From d576709eca7eccf579b852c84bcf956e473c41aa Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sebastian=20Gr=C3=A4f?= Date: Tue, 9 Apr 2024 17:06:29 +1000 Subject: [PATCH] feat: RP update (#1623) --- avm/res/compute/disk-encryption-set/README.md | 2 +- avm/res/compute/disk-encryption-set/main.bicep | 2 +- avm/res/compute/disk-encryption-set/main.json | 12 ++++++------ 3 files changed, 8 insertions(+), 8 deletions(-) diff --git a/avm/res/compute/disk-encryption-set/README.md b/avm/res/compute/disk-encryption-set/README.md index 8cc108d0f5..7ccaba8451 100644 --- a/avm/res/compute/disk-encryption-set/README.md +++ b/avm/res/compute/disk-encryption-set/README.md @@ -17,7 +17,7 @@ This module deploys a Disk Encryption Set. The module will attempt to set permis | :-- | :-- | | `Microsoft.Authorization/locks` | [2020-05-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2020-05-01/locks) | | `Microsoft.Authorization/roleAssignments` | [2022-04-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2022-04-01/roleAssignments) | -| `Microsoft.Compute/diskEncryptionSets` | [2022-07-02](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Compute/2022-07-02/diskEncryptionSets) | +| `Microsoft.Compute/diskEncryptionSets` | [2023-10-02](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Compute/2023-10-02/diskEncryptionSets) | | `Microsoft.KeyVault/vaults/accessPolicies` | [2022-07-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.KeyVault/2022-07-01/vaults/accessPolicies) | ## Usage examples diff --git a/avm/res/compute/disk-encryption-set/main.bicep b/avm/res/compute/disk-encryption-set/main.bicep index 5932efeac2..2ddc1896a5 100644 --- a/avm/res/compute/disk-encryption-set/main.bicep +++ b/avm/res/compute/disk-encryption-set/main.bicep @@ -139,7 +139,7 @@ module keyVaultPermissions 'modules/nested_keyVaultPermissions.bicep' = [ } ] -resource diskEncryptionSet 'Microsoft.Compute/diskEncryptionSets@2022-07-02' = { +resource diskEncryptionSet 'Microsoft.Compute/diskEncryptionSets@2023-10-02' = { name: name location: location tags: tags diff --git a/avm/res/compute/disk-encryption-set/main.json b/avm/res/compute/disk-encryption-set/main.json index da2764ea80..db3719112f 100644 --- a/avm/res/compute/disk-encryption-set/main.json +++ b/avm/res/compute/disk-encryption-set/main.json @@ -6,7 +6,7 @@ "_generator": { "name": "bicep", "version": "0.26.54.24096", - "templateHash": "15675582132137222221" + "templateHash": "12741671665077521328" }, "name": "Disk Encryption Sets", "description": "This module deploys a Disk Encryption Set. The module will attempt to set permissions on the provided Key Vault for any used user-assigned identity.", @@ -279,7 +279,7 @@ }, "diskEncryptionSet": { "type": "Microsoft.Compute/diskEncryptionSets", - "apiVersion": "2022-07-02", + "apiVersion": "2023-10-02", "name": "[parameters('name')]", "location": "[parameters('location')]", "tags": "[parameters('tags')]", @@ -711,14 +711,14 @@ "metadata": { "description": "The principal ID of the system assigned identity." }, - "value": "[coalesce(tryGet(tryGet(reference('diskEncryptionSet', '2022-07-02', 'full'), 'identity'), 'principalId'), '')]" + "value": "[coalesce(tryGet(tryGet(reference('diskEncryptionSet', '2023-10-02', 'full'), 'identity'), 'principalId'), '')]" }, "identities": { "type": "object", "metadata": { "description": "The idenities of the disk encryption set." }, - "value": "[reference('diskEncryptionSet', '2022-07-02', 'full').identity]" + "value": "[reference('diskEncryptionSet', '2023-10-02', 'full').identity]" }, "keyVaultName": { "type": "string", @@ -732,7 +732,7 @@ "metadata": { "description": "The location the resource was deployed into." }, - "value": "[reference('diskEncryptionSet', '2022-07-02', 'full').location]" + "value": "[reference('diskEncryptionSet', '2023-10-02', 'full').location]" } } -} \ No newline at end of file +}