Skip to content

Commit

Permalink
trustedsrv removed
Browse files Browse the repository at this point in the history
  • Loading branch information
elanzel committed Jun 24, 2024
1 parent ca976c3 commit 4a321db
Show file tree
Hide file tree
Showing 4 changed files with 1 addition and 27 deletions.
13 changes: 0 additions & 13 deletions avm/res/synapse/workspace/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -288,7 +288,6 @@ module workspace 'br/public:avm/res/synapse/workspace:<version>' = {
}
]
location: '<location>'
trustedServiceBypassEnabled: true
}
}
```
Expand Down Expand Up @@ -337,9 +336,6 @@ module workspace 'br/public:avm/res/synapse/workspace:<version>' = {
},
"location": {
"value": "<location>"
},
"trustedServiceBypassEnabled": {
"value": true
}
}
}
Expand Down Expand Up @@ -891,7 +887,6 @@ module workspace 'br/public:avm/res/synapse/workspace:<version>' = {
| [`roleAssignments`](#parameter-roleassignments) | array | Array of role assignments to create. |
| [`sqlAdministratorLoginPassword`](#parameter-sqladministratorloginpassword) | securestring | Password for administrator access to the workspace's SQL pools. If you don't provide a password, one will be automatically generated. You can change the password later. |
| [`tags`](#parameter-tags) | object | Tags of the resource. |
| [`trustedServiceBypassEnabled`](#parameter-trustedservicebypassenabled) | bool | Enable or Disable trusted service bypass to workspace. |
| [`workspaceRepositoryConfiguration`](#parameter-workspacerepositoryconfiguration) | object | Git integration settings. |

### Parameter: `defaultDataLakeStorageAccountResourceId`
Expand Down Expand Up @@ -1762,14 +1757,6 @@ Tags of the resource.
- Required: No
- Type: object

### Parameter: `trustedServiceBypassEnabled`

Enable or Disable trusted service bypass to workspace.

- Required: No
- Type: bool
- Default: `False`

### Parameter: `workspaceRepositoryConfiguration`

Git integration settings.
Expand Down
4 changes: 0 additions & 4 deletions avm/res/synapse/workspace/main.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -66,9 +66,6 @@ param preventDataExfiltration bool = false
@description('Optional. Enable or Disable public network access to workspace.')
param publicNetworkAccess string = 'Enabled'

@description('Optional. Enable or Disable trusted service bypass to workspace.')
param trustedServiceBypassEnabled bool = false

@description('Optional. List of firewall rules to be created in the workspace.')
param firewallRules array = []

Expand Down Expand Up @@ -226,7 +223,6 @@ resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = {
}
: null
publicNetworkAccess: managedVirtualNetwork ? publicNetworkAccess : null
trustedServiceBypassEnabled: trustedServiceBypassEnabled
purviewConfiguration: !empty(purviewResourceID)
? {
purviewResourceId: purviewResourceID
Expand Down
10 changes: 1 addition & 9 deletions avm/res/synapse/workspace/main.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"_generator": {
"name": "bicep",
"version": "0.28.1.47646",
"templateHash": "2444729852043147776"
"templateHash": "10691666195971609449"
},
"name": "Synapse Workspaces",
"description": "This module deploys a Synapse Workspace.",
Expand Down Expand Up @@ -602,13 +602,6 @@
"description": "Optional. Enable or Disable public network access to workspace."
}
},
"trustedServiceBypassEnabled": {
"type": "bool",
"defaultValue": false,
"metadata": {
"description": "Optional. Enable or Disable trusted service bypass to workspace."
}
},
"firewallRules": {
"type": "array",
"defaultValue": [],
Expand Down Expand Up @@ -770,7 +763,6 @@
"managedVirtualNetwork": "[if(parameters('managedVirtualNetwork'), 'default', null())]",
"managedVirtualNetworkSettings": "[if(parameters('managedVirtualNetwork'), createObject('allowedAadTenantIdsForLinking', parameters('allowedAadTenantIdsForLinking'), 'linkedAccessCheckOnTargetResource', parameters('linkedAccessCheckOnTargetResource'), 'preventDataExfiltration', parameters('preventDataExfiltration')), null())]",
"publicNetworkAccess": "[if(parameters('managedVirtualNetwork'), parameters('publicNetworkAccess'), null())]",
"trustedServiceBypassEnabled": "[parameters('trustedServiceBypassEnabled')]",
"purviewConfiguration": "[if(not(empty(parameters('purviewResourceID'))), createObject('purviewResourceId', parameters('purviewResourceID')), null())]",
"sqlAdministratorLogin": "[parameters('sqlAdministratorLogin')]",
"sqlAdministratorLoginPassword": "[if(not(empty(parameters('sqlAdministratorLoginPassword'))), parameters('sqlAdministratorLoginPassword'), null())]",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,6 @@ module testDeployment '../../../main.bicep' = [
defaultDataLakeStorageAccountResourceId: nestedDependencies.outputs.storageAccountResourceId
defaultDataLakeStorageFilesystem: nestedDependencies.outputs.storageContainerName
sqlAdministratorLogin: 'synwsadmin'
trustedServiceBypassEnabled: true
firewallRules: [
{
name: 'fwrule01'
Expand Down

0 comments on commit 4a321db

Please sign in to comment.