From 4a321db8be0529f9bc155097f759ac6bfd8935c5 Mon Sep 17 00:00:00 2001 From: Elisa Anzelmo Date: Mon, 24 Jun 2024 19:39:01 +0200 Subject: [PATCH] trustedsrv removed --- avm/res/synapse/workspace/README.md | 13 ------------- avm/res/synapse/workspace/main.bicep | 4 ---- avm/res/synapse/workspace/main.json | 10 +--------- .../workspace/tests/e2e/fwrules/main.test.bicep | 1 - 4 files changed, 1 insertion(+), 27 deletions(-) diff --git a/avm/res/synapse/workspace/README.md b/avm/res/synapse/workspace/README.md index 9f3434dd91..bc5c30419a 100644 --- a/avm/res/synapse/workspace/README.md +++ b/avm/res/synapse/workspace/README.md @@ -288,7 +288,6 @@ module workspace 'br/public:avm/res/synapse/workspace:' = { } ] location: '' - trustedServiceBypassEnabled: true } } ``` @@ -337,9 +336,6 @@ module workspace 'br/public:avm/res/synapse/workspace:' = { }, "location": { "value": "" - }, - "trustedServiceBypassEnabled": { - "value": true } } } @@ -891,7 +887,6 @@ module workspace 'br/public:avm/res/synapse/workspace:' = { | [`roleAssignments`](#parameter-roleassignments) | array | Array of role assignments to create. | | [`sqlAdministratorLoginPassword`](#parameter-sqladministratorloginpassword) | securestring | Password for administrator access to the workspace's SQL pools. If you don't provide a password, one will be automatically generated. You can change the password later. | | [`tags`](#parameter-tags) | object | Tags of the resource. | -| [`trustedServiceBypassEnabled`](#parameter-trustedservicebypassenabled) | bool | Enable or Disable trusted service bypass to workspace. | | [`workspaceRepositoryConfiguration`](#parameter-workspacerepositoryconfiguration) | object | Git integration settings. | ### Parameter: `defaultDataLakeStorageAccountResourceId` @@ -1762,14 +1757,6 @@ Tags of the resource. - Required: No - Type: object -### Parameter: `trustedServiceBypassEnabled` - -Enable or Disable trusted service bypass to workspace. - -- Required: No -- Type: bool -- Default: `False` - ### Parameter: `workspaceRepositoryConfiguration` Git integration settings. diff --git a/avm/res/synapse/workspace/main.bicep b/avm/res/synapse/workspace/main.bicep index b4eafed30d..e5fb18fe06 100644 --- a/avm/res/synapse/workspace/main.bicep +++ b/avm/res/synapse/workspace/main.bicep @@ -66,9 +66,6 @@ param preventDataExfiltration bool = false @description('Optional. Enable or Disable public network access to workspace.') param publicNetworkAccess string = 'Enabled' -@description('Optional. Enable or Disable trusted service bypass to workspace.') -param trustedServiceBypassEnabled bool = false - @description('Optional. List of firewall rules to be created in the workspace.') param firewallRules array = [] @@ -226,7 +223,6 @@ resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' = { } : null publicNetworkAccess: managedVirtualNetwork ? publicNetworkAccess : null - trustedServiceBypassEnabled: trustedServiceBypassEnabled purviewConfiguration: !empty(purviewResourceID) ? { purviewResourceId: purviewResourceID diff --git a/avm/res/synapse/workspace/main.json b/avm/res/synapse/workspace/main.json index ebc0b4491d..c5999f13dd 100644 --- a/avm/res/synapse/workspace/main.json +++ b/avm/res/synapse/workspace/main.json @@ -6,7 +6,7 @@ "_generator": { "name": "bicep", "version": "0.28.1.47646", - "templateHash": "2444729852043147776" + "templateHash": "10691666195971609449" }, "name": "Synapse Workspaces", "description": "This module deploys a Synapse Workspace.", @@ -602,13 +602,6 @@ "description": "Optional. Enable or Disable public network access to workspace." } }, - "trustedServiceBypassEnabled": { - "type": "bool", - "defaultValue": false, - "metadata": { - "description": "Optional. Enable or Disable trusted service bypass to workspace." - } - }, "firewallRules": { "type": "array", "defaultValue": [], @@ -770,7 +763,6 @@ "managedVirtualNetwork": "[if(parameters('managedVirtualNetwork'), 'default', null())]", "managedVirtualNetworkSettings": "[if(parameters('managedVirtualNetwork'), createObject('allowedAadTenantIdsForLinking', parameters('allowedAadTenantIdsForLinking'), 'linkedAccessCheckOnTargetResource', parameters('linkedAccessCheckOnTargetResource'), 'preventDataExfiltration', parameters('preventDataExfiltration')), null())]", "publicNetworkAccess": "[if(parameters('managedVirtualNetwork'), parameters('publicNetworkAccess'), null())]", - "trustedServiceBypassEnabled": "[parameters('trustedServiceBypassEnabled')]", "purviewConfiguration": "[if(not(empty(parameters('purviewResourceID'))), createObject('purviewResourceId', parameters('purviewResourceID')), null())]", "sqlAdministratorLogin": "[parameters('sqlAdministratorLogin')]", "sqlAdministratorLoginPassword": "[if(not(empty(parameters('sqlAdministratorLoginPassword'))), parameters('sqlAdministratorLoginPassword'), null())]", diff --git a/avm/res/synapse/workspace/tests/e2e/fwrules/main.test.bicep b/avm/res/synapse/workspace/tests/e2e/fwrules/main.test.bicep index 4b51d8b8b8..6f717501b8 100644 --- a/avm/res/synapse/workspace/tests/e2e/fwrules/main.test.bicep +++ b/avm/res/synapse/workspace/tests/e2e/fwrules/main.test.bicep @@ -55,7 +55,6 @@ module testDeployment '../../../main.bicep' = [ defaultDataLakeStorageAccountResourceId: nestedDependencies.outputs.storageAccountResourceId defaultDataLakeStorageFilesystem: nestedDependencies.outputs.storageContainerName sqlAdministratorLogin: 'synwsadmin' - trustedServiceBypassEnabled: true firewallRules: [ { name: 'fwrule01'