "[format('{0}/{1}', parameters('logAnalyticsWorkspaceName'), parameters('name'))]", "properties": { "storageAccountIds": "[parameters('storageAccountIds')]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { diff --git a/avm/res/operational-insights/workspace/main.json b/avm/res/operational-insights/workspace/main.json index 5af1767572..433a9c02b6 100644 --- a/avm/res/operational-insights/workspace/main.json +++ b/avm/res/operational-insights/workspace/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "4016402011070477200" + "version": "0.32.4.45862", + "templateHash": "14031794718714331682" }, "name": "Log Analytics Workspaces", "description": "This module deploys a Log Analytics Workspace.", @@ -1319,8 +1319,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "156138954055342275" + "version": "0.32.4.45862", + "templateHash": "2068175338477699308" }, "name": "Log Analytics Workspace Storage Insight Configs", "description": "This module deploys a Log Analytics Workspace Storage Insight Config.", @@ -1399,11 +1399,7 @@ "id": "[parameters('storageAccountResourceId')]", "key": "[listKeys(resourceId('Microsoft.Storage/storageAccounts', last(split(parameters('storageAccountResourceId'), '/'))), '2022-09-01').keys[0].value]" } - }, - "dependsOn": [ - "storageAccount", - "workspace" - ] + } } }, "outputs": { @@ -1469,8 +1465,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "815879010072595898" + "version": "0.32.4.45862", + "templateHash": "7966743093368602805" }, "name": "Log Analytics Workspace Linked Services", "description": "This module deploys a Log Analytics Workspace Linked Service.", @@ -1526,10 +1522,7 @@ "properties": { "resourceId": "[parameters('resourceId')]", "writeAccessResourceId": "[parameters('writeAccessResourceId')]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { @@ -1592,8 +1585,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15129623170213660788" + "version": "0.32.4.45862", + "templateHash": "5881171536836718740" }, "name": "Log Analytics Workspace Linked Storage Accounts", "description": "This module deploys a Log Analytics Workspace Linked Storage Account.", @@ -1642,10 +1635,7 @@ "name": "[format('{0}/{1}', parameters('logAnalyticsWorkspaceName'), parameters('name'))]", "properties": { "storageAccountIds": "[parameters('storageAccountIds')]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { @@ -1729,8 +1719,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15600200446151630277" + "version": "0.32.4.45862", + "templateHash": "11293384964293270173" }, "name": "Log Analytics Workspace Saved Searches", "description": "This module deploys a Log Analytics Workspace Saved Search.", @@ -1823,10 +1813,7 @@ "functionAlias": "[parameters('functionAlias')]", "functionParameters": "[parameters('functionParameters')]", "version": "[parameters('version')]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { @@ -1896,8 +1883,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8392467222383128491" + "version": "0.32.4.45862", + "templateHash": "4044138176233388426" }, "name": "Log Analytics Workspace Data Exports", "description": "This module deploys a Log Analytics Workspace Data Export.", @@ -1991,10 +1978,7 @@ "destination": "[parameters('destination')]", "enable": "[parameters('enable')]", "tableNames": "[parameters('tableNames')]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { @@ -2093,8 +2077,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3019400626196043317" + "version": "0.32.4.45862", + "templateHash": "17349115996815882874" }, "name": "Log Analytics Workspace Datasources", "description": "This module deploys a Log Analytics Workspace Data Source.", @@ -2240,10 +2224,7 @@ "syslogName": "[if(and(not(empty(parameters('kind'))), equals(parameters('kind'), 'LinuxSyslog')), parameters('syslogName'), null())]", "syslogSeverities": "[if(and(not(empty(parameters('kind'))), or(equals(parameters('kind'), 'LinuxSyslog'), equals(parameters('kind'), 'LinuxPerformanceObject'))), parameters('syslogSeverities'), null())]", "performanceCounters": "[if(and(not(empty(parameters('kind'))), equals(parameters('kind'), 'LinuxPerformanceObject')), parameters('performanceCounters'), null())]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { @@ -2324,8 +2305,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "13277383761731431931" + "version": "0.32.4.45862", + "templateHash": "16645325284402756922" }, "name": "Log Analytics Workspace Tables", "description": "This module deploys a Log Analytics Workspace Table.", @@ -2689,10 +2670,7 @@ "schema": "[parameters('schema')]", "searchResults": "[parameters('searchResults')]", "totalRetentionInDays": "[parameters('totalRetentionInDays')]" - }, - "dependsOn": [ - "workspace" - ] + } }, "table_roleAssignments": { "copy": { diff --git a/avm/res/operational-insights/workspace/saved-search/main.json b/avm/res/operational-insights/workspace/saved-search/main.json index 645e600903..415ef1ab4f 100644 --- a/avm/res/operational-insights/workspace/saved-search/main.json +++ b/avm/res/operational-insights/workspace/saved-search/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "15600200446151630277" + "version": "0.32.4.45862", + "templateHash": "11293384964293270173" }, "name": "Log Analytics Workspace Saved Searches", "description": "This module deploys a Log Analytics Workspace Saved Search.", @@ -99,10 +99,7 @@ "functionAlias": "[parameters('functionAlias')]", "functionParameters": "[parameters('functionParameters')]", "version": "[parameters('version')]" - }, - "dependsOn": [ - "workspace" - ] + } } }, "outputs": { diff --git a/avm/res/operational-insights/workspace/storage-insight-config/main.json b/avm/res/operational-insights/workspace/storage-insight-config/main.json index a344a30e2a..74ed9e7ddc 100644 --- a/avm/res/operational-insights/workspace/storage-insight-config/main.json +++ b/avm/res/operational-insights/workspace/storage-insight-config/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "156138954055342275" + "version": "0.32.4.45862", + "templateHash": "2068175338477699308" }, "name": "Log Analytics Workspace Storage Insight Configs", "description": "This module deploys a Log Analytics Workspace Storage Insight Config.", @@ -85,11 +85,7 @@ "id": "[parameters('storageAccountResourceId')]", "key": "[listKeys(resourceId('Microsoft.Storage/storageAccounts', last(split(parameters('storageAccountResourceId'), '/'))), '2022-09-01').keys[0].value]" } - }, - "dependsOn": [ - "storageAccount", - "workspace" - ] + } } }, "outputs": { diff --git a/avm/res/operational-insights/workspace/table/main.json b/avm/res/operational-insights/workspace/table/main.json index 5c56c36063..063c797db7 100644 --- a/avm/res/operational-insights/workspace/table/main.json +++ b/avm/res/operational-insights/workspace/table/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "13277383761731431931" + "version": "0.32.4.45862", + "templateHash": "16645325284402756922" }, "name": "Log Analytics Workspace Tables", "description": "This module deploys a Log Analytics Workspace Table.", @@ -370,10 +370,7 @@ "schema": "[parameters('schema')]", "searchResults": "[parameters('searchResults')]", "totalRetentionInDays": "[parameters('totalRetentionInDays')]" - }, - "dependsOn": [ - "workspace" - ] + } }, "table_roleAssignments": { "copy": { diff --git a/avm/res/operations-management/solution/main.json b/avm/res/operations-management/solution/main.json index 91a3ab0d52..77d0c697ef 100644 --- a/avm/res/operations-management/solution/main.json +++ b/avm/res/operations-management/solution/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "787568686333677059" + "version": "0.32.4.45862", + "templateHash": "6921717581640555251" }, "name": "Operations Management Solutions", "description": "This module deploys an Operations Management Solution.", @@ -116,10 +116,7 @@ "promotionCode": "", "product": "[parameters('plan').product]", "publisher": "[coalesce(tryGet(parameters('plan'), 'publisher'), 'Microsoft')]" - }, - "dependsOn": [ - "logAnalyticsWorkspace" - ] + } } }, "outputs": { diff --git a/avm/res/resources/deployment-script/main.json b/avm/res/resources/deployment-script/main.json index 49a7c1bf8c..4cde7b4889 100644 --- a/avm/res/resources/deployment-script/main.json +++ b/avm/res/resources/deployment-script/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "17881568717048891322" + "version": "0.32.4.45862", + "templateHash": "11493718103931106421" }, "name": "Deployment Scripts", "description": "This module deploys Deployment Scripts.", @@ -426,10 +426,7 @@ "forceUpdateTag": "[if(parameters('runOnce'), resourceGroup().name, parameters('baseTime'))]", "retentionInterval": "[parameters('retentionInterval')]", "timeout": "[parameters('timeout')]" - }, - "dependsOn": [ - "storageAccount" - ] + } }, "deploymentScript_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", diff --git a/avm/res/search/search-service/main.json b/avm/res/search/search-service/main.json index be2220e574..8d1a4f36bb 100644 --- a/avm/res/search/search-service/main.json +++ b/avm/res/search/search-service/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "2123095807669273716" + "version": "0.32.4.45862", + "templateHash": "1605274864236835812" }, "name": "Search Services", "description": "This module deploys a Search Service.", @@ -1794,8 +1794,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8234368842276618768" + "version": "0.32.4.45862", + "templateHash": "15700504938596502383" }, "name": "Search Services Private Link Resources", "description": "This module deploys a Search Service Private Link Resource.", @@ -1856,10 +1856,7 @@ "groupId": "[parameters('groupId')]", "requestMessage": "[parameters('requestMessage')]", "resourceRegion": "[parameters('resourceRegion')]" - }, - "dependsOn": [ - "searchService" - ] + } } }, "outputs": { @@ -1918,8 +1915,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "7954388693868310378" + "version": "0.32.4.45862", + "templateHash": "13365107869204248001" } }, "definitions": { @@ -1995,10 +1992,7 @@ "name": "[format('{0}/{1}', parameters('keyVaultName'), parameters('secretsToSet')[copyIndex()].name)]", "properties": { "value": "[parameters('secretsToSet')[copyIndex()].value]" - }, - "dependsOn": [ - "keyVault" - ] + } } }, "outputs": { diff --git a/avm/res/search/search-service/shared-private-link-resource/main.json b/avm/res/search/search-service/shared-private-link-resource/main.json index 4c1ab6fbd5..6d9fd2b550 100644 --- a/avm/res/search/search-service/shared-private-link-resource/main.json +++ b/avm/res/search/search-service/shared-private-link-resource/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8234368842276618768" + "version": "0.32.4.45862", + "templateHash": "15700504938596502383" }, "name": "Search Services Private Link Resources", "description": "This module deploys a Search Service Private Link Resource.", @@ -67,10 +67,7 @@ "groupId": "[parameters('groupId')]", "requestMessage": "[parameters('requestMessage')]", "resourceRegion": "[parameters('resourceRegion')]" - }, - "dependsOn": [ - "searchService" - ] + } } }, "outputs": { diff --git a/avm/res/service-bus/namespace/authorization-rule/main.json b/avm/res/service-bus/namespace/authorization-rule/main.json index 69891f3a56..0367ff9dc9 100644 --- a/avm/res/service-bus/namespace/authorization-rule/main.json +++ b/avm/res/service-bus/namespace/authorization-rule/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "4728331591356881277" + "version": "0.32.4.45862", + "templateHash": "16941040945280325093" }, "name": "Service Bus Namespace Authorization Rules", "description": "This module deploys a Service Bus Namespace Authorization Rule.", diff --git a/avm/res/service-bus/namespace/disaster-recovery-config/main.json b/avm/res/service-bus/namespace/disaster-recovery-config/main.json index f1d4df322e..4cc36ad842 100644 --- a/avm/res/service-bus/namespace/disaster-recovery-config/main.json +++ b/avm/res/service-bus/namespace/disaster-recovery-config/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "1218226237647695558" + "version": "0.32.4.45862", + "templateHash": "6045281070856510388" }, "name": "Service Bus Namespace Disaster Recovery Configs", "description": "This module deploys a Service Bus Namespace Disaster Recovery Config", diff --git a/avm/res/service-bus/namespace/main.json b/avm/res/service-bus/namespace/main.json index 7756c85f32..ad3e0aa5c8 100644 --- a/avm/res/service-bus/namespace/main.json +++ b/avm/res/service-bus/namespace/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "14946125696301743393" + "version": "0.32.4.45862", + "templateHash": "1809118536099017554" }, "name": "Service Bus Namespaces", "description": "This module deploys a Service Bus Namespace.", @@ -1437,10 +1437,7 @@ "apiVersion": "2023-02-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "avmTelemetry": { "condition": "[parameters('enableTelemetry')]", @@ -1501,8 +1498,8 @@ "encryption": "[if(not(empty(parameters('customerManagedKey'))), createObject('keySource', 'Microsoft.KeyVault', 'keyVaultProperties', createArray(createObject('identity', if(not(empty(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'))), createObject('userAssignedIdentity', extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), '//'), '/')[2], split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), '////'), '/')[4]), 'Microsoft.ManagedIdentity/userAssignedIdentities', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'userAssignedIdentityResourceId'), 'dummyMsi'), '/')))), null()), 'keyName', parameters('customerManagedKey').keyName, 'keyVaultUri', reference('cMKKeyVault').vaultUri, 'keyVersion', if(not(empty(coalesce(tryGet(parameters('customerManagedKey'), 'keyVersion'), ''))), parameters('customerManagedKey').keyVersion, last(split(reference('cMKKeyVault::cMKKey').keyUriWithVersion, '/'))))), 'requireInfrastructureEncryption', parameters('requireInfrastructureEncryption')), null())]" }, "dependsOn": [ - "cMKKeyVault", - "cMKUserAssignedIdentity" + "cMKKeyVault::cMKKey", + "cMKKeyVault" ] }, "serviceBusNamespace_lock": { @@ -1612,8 +1609,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "4728331591356881277" + "version": "0.32.4.45862", + "templateHash": "16941040945280325093" }, "name": "Service Bus Namespace Authorization Rules", "description": "This module deploys a Service Bus Namespace Authorization Rule.", @@ -1716,8 +1713,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "1218226237647695558" + "version": "0.32.4.45862", + "templateHash": "6045281070856510388" }, "name": "Service Bus Namespace Disaster Recovery Configs", "description": "This module deploys a Service Bus Namespace Disaster Recovery Config", @@ -1821,8 +1818,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "16589713685358551002" + "version": "0.32.4.45862", + "templateHash": "4308366012674731026" }, "name": "Service Bus Namespace Migration Configuration", "description": "This module deploys a Service Bus Namespace Migration Configuration.", @@ -1926,8 +1923,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "10915287587573662426" + "version": "0.32.4.45862", + "templateHash": "4147662315978859720" }, "name": "Service Bus Namespace Network Rule Sets", "description": "This module deploys a ServiceBus Namespace Network Rule Set.", @@ -2126,8 +2123,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "3861797593527725325" + "version": "0.32.4.45862", + "templateHash": "9350216516948360717" }, "name": "Service Bus Namespace Queue", "description": "This module deploys a Service Bus Namespace Queue.", @@ -2526,8 +2523,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "13793175890494658919" + "version": "0.32.4.45862", + "templateHash": "295229783279934486" }, "name": "Service Bus Namespace Queue Authorization Rules", "description": "This module deploys a Service Bus Namespace Queue Authorization Rule.", @@ -2707,8 +2704,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "11839100867387060454" + "version": "0.32.4.45862", + "templateHash": "15505054661432037372" }, "name": "Service Bus Namespace Topic", "description": "This module deploys a Service Bus Namespace Topic.", @@ -3210,8 +3207,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "1348283370469099109" + "version": "0.32.4.45862", + "templateHash": "14898317070826327530" }, "name": "Service Bus Namespace Topic Authorization Rules", "description": "This module deploys a Service Bus Namespace Topic Authorization Rule.", @@ -3360,8 +3357,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "2560238010859719670" + "version": "0.32.4.45862", + "templateHash": "8883045388912253995" }, "name": "Service Bus Namespace Topic Subscription", "description": "This module deploys a Service Bus Namespace Topic Subscription.", @@ -3545,7 +3542,6 @@ } }, "dependsOn": [ - "namespace", "topic" ] } diff --git a/avm/res/service-bus/namespace/migration-configuration/main.json b/avm/res/service-bus/namespace/migration-configuration/main.json index 58dfcc663d..3360ff6188 100644 --- a/avm/res/service-bus/namespace/migration-configuration/main.json +++ b/avm/res/service-bus/namespace/migration-configuration/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "16589713685358551002" + "version": "0.32.4.45862", + "templateHash": "4308366012674731026" }, "name": "Service Bus Namespace Migration Configuration", "description": "This module deploys a Service Bus Namespace Migration Configuration.", diff --git a/avm/res/service-bus/namespace/network-rule-set/main.json b/avm/res/service-bus/namespace/network-rule-set/main.json index 2bfebce5e6..7ad6a9b8ee 100644 --- a/avm/res/service-bus/namespace/network-rule-set/main.json +++ b/avm/res/service-bus/namespace/network-rule-set/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "10915287587573662426" + "version": "0.32.4.45862", + "templateHash": "4147662315978859720" }, "name": "Service Bus Namespace Network Rule Sets", "description": "This module deploys a ServiceBus Namespace Network Rule Set.", diff --git a/avm/res/service-bus/namespace/queue/authorization-rule/main.json b/avm/res/service-bus/namespace/queue/authorization-rule/main.json index 7f4595b2c4..14dfdb4d93 100644 --- a/avm/res/service-bus/namespace/queue/authorization-rule/main.json +++ b/avm/res/service-bus/namespace/queue/authorization-rule/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "13793175890494658919" + "version": "0.32.4.45862", + "templateHash": "295229783279934486" }, "name": "Service Bus Namespace Queue Authorization Rules", "description": "This module deploys a Service Bus Namespace Queue Authorization Rule.", diff --git a/avm/res/service-bus/namespace/queue/main.json b/avm/res/service-bus/namespace/queue/main.json index 8cdee33729..c59539a907 100644 --- a/avm/res/service-bus/namespace/queue/main.json +++ b/avm/res/service-bus/namespace/queue/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "3861797593527725325" + "version": "0.32.4.45862", + "templateHash": "9350216516948360717" }, "name": "Service Bus Namespace Queue", "description": "This module deploys a Service Bus Namespace Queue.", @@ -405,8 +405,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "13793175890494658919" + "version": "0.32.4.45862", + "templateHash": "295229783279934486" }, "name": "Service Bus Namespace Queue Authorization Rules", "description": "This module deploys a Service Bus Namespace Queue Authorization Rule.", diff --git a/avm/res/service-bus/namespace/topic/authorization-rule/main.json b/avm/res/service-bus/namespace/topic/authorization-rule/main.json index f3ac22d34d..3bb817a14e 100644 --- a/avm/res/service-bus/namespace/topic/authorization-rule/main.json +++ b/avm/res/service-bus/namespace/topic/authorization-rule/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "1348283370469099109" + "version": "0.32.4.45862", + "templateHash": "14898317070826327530" }, "name": "Service Bus Namespace Topic Authorization Rules", "description": "This module deploys a Service Bus Namespace Topic Authorization Rule.", diff --git a/avm/res/service-bus/namespace/topic/main.json b/avm/res/service-bus/namespace/topic/main.json index 7e24b4bdd8..9a2b9222f2 100644 --- a/avm/res/service-bus/namespace/topic/main.json +++ b/avm/res/service-bus/namespace/topic/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "11839100867387060454" + "version": "0.32.4.45862", + "templateHash": "15505054661432037372" }, "name": "Service Bus Namespace Topic", "description": "This module deploys a Service Bus Namespace Topic.", @@ -508,8 +508,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "1348283370469099109" + "version": "0.32.4.45862", + "templateHash": "14898317070826327530" }, "name": "Service Bus Namespace Topic Authorization Rules", "description": "This module deploys a Service Bus Namespace Topic Authorization Rule.", @@ -658,8 +658,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "2560238010859719670" + "version": "0.32.4.45862", + "templateHash": "8883045388912253995" }, "name": "Service Bus Namespace Topic Subscription", "description": "This module deploys a Service Bus Namespace Topic Subscription.", @@ -843,7 +843,6 @@ } }, "dependsOn": [ - "namespace", "topic" ] } diff --git a/avm/res/service-bus/namespace/topic/subscription/main.json b/avm/res/service-bus/namespace/topic/subscription/main.json index 60ad0f4b59..67a4a4a04a 100644 --- a/avm/res/service-bus/namespace/topic/subscription/main.json +++ b/avm/res/service-bus/namespace/topic/subscription/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.30.23.60470", - "templateHash": "2560238010859719670" + "version": "0.32.4.45862", + "templateHash": "8883045388912253995" }, "name": "Service Bus Namespace Topic Subscription", "description": "This module deploys a Service Bus Namespace Topic Subscription.", diff --git a/avm/res/sql/managed-instance/administrator/main.json b/avm/res/sql/managed-instance/administrator/main.json index d36a831c7e..52a735c848 100644 --- a/avm/res/sql/managed-instance/administrator/main.json +++ b/avm/res/sql/managed-instance/administrator/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "16346313651959480668" + "version": "0.32.4.45862", + "templateHash": "1072047084371259561" }, "name": "SQL Managed Instances Administrator", "description": "This module deploys a SQL Managed Instance Administrator.", diff --git a/avm/res/sql/managed-instance/database/backup-long-term-retention-policy/main.json b/avm/res/sql/managed-instance/database/backup-long-term-retention-policy/main.json index 0fcdaaba4e..6dbc65e37a 100644 --- a/avm/res/sql/managed-instance/database/backup-long-term-retention-policy/main.json +++ b/avm/res/sql/managed-instance/database/backup-long-term-retention-policy/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "9353006983422977081" + "version": "0.32.4.45862", + "templateHash": "7864105980271921372" }, "name": "SQL Managed Instance Database Backup Long-Term Retention Policies", "description": "This module deploys a SQL Managed Instance Database Backup Long-Term Retention Policy.", diff --git a/avm/res/sql/managed-instance/database/backup-short-term-retention-policy/main.json b/avm/res/sql/managed-instance/database/backup-short-term-retention-policy/main.json index 61c170c5d8..46aa3a6f44 100644 --- a/avm/res/sql/managed-instance/database/backup-short-term-retention-policy/main.json +++ b/avm/res/sql/managed-instance/database/backup-short-term-retention-policy/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "14845702481430776773" + "version": "0.32.4.45862", + "templateHash": "15474672245187293584" }, "name": "SQL Managed Instance Database Backup Short-Term Retention Policies", "description": "This module deploys a SQL Managed Instance Database Backup Short-Term Retention Policy.", diff --git a/avm/res/sql/managed-instance/database/main.json b/avm/res/sql/managed-instance/database/main.json index fd3ba7f9c7..5dc4b74738 100644 --- a/avm/res/sql/managed-instance/database/main.json +++ b/avm/res/sql/managed-instance/database/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "11212475651271664087" + "version": "0.32.4.45862", + "templateHash": "11883696320773904364" }, "name": "SQL Managed Instance Databases", "description": "This module deploys a SQL Managed Instance Database.", @@ -282,10 +282,7 @@ "storageContainerSasToken": "[if(empty(parameters('storageContainerSasToken')), null(), parameters('storageContainerSasToken'))]", "recoverableDatabaseId": "[if(empty(parameters('recoverableDatabaseId')), null(), parameters('recoverableDatabaseId'))]", "longTermRetentionBackupResourceId": "[if(empty(parameters('longTermRetentionBackupResourceId')), null(), parameters('longTermRetentionBackupResourceId'))]" - }, - "dependsOn": [ - "managedInstance" - ] + } }, "database_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -361,8 +358,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "14845702481430776773" + "version": "0.32.4.45862", + "templateHash": "15474672245187293584" }, "name": "SQL Managed Instance Database Backup Short-Term Retention Policies", "description": "This module deploys a SQL Managed Instance Database Backup Short-Term Retention Policy.", @@ -465,8 +462,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "9353006983422977081" + "version": "0.32.4.45862", + "templateHash": "7864105980271921372" }, "name": "SQL Managed Instance Database Backup Long-Term Retention Policies", "description": "This module deploys a SQL Managed Instance Database Backup Long-Term Retention Policy.", diff --git a/avm/res/sql/managed-instance/encryption-protector/main.json b/avm/res/sql/managed-instance/encryption-protector/main.json index 6a9f8af126..c7a0e010ae 100644 --- a/avm/res/sql/managed-instance/encryption-protector/main.json +++ b/avm/res/sql/managed-instance/encryption-protector/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "9968483765145852087" + "version": "0.32.4.45862", + "templateHash": "7043641224577658925" }, "name": "SQL Managed Instance Encryption Protector", "description": "This module deploys a SQL Managed Instance Encryption Protector.", diff --git a/avm/res/sql/managed-instance/key/main.json b/avm/res/sql/managed-instance/key/main.json index b02a378eff..6939c73e66 100644 --- a/avm/res/sql/managed-instance/key/main.json +++ b/avm/res/sql/managed-instance/key/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "11325298741783779919" + "version": "0.32.4.45862", + "templateHash": "13411921307348987988" }, "name": "SQL Managed Instance Keys", "description": "This module deploys a SQL Managed Instance Key.", diff --git a/avm/res/sql/managed-instance/main.json b/avm/res/sql/managed-instance/main.json index f7206c24f4..9bf4a30432 100644 --- a/avm/res/sql/managed-instance/main.json +++ b/avm/res/sql/managed-instance/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "15823755562797416041" + "version": "0.32.4.45862", + "templateHash": "3552527309245713268" }, "name": "SQL Managed Instances", "description": "This module deploys a SQL Managed Instance.", @@ -724,8 +724,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "11212475651271664087" + "version": "0.32.4.45862", + "templateHash": "11883696320773904364" }, "name": "SQL Managed Instance Databases", "description": "This module deploys a SQL Managed Instance Database.", @@ -1001,10 +1001,7 @@ "storageContainerSasToken": "[if(empty(parameters('storageContainerSasToken')), null(), parameters('storageContainerSasToken'))]", "recoverableDatabaseId": "[if(empty(parameters('recoverableDatabaseId')), null(), parameters('recoverableDatabaseId'))]", "longTermRetentionBackupResourceId": "[if(empty(parameters('longTermRetentionBackupResourceId')), null(), parameters('longTermRetentionBackupResourceId'))]" - }, - "dependsOn": [ - "managedInstance" - ] + } }, "database_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -1080,8 +1077,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "14845702481430776773" + "version": "0.32.4.45862", + "templateHash": "15474672245187293584" }, "name": "SQL Managed Instance Database Backup Short-Term Retention Policies", "description": "This module deploys a SQL Managed Instance Database Backup Short-Term Retention Policy.", @@ -1184,8 +1181,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "9353006983422977081" + "version": "0.32.4.45862", + "templateHash": "7864105980271921372" }, "name": "SQL Managed Instance Database Backup Long-Term Retention Policies", "description": "This module deploys a SQL Managed Instance Database Backup Long-Term Retention Policy.", @@ -1344,8 +1341,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "8196709990027528828" + "version": "0.32.4.45862", + "templateHash": "14271102698222565475" }, "name": "SQL Managed Instance Security Alert Policies", "description": "This module deploys a SQL Managed Instance Security Alert Policy.", @@ -1455,8 +1452,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "5283602664352438168" + "version": "0.32.4.45862", + "templateHash": "11023825535203573075" }, "name": "SQL Managed Instance Vulnerability Assessments", "description": "This module deploys a SQL Managed Instance Vulnerability Assessment.", @@ -1557,8 +1554,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "5882006379876883507" + "version": "0.32.4.45862", + "templateHash": "12146254396263187807" } }, "parameters": { @@ -1651,8 +1648,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "11325298741783779919" + "version": "0.32.4.45862", + "templateHash": "13411921307348987988" }, "name": "SQL Managed Instance Keys", "description": "This module deploys a SQL Managed Instance Key.", @@ -1760,8 +1757,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "9968483765145852087" + "version": "0.32.4.45862", + "templateHash": "7043641224577658925" }, "name": "SQL Managed Instance Encryption Protector", "description": "This module deploys a SQL Managed Instance Encryption Protector.", @@ -1869,8 +1866,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "16346313651959480668" + "version": "0.32.4.45862", + "templateHash": "1072047084371259561" }, "name": "SQL Managed Instances Administrator", "description": "This module deploys a SQL Managed Instance Administrator.", diff --git a/avm/res/sql/managed-instance/security-alert-policy/main.json b/avm/res/sql/managed-instance/security-alert-policy/main.json index 552ea98f55..6067f85049 100644 --- a/avm/res/sql/managed-instance/security-alert-policy/main.json +++ b/avm/res/sql/managed-instance/security-alert-policy/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "8196709990027528828" + "version": "0.32.4.45862", + "templateHash": "14271102698222565475" }, "name": "SQL Managed Instance Security Alert Policies", "description": "This module deploys a SQL Managed Instance Security Alert Policy.", diff --git a/avm/res/sql/managed-instance/vulnerability-assessment/main.json b/avm/res/sql/managed-instance/vulnerability-assessment/main.json index 26b9095f65..6aa3982245 100644 --- a/avm/res/sql/managed-instance/vulnerability-assessment/main.json +++ b/avm/res/sql/managed-instance/vulnerability-assessment/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "5283602664352438168" + "version": "0.32.4.45862", + "templateHash": "11023825535203573075" }, "name": "SQL Managed Instance Vulnerability Assessments", "description": "This module deploys a SQL Managed Instance Vulnerability Assessment.", @@ -106,8 +106,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.28.1.47646", - "templateHash": "5882006379876883507" + "version": "0.32.4.45862", + "templateHash": "12146254396263187807" } }, "parameters": { diff --git a/avm/res/synapse/workspace/administrators/main.json b/avm/res/synapse/workspace/administrators/main.json index 5b7692e5ae..edc642a3ef 100644 --- a/avm/res/synapse/workspace/administrators/main.json +++ b/avm/res/synapse/workspace/administrators/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3131107829194392661" + "version": "0.32.4.45862", + "templateHash": "10436464142591465228" }, "name": "Synapse Workspaces Administrators", "description": "This module deploys Synapse Workspaces Administrators.", diff --git a/avm/res/synapse/workspace/firewall-rules/main.json b/avm/res/synapse/workspace/firewall-rules/main.json index b1a59e6488..eddda7d30c 100644 --- a/avm/res/synapse/workspace/firewall-rules/main.json +++ b/avm/res/synapse/workspace/firewall-rules/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "10752960992939562862" + "version": "0.32.4.45862", + "templateHash": "4423004143872202690" }, "name": "Synapse Workspaces Firewall Rules", "description": "This module deploys Synapse Workspaces Firewall Rules.", diff --git a/avm/res/synapse/workspace/integration-runtime/main.json b/avm/res/synapse/workspace/integration-runtime/main.json index 84f3a73cb8..91979015dd 100644 --- a/avm/res/synapse/workspace/integration-runtime/main.json +++ b/avm/res/synapse/workspace/integration-runtime/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "11560320362047193657" + "version": "0.32.4.45862", + "templateHash": "15698775390725353911" }, "name": "Synapse Workspace Integration Runtimes", "description": "This module deploys a Synapse Workspace Integration Runtime.", diff --git a/avm/res/synapse/workspace/key/main.json b/avm/res/synapse/workspace/key/main.json index 4a0b442bab..9ff4aabb24 100644 --- a/avm/res/synapse/workspace/key/main.json +++ b/avm/res/synapse/workspace/key/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "6546933028317944045" + "version": "0.32.4.45862", + "templateHash": "4273615943190868716" }, "name": "Synapse Workspaces Keys", "description": "This module deploys a Synapse Workspaces Key.", diff --git a/avm/res/synapse/workspace/main.json b/avm/res/synapse/workspace/main.json index 192d228779..9c7b328915 100644 --- a/avm/res/synapse/workspace/main.json +++ b/avm/res/synapse/workspace/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "4045006487015489345" + "version": "0.32.4.45862", + "templateHash": "15584597177796856132" }, "name": "Synapse Workspaces", "description": "This module deploys a Synapse Workspace.", @@ -843,10 +843,7 @@ "apiVersion": "2023-02-01", "subscriptionId": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '//'), '/')[2]]", "resourceGroup": "[split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), '////'), '/')[4]]", - "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]", - "dependsOn": [ - "cMKKeyVault" - ] + "name": "[format('{0}/{1}', last(split(coalesce(tryGet(parameters('customerManagedKey'), 'keyVaultResourceId'), 'dummyVault'), '/')), coalesce(tryGet(parameters('customerManagedKey'), 'keyName'), 'dummyKey'))]" }, "avmTelemetry": { "condition": "[parameters('enableTelemetry')]", @@ -913,8 +910,7 @@ "workspaceRepositoryConfiguration": "[parameters('workspaceRepositoryConfiguration')]" }, "dependsOn": [ - "cMKKeyVault", - "cMKUserAssignedIdentity" + "cMKKeyVault::cMKKey" ] }, "workspace_lock": { @@ -1008,8 +1004,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "11560320362047193657" + "version": "0.32.4.45862", + "templateHash": "15698775390725353911" }, "name": "Synapse Workspace Integration Runtimes", "description": "This module deploys a Synapse Workspace Integration Runtime.", @@ -1106,8 +1102,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "9926341982154360350" + "version": "0.32.4.45862", + "templateHash": "17605704197592474421" } }, "parameters": { @@ -1194,8 +1190,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "6546933028317944045" + "version": "0.32.4.45862", + "templateHash": "4273615943190868716" }, "name": "Synapse Workspaces Keys", "description": "This module deploys a Synapse Workspaces Key.", @@ -1264,7 +1260,6 @@ } }, "dependsOn": [ - "cMKKeyVault", "workspace", "workspace_cmk_rbac" ] @@ -1302,8 +1297,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3131107829194392661" + "version": "0.32.4.45862", + "templateHash": "10436464142591465228" }, "name": "Synapse Workspaces Administrators", "description": "This module deploys Synapse Workspaces Administrators.", @@ -1417,8 +1412,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "10752960992939562862" + "version": "0.32.4.45862", + "templateHash": "4423004143872202690" }, "name": "Synapse Workspaces Firewall Rules", "description": "This module deploys Synapse Workspaces Firewall Rules.", diff --git a/avm/res/web/site/basic-publishing-credentials-policy/main.json b/avm/res/web/site/basic-publishing-credentials-policy/main.json index f0e0edcb37..59a7c949dc 100644 --- a/avm/res/web/site/basic-publishing-credentials-policy/main.json +++ b/avm/res/web/site/basic-publishing-credentials-policy/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "2026976021876048432" + "version": "0.32.4.45862", + "templateHash": "17238693910097535438" }, "name": "Web Site Basic Publishing Credentials Policies", "description": "This module deploys a Web Site Basic Publishing Credentials Policy.", diff --git a/avm/res/web/site/config--appsettings/main.json b/avm/res/web/site/config--appsettings/main.json index 80f1f2e84d..c3a96ee21a 100644 --- a/avm/res/web/site/config--appsettings/main.json +++ b/avm/res/web/site/config--appsettings/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "12059034129903056117" + "version": "0.32.4.45862", + "templateHash": "916682933520103463" }, "name": "Site App Settings", "description": "This module deploys a Site App Setting.", @@ -107,7 +107,6 @@ "kind": "[parameters('kind')]", "properties": "[union(coalesce(parameters('currentAppSettings'), createObject()), coalesce(parameters('appSettingsKeyValuePairs'), createObject()), if(and(not(empty(parameters('storageAccountResourceId'))), not(parameters('storageAccountUseIdentityAuthentication'))), createObject('AzureWebJobsStorage', format('DefaultEndpointsProtocol=https;AccountName={0};AccountKey={1};EndpointSuffix={2}', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/')), listKeys(extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(parameters('storageAccountResourceId'), '//'), '/')[2], split(coalesce(parameters('storageAccountResourceId'), '////'), '/')[4]), 'Microsoft.Storage/storageAccounts', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), '2023-05-01').keys[0].value, environment().suffixes.storage)), if(and(not(empty(parameters('storageAccountResourceId'))), parameters('storageAccountUseIdentityAuthentication')), union(createObject('AzureWebJobsStorage__accountName', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), createObject('AzureWebJobsStorage__blobServiceUri', reference('storageAccount').primaryEndpoints.blob), createObject('AzureWebJobsStorage__queueServiceUri', reference('storageAccount').primaryEndpoints.queue), createObject('AzureWebJobsStorage__tableServiceUri', reference('storageAccount').primaryEndpoints.table)), createObject())), if(not(empty(parameters('appInsightResourceId'))), createObject('APPLICATIONINSIGHTS_CONNECTION_STRING', reference('appInsight').ConnectionString), createObject()))]", "dependsOn": [ - "app", "appInsight", "storageAccount" ] diff --git a/avm/res/web/site/config--authsettingsv2/main.json b/avm/res/web/site/config--authsettingsv2/main.json index dd392c62c7..7d40c19861 100644 --- a/avm/res/web/site/config--authsettingsv2/main.json +++ b/avm/res/web/site/config--authsettingsv2/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8027540450131770630" + "version": "0.32.4.45862", + "templateHash": "2449688454246020150" }, "name": "Site Auth Settings V2 Config", "description": "This module deploys a Site Auth Settings V2 Configuration.", diff --git a/avm/res/web/site/config--logs/main.json b/avm/res/web/site/config--logs/main.json index 0368a67d10..296e05b036 100644 --- a/avm/res/web/site/config--logs/main.json +++ b/avm/res/web/site/config--logs/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "1970611440314801998" + "version": "0.32.4.45862", + "templateHash": "11579934153834477476" }, "name": "Site logs Config", "description": "This module deploys a Site logs Configuration.", @@ -39,10 +39,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'logs')]", "kind": "string", - "properties": "[parameters('logsConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('logsConfiguration')]" } }, "outputs": { diff --git a/avm/res/web/site/config--web/main.json b/avm/res/web/site/config--web/main.json index 2a7b0ad790..548bf6f0b2 100644 --- a/avm/res/web/site/config--web/main.json +++ b/avm/res/web/site/config--web/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "1157890849044188513" + "version": "0.32.4.45862", + "templateHash": "12898926018221194533" }, "name": "Site Api Management Config", "description": "This module deploys a Site Api Management Configuration.", @@ -39,10 +39,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'web')]", "kind": "string", - "properties": "[parameters('apiManagementConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('apiManagementConfiguration')]" } }, "outputs": { diff --git a/avm/res/web/site/extensions--msdeploy/main.json b/avm/res/web/site/extensions--msdeploy/main.json index 042bd8a033..e60a373557 100644 --- a/avm/res/web/site/extensions--msdeploy/main.json +++ b/avm/res/web/site/extensions--msdeploy/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3414152511831931415" + "version": "0.32.4.45862", + "templateHash": "6009904765637009298" }, "name": "Site Deployment Extension ", "description": "This module deploys a Site extension for MSDeploy.", @@ -39,10 +39,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'MSDeploy')]", "kind": "MSDeploy", - "properties": "[parameters('msDeployConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('msDeployConfiguration')]" } }, "outputs": { diff --git a/avm/res/web/site/hybrid-connection-namespace/relay/main.json b/avm/res/web/site/hybrid-connection-namespace/relay/main.json index 1ef244df6a..6f7cd0951f 100644 --- a/avm/res/web/site/hybrid-connection-namespace/relay/main.json +++ b/avm/res/web/site/hybrid-connection-namespace/relay/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "10816364199058461544" + "version": "0.32.4.45862", + "templateHash": "1355773536309398809" }, "name": "Web/Function Apps Hybrid Connection Relay", "description": "This module deploys a Site Hybrid Connection Namespace Relay.", diff --git a/avm/res/web/site/main.json b/avm/res/web/site/main.json index 364452a583..55189d6331 100644 --- a/avm/res/web/site/main.json +++ b/avm/res/web/site/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "17601733743008311306" + "version": "0.32.4.45862", + "templateHash": "15845980414556579594" }, "name": "Web/Function Apps", "description": "This module deploys a Web or Function App.", @@ -1018,8 +1018,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "12059034129903056117" + "version": "0.32.4.45862", + "templateHash": "916682933520103463" }, "name": "Site App Settings", "description": "This module deploys a Site App Setting.", @@ -1120,7 +1120,6 @@ "kind": "[parameters('kind')]", "properties": "[union(coalesce(parameters('currentAppSettings'), createObject()), coalesce(parameters('appSettingsKeyValuePairs'), createObject()), if(and(not(empty(parameters('storageAccountResourceId'))), not(parameters('storageAccountUseIdentityAuthentication'))), createObject('AzureWebJobsStorage', format('DefaultEndpointsProtocol=https;AccountName={0};AccountKey={1};EndpointSuffix={2}', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/')), listKeys(extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(parameters('storageAccountResourceId'), '//'), '/')[2], split(coalesce(parameters('storageAccountResourceId'), '////'), '/')[4]), 'Microsoft.Storage/storageAccounts', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), '2023-05-01').keys[0].value, environment().suffixes.storage)), if(and(not(empty(parameters('storageAccountResourceId'))), parameters('storageAccountUseIdentityAuthentication')), union(createObject('AzureWebJobsStorage__accountName', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), createObject('AzureWebJobsStorage__blobServiceUri', reference('storageAccount').primaryEndpoints.blob), createObject('AzureWebJobsStorage__queueServiceUri', reference('storageAccount').primaryEndpoints.queue), createObject('AzureWebJobsStorage__tableServiceUri', reference('storageAccount').primaryEndpoints.table)), createObject())), if(not(empty(parameters('appInsightResourceId'))), createObject('APPLICATIONINSIGHTS_CONNECTION_STRING', reference('appInsight').ConnectionString), createObject()))]", "dependsOn": [ - "app", "appInsight", "storageAccount" ] @@ -1182,8 +1181,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8027540450131770630" + "version": "0.32.4.45862", + "templateHash": "2449688454246020150" }, "name": "Site Auth Settings V2 Config", "description": "This module deploys a Site Auth Settings V2 Configuration.", @@ -1286,8 +1285,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "1970611440314801998" + "version": "0.32.4.45862", + "templateHash": "11579934153834477476" }, "name": "Site logs Config", "description": "This module deploys a Site logs Configuration.", @@ -1320,10 +1319,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'logs')]", "kind": "string", - "properties": "[parameters('logsConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('logsConfiguration')]" } }, "outputs": { @@ -1381,8 +1377,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "1157890849044188513" + "version": "0.32.4.45862", + "templateHash": "12898926018221194533" }, "name": "Site Api Management Config", "description": "This module deploys a Site Api Management Configuration.", @@ -1415,10 +1411,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'web')]", "kind": "string", - "properties": "[parameters('apiManagementConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('apiManagementConfiguration')]" } }, "outputs": { @@ -1475,8 +1468,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3414152511831931415" + "version": "0.32.4.45862", + "templateHash": "6009904765637009298" }, "name": "Site Deployment Extension ", "description": "This module deploys a Site extension for MSDeploy.", @@ -1509,10 +1502,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'MSDeploy')]", "kind": "MSDeploy", - "properties": "[parameters('msDeployConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('msDeployConfiguration')]" } }, "outputs": { @@ -1697,8 +1687,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "4039289806405873433" + "version": "0.32.4.45862", + "templateHash": "8976700881133740118" }, "name": "Web/Function App Deployment Slots", "description": "This module deploys a Web or Function App Deployment Slot.", @@ -2555,10 +2545,7 @@ "vnetContentShareEnabled": "[parameters('vnetContentShareEnabled')]", "vnetImagePullEnabled": "[parameters('vnetImagePullEnabled')]", "vnetRouteAllEnabled": "[parameters('vnetRouteAllEnabled')]" - }, - "dependsOn": [ - "app" - ] + } }, "slot_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -2678,8 +2665,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "13277907644137249086" + "version": "0.32.4.45862", + "templateHash": "4424839419368047088" }, "name": "Site Slot App Settings", "description": "This module deploys a Site Slot App Setting.", @@ -2759,10 +2746,7 @@ "existing": true, "type": "Microsoft.Web/sites/slots", "apiVersion": "2023-12-01", - "name": "[format('{0}/{1}', parameters('appName'), parameters('slotName'))]", - "dependsOn": [ - "app" - ] + "name": "[format('{0}/{1}', parameters('appName'), parameters('slotName'))]" }, "app": { "existing": true, @@ -2796,7 +2780,6 @@ "properties": "[union(coalesce(parameters('currentAppSettings'), createObject()), coalesce(parameters('appSettingsKeyValuePairs'), createObject()), if(and(not(empty(parameters('storageAccountResourceId'))), not(parameters('storageAccountUseIdentityAuthentication'))), createObject('AzureWebJobsStorage', format('DefaultEndpointsProtocol=https;AccountName={0};AccountKey={1};EndpointSuffix={2}', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/')), listKeys(extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(parameters('storageAccountResourceId'), '//'), '/')[2], split(coalesce(parameters('storageAccountResourceId'), '////'), '/')[4]), 'Microsoft.Storage/storageAccounts', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), '2023-05-01').keys[0].value, environment().suffixes.storage)), if(and(not(empty(parameters('storageAccountResourceId'))), parameters('storageAccountUseIdentityAuthentication')), union(createObject('AzureWebJobsStorage__accountName', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), createObject('AzureWebJobsStorage__blobServiceUri', reference('storageAccount').primaryEndpoints.blob)), createObject())), if(not(empty(parameters('appInsightResourceId'))), createObject('APPLICATIONINSIGHTS_CONNECTION_STRING', reference('appInsight').ConnectionString), createObject()))]", "dependsOn": [ "appInsight", - "app::slot", "storageAccount" ] } @@ -2827,7 +2810,6 @@ } }, "dependsOn": [ - "app", "slot" ] }, @@ -2861,8 +2843,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "4125449038326941856" + "version": "0.32.4.45862", + "templateHash": "7520862438079257784" }, "name": "Site Slot Auth Settings V2 Config", "description": "This module deploys a Site Auth Settings V2 Configuration.", @@ -2943,7 +2925,6 @@ } }, "dependsOn": [ - "app", "slot" ] }, @@ -2983,8 +2964,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "7770417760937550862" + "version": "0.32.4.45862", + "templateHash": "7825465991750589571" }, "name": "Web Site Slot Basic Publishing Credentials Policies", "description": "This module deploys a Web Site Slot Basic Publishing Credentials Policy.", @@ -3072,7 +3053,6 @@ } }, "dependsOn": [ - "app", "slot" ] }, @@ -3109,8 +3089,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8841665571877490324" + "version": "0.32.4.45862", + "templateHash": "17077514105319261327" }, "name": "Web/Function Apps Slot Hybrid Connection Relay", "description": "This module deploys a Site Slot Hybrid Connection Namespace Relay.", @@ -3186,7 +3166,6 @@ } }, "dependsOn": [ - "app", "slot" ] }, @@ -3215,8 +3194,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3414152511831931415" + "version": "0.32.4.45862", + "templateHash": "6009904765637009298" }, "name": "Site Deployment Extension ", "description": "This module deploys a Site extension for MSDeploy.", @@ -3249,10 +3228,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'MSDeploy')]", "kind": "MSDeploy", - "properties": "[parameters('msDeployConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('msDeployConfiguration')]" } }, "outputs": { @@ -3279,10 +3255,7 @@ } } } - }, - "dependsOn": [ - "app" - ] + } }, "slot_privateEndpoints": { "copy": { @@ -4047,7 +4020,6 @@ } }, "dependsOn": [ - "app", "slot" ] } @@ -4144,8 +4116,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "2026976021876048432" + "version": "0.32.4.45862", + "templateHash": "17238693910097535438" }, "name": "Web Site Basic Publishing Credentials Policies", "description": "This module deploys a Web Site Basic Publishing Credentials Policy.", @@ -4260,8 +4232,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "10816364199058461544" + "version": "0.32.4.45862", + "templateHash": "1355773536309398809" }, "name": "Web/Function Apps Hybrid Connection Relay", "description": "This module deploys a Site Hybrid Connection Namespace Relay.", diff --git a/avm/res/web/site/slot/basic-publishing-credentials-policy/main.json b/avm/res/web/site/slot/basic-publishing-credentials-policy/main.json index 0d47c673fa..88e86be4d9 100644 --- a/avm/res/web/site/slot/basic-publishing-credentials-policy/main.json +++ b/avm/res/web/site/slot/basic-publishing-credentials-policy/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "7770417760937550862" + "version": "0.32.4.45862", + "templateHash": "7825465991750589571" }, "name": "Web Site Slot Basic Publishing Credentials Policies", "description": "This module deploys a Web Site Slot Basic Publishing Credentials Policy.", diff --git a/avm/res/web/site/slot/config--appsettings/main.json b/avm/res/web/site/slot/config--appsettings/main.json index 57c21132b4..72905aa1e8 100644 --- a/avm/res/web/site/slot/config--appsettings/main.json +++ b/avm/res/web/site/slot/config--appsettings/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "13277907644137249086" + "version": "0.32.4.45862", + "templateHash": "4424839419368047088" }, "name": "Site Slot App Settings", "description": "This module deploys a Site Slot App Setting.", @@ -86,10 +86,7 @@ "existing": true, "type": "Microsoft.Web/sites/slots", "apiVersion": "2023-12-01", - "name": "[format('{0}/{1}', parameters('appName'), parameters('slotName'))]", - "dependsOn": [ - "app" - ] + "name": "[format('{0}/{1}', parameters('appName'), parameters('slotName'))]" }, "app": { "existing": true, @@ -123,7 +120,6 @@ "properties": "[union(coalesce(parameters('currentAppSettings'), createObject()), coalesce(parameters('appSettingsKeyValuePairs'), createObject()), if(and(not(empty(parameters('storageAccountResourceId'))), not(parameters('storageAccountUseIdentityAuthentication'))), createObject('AzureWebJobsStorage', format('DefaultEndpointsProtocol=https;AccountName={0};AccountKey={1};EndpointSuffix={2}', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/')), listKeys(extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(parameters('storageAccountResourceId'), '//'), '/')[2], split(coalesce(parameters('storageAccountResourceId'), '////'), '/')[4]), 'Microsoft.Storage/storageAccounts', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), '2023-05-01').keys[0].value, environment().suffixes.storage)), if(and(not(empty(parameters('storageAccountResourceId'))), parameters('storageAccountUseIdentityAuthentication')), union(createObject('AzureWebJobsStorage__accountName', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), createObject('AzureWebJobsStorage__blobServiceUri', reference('storageAccount').primaryEndpoints.blob)), createObject())), if(not(empty(parameters('appInsightResourceId'))), createObject('APPLICATIONINSIGHTS_CONNECTION_STRING', reference('appInsight').ConnectionString), createObject()))]", "dependsOn": [ "appInsight", - "app::slot", "storageAccount" ] } diff --git a/avm/res/web/site/slot/config--authsettingsv2/main.json b/avm/res/web/site/slot/config--authsettingsv2/main.json index 8009b43b55..0d18bdcb86 100644 --- a/avm/res/web/site/slot/config--authsettingsv2/main.json +++ b/avm/res/web/site/slot/config--authsettingsv2/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "4125449038326941856" + "version": "0.32.4.45862", + "templateHash": "7520862438079257784" }, "name": "Site Slot Auth Settings V2 Config", "description": "This module deploys a Site Auth Settings V2 Configuration.", diff --git a/avm/res/web/site/slot/extensions--msdeploy/main.json b/avm/res/web/site/slot/extensions--msdeploy/main.json index 042bd8a033..e60a373557 100644 --- a/avm/res/web/site/slot/extensions--msdeploy/main.json +++ b/avm/res/web/site/slot/extensions--msdeploy/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3414152511831931415" + "version": "0.32.4.45862", + "templateHash": "6009904765637009298" }, "name": "Site Deployment Extension ", "description": "This module deploys a Site extension for MSDeploy.", @@ -39,10 +39,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'MSDeploy')]", "kind": "MSDeploy", - "properties": "[parameters('msDeployConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('msDeployConfiguration')]" } }, "outputs": { diff --git a/avm/res/web/site/slot/hybrid-connection-namespace/relay/main.json b/avm/res/web/site/slot/hybrid-connection-namespace/relay/main.json index f95687fa81..49cf51aeae 100644 --- a/avm/res/web/site/slot/hybrid-connection-namespace/relay/main.json +++ b/avm/res/web/site/slot/hybrid-connection-namespace/relay/main.json @@ -4,8 +4,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8841665571877490324" + "version": "0.32.4.45862", + "templateHash": "17077514105319261327" }, "name": "Web/Function Apps Slot Hybrid Connection Relay", "description": "This module deploys a Site Slot Hybrid Connection Namespace Relay.", diff --git a/avm/res/web/site/slot/main.json b/avm/res/web/site/slot/main.json index 13726945cb..81102c4c73 100644 --- a/avm/res/web/site/slot/main.json +++ b/avm/res/web/site/slot/main.json @@ -5,8 +5,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "4039289806405873433" + "version": "0.32.4.45862", + "templateHash": "8976700881133740118" }, "name": "Web/Function App Deployment Slots", "description": "This module deploys a Web or Function App Deployment Slot.", @@ -863,10 +863,7 @@ "vnetContentShareEnabled": "[parameters('vnetContentShareEnabled')]", "vnetImagePullEnabled": "[parameters('vnetImagePullEnabled')]", "vnetRouteAllEnabled": "[parameters('vnetRouteAllEnabled')]" - }, - "dependsOn": [ - "app" - ] + } }, "slot_lock": { "condition": "[and(not(empty(coalesce(parameters('lock'), createObject()))), not(equals(tryGet(parameters('lock'), 'kind'), 'None')))]", @@ -986,8 +983,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "13277907644137249086" + "version": "0.32.4.45862", + "templateHash": "4424839419368047088" }, "name": "Site Slot App Settings", "description": "This module deploys a Site Slot App Setting.", @@ -1067,10 +1064,7 @@ "existing": true, "type": "Microsoft.Web/sites/slots", "apiVersion": "2023-12-01", - "name": "[format('{0}/{1}', parameters('appName'), parameters('slotName'))]", - "dependsOn": [ - "app" - ] + "name": "[format('{0}/{1}', parameters('appName'), parameters('slotName'))]" }, "app": { "existing": true, @@ -1104,7 +1098,6 @@ "properties": "[union(coalesce(parameters('currentAppSettings'), createObject()), coalesce(parameters('appSettingsKeyValuePairs'), createObject()), if(and(not(empty(parameters('storageAccountResourceId'))), not(parameters('storageAccountUseIdentityAuthentication'))), createObject('AzureWebJobsStorage', format('DefaultEndpointsProtocol=https;AccountName={0};AccountKey={1};EndpointSuffix={2}', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/')), listKeys(extensionResourceId(format('/subscriptions/{0}/resourceGroups/{1}', split(coalesce(parameters('storageAccountResourceId'), '//'), '/')[2], split(coalesce(parameters('storageAccountResourceId'), '////'), '/')[4]), 'Microsoft.Storage/storageAccounts', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), '2023-05-01').keys[0].value, environment().suffixes.storage)), if(and(not(empty(parameters('storageAccountResourceId'))), parameters('storageAccountUseIdentityAuthentication')), union(createObject('AzureWebJobsStorage__accountName', last(split(coalesce(parameters('storageAccountResourceId'), 'dummyName'), '/'))), createObject('AzureWebJobsStorage__blobServiceUri', reference('storageAccount').primaryEndpoints.blob)), createObject())), if(not(empty(parameters('appInsightResourceId'))), createObject('APPLICATIONINSIGHTS_CONNECTION_STRING', reference('appInsight').ConnectionString), createObject()))]", "dependsOn": [ "appInsight", - "app::slot", "storageAccount" ] } @@ -1135,7 +1128,6 @@ } }, "dependsOn": [ - "app", "slot" ] }, @@ -1169,8 +1161,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "4125449038326941856" + "version": "0.32.4.45862", + "templateHash": "7520862438079257784" }, "name": "Site Slot Auth Settings V2 Config", "description": "This module deploys a Site Auth Settings V2 Configuration.", @@ -1251,7 +1243,6 @@ } }, "dependsOn": [ - "app", "slot" ] }, @@ -1291,8 +1282,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "7770417760937550862" + "version": "0.32.4.45862", + "templateHash": "7825465991750589571" }, "name": "Web Site Slot Basic Publishing Credentials Policies", "description": "This module deploys a Web Site Slot Basic Publishing Credentials Policy.", @@ -1380,7 +1371,6 @@ } }, "dependsOn": [ - "app", "slot" ] }, @@ -1417,8 +1407,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "8841665571877490324" + "version": "0.32.4.45862", + "templateHash": "17077514105319261327" }, "name": "Web/Function Apps Slot Hybrid Connection Relay", "description": "This module deploys a Site Slot Hybrid Connection Namespace Relay.", @@ -1494,7 +1484,6 @@ } }, "dependsOn": [ - "app", "slot" ] }, @@ -1523,8 +1512,8 @@ "metadata": { "_generator": { "name": "bicep", - "version": "0.31.92.45157", - "templateHash": "3414152511831931415" + "version": "0.32.4.45862", + "templateHash": "6009904765637009298" }, "name": "Site Deployment Extension ", "description": "This module deploys a Site extension for MSDeploy.", @@ -1557,10 +1546,7 @@ "apiVersion": "2023-12-01", "name": "[format('{0}/{1}', parameters('appName'), 'MSDeploy')]", "kind": "MSDeploy", - "properties": "[parameters('msDeployConfiguration')]", - "dependsOn": [ - "app" - ] + "properties": "[parameters('msDeployConfiguration')]" } }, "outputs": { @@ -1587,10 +1573,7 @@ } } } - }, - "dependsOn": [ - "app" - ] + } }, "slot_privateEndpoints": { "copy": { @@ -2355,7 +2338,6 @@ } }, "dependsOn": [ - "app", "slot" ] }