pspulumiyaml.azurenative.authorization.psm1
using module pspulumiyaml function Invoke-AzureNativeFunctionAuthorizationGetManagementLockAtSubscriptionLevel { param ( [parameter(mandatory=$False,HelpMessage='The name of the lock to get.)')] [string] $lockName ) process { $arguments = @{} $arguments["lockName"] = $lockName $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getManagementLockAtSubscriptionLevel -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetPolicyDefinitionAtManagementGroup { param ( [parameter(mandatory=$False,HelpMessage='The name of the policy definition to get.)')] [string] $policyDefinitionName, [parameter(mandatory=$False,HelpMessage='The ID of the management group.)')] [string] $managementGroupId ) process { $arguments = @{} $arguments["managementGroupId"] = $managementGroupId $arguments["policyDefinitionName"] = $policyDefinitionName $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getPolicyDefinitionAtManagementGroup -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetPolicySetDefinition { param ( [parameter(mandatory=$False,HelpMessage='The name of the policy set definition to get.)')] [string] $policySetDefinitionName ) process { $arguments = @{} $arguments["policySetDefinitionName"] = $policySetDefinitionName $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getPolicySetDefinition -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetRoleAssignment { param ( [parameter(mandatory=$False,HelpMessage='The scope of the operation or resource. Valid scopes are: subscription (format: ''/subscriptions/{subscriptionId}''), resource group (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}'', or resource (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/[{parentResourcePath}/]{resourceType}/{resourceName}'')')] [string] $scope, [parameter(mandatory=$False,HelpMessage='The name of the role assignment. It can be any valid GUID.)')] [string] $roleAssignmentName, [parameter(mandatory=$False,HelpMessage='Tenant ID for cross-tenant request)')] [string] $tenantId ) process { $arguments = @{} $arguments["roleAssignmentName"] = $roleAssignmentName $arguments["scope"] = $scope if($PSBoundParameters.Keys -icontains 'tenantId') { $arguments["tenantId"] = $tenantId } $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getRoleAssignment -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetRoleManagementPolicyAssignment { param ( [parameter(mandatory=$False,HelpMessage='The name of format {guid_guid} the role management policy assignment to get.)')] [string] $roleManagementPolicyAssignmentName, [parameter(mandatory=$False,HelpMessage='The scope of the role management policy.)')] [string] $scope ) process { $arguments = @{} $arguments["roleManagementPolicyAssignmentName"] = $roleManagementPolicyAssignmentName $arguments["scope"] = $scope $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getRoleManagementPolicyAssignment -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetPolicySetDefinitionAtManagementGroup { param ( [parameter(mandatory=$False,HelpMessage='The name of the policy set definition to get.)')] [string] $policySetDefinitionName, [parameter(mandatory=$False,HelpMessage='The ID of the management group.)')] [string] $managementGroupId ) process { $arguments = @{} $arguments["managementGroupId"] = $managementGroupId $arguments["policySetDefinitionName"] = $policySetDefinitionName $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getPolicySetDefinitionAtManagementGroup -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetManagementLockByScope { param ( [parameter(mandatory=$False,HelpMessage='The name of lock.)')] [string] $lockName, [parameter(mandatory=$False,HelpMessage='The scope for the lock. )')] [string] $scope ) process { $arguments = @{} $arguments["lockName"] = $lockName $arguments["scope"] = $scope $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getManagementLockByScope -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetAccessReviewScheduleDefinitionById { param ( [parameter(mandatory=$False,HelpMessage='The id of the access review schedule definition.)')] [string] $scheduleDefinitionId ) process { $arguments = @{} $arguments["scheduleDefinitionId"] = $scheduleDefinitionId $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getAccessReviewScheduleDefinitionById -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetClientConfig { param ( ) process { $arguments = @{} $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getClientConfig -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetAccessReviewHistoryDefinitionById { param ( [parameter(mandatory=$False,HelpMessage='The id of the access review history definition.)')] [string] $historyDefinitionId ) process { $arguments = @{} $arguments["historyDefinitionId"] = $historyDefinitionId $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getAccessReviewHistoryDefinitionById -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetPolicyDefinition { param ( [parameter(mandatory=$False,HelpMessage='The name of the policy definition to get.)')] [string] $policyDefinitionName ) process { $arguments = @{} $arguments["policyDefinitionName"] = $policyDefinitionName $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getPolicyDefinition -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetPolicyAssignment { param ( [parameter(mandatory=$False,HelpMessage='The name of the policy assignment to get.)')] [string] $policyAssignmentName, [parameter(mandatory=$False,HelpMessage='The scope of the policy assignment. Valid scopes are: management group (format: ''/providers/Microsoft.Management/managementGroups/{managementGroup}''), subscription (format: ''/subscriptions/{subscriptionId}''), resource group (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}'', or resource (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/[{parentResourcePath}/]{resourceType}/{resourceName}'')')] [string] $scope ) process { $arguments = @{} $arguments["policyAssignmentName"] = $policyAssignmentName $arguments["scope"] = $scope $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getPolicyAssignment -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetResourceManagementPrivateLink { param ( [parameter(mandatory=$False,HelpMessage='The name of the resource group. The name is case insensitive.)')] [string] $resourceGroupName, [parameter(mandatory=$False,HelpMessage='The name of the resource management private link.)')] [string] $rmplName ) process { $arguments = @{} $arguments["resourceGroupName"] = $resourceGroupName $arguments["rmplName"] = $rmplName $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getResourceManagementPrivateLink -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetPolicyExemption { param ( [parameter(mandatory=$False,HelpMessage='The scope of the policy exemption. Valid scopes are: management group (format: ''/providers/Microsoft.Management/managementGroups/{managementGroup}''), subscription (format: ''/subscriptions/{subscriptionId}''), resource group (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}'', or resource (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/[{parentResourcePath}/]{resourceType}/{resourceName}'')')] [string] $scope, [parameter(mandatory=$False,HelpMessage='The name of the policy exemption to delete.)')] [string] $policyExemptionName ) process { $arguments = @{} $arguments["policyExemptionName"] = $policyExemptionName $arguments["scope"] = $scope $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getPolicyExemption -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetManagementLockAtResourceLevel { param ( [parameter(mandatory=$False,HelpMessage='The namespace of the resource provider.)')] [string] $resourceProviderNamespace, [parameter(mandatory=$False,HelpMessage='The name of the resource.)')] [string] $resourceName, [parameter(mandatory=$False,HelpMessage='The name of the resource group. )')] [string] $resourceGroupName, [parameter(mandatory=$False,HelpMessage='The name of lock.)')] [string] $lockName, [parameter(mandatory=$False,HelpMessage='An extra path parameter needed in some services, like SQL Databases.)')] [string] $parentResourcePath, [parameter(mandatory=$False,HelpMessage='The type of the resource.)')] [string] $resourceType ) process { $arguments = @{} $arguments["lockName"] = $lockName $arguments["parentResourcePath"] = $parentResourcePath $arguments["resourceGroupName"] = $resourceGroupName $arguments["resourceName"] = $resourceName $arguments["resourceProviderNamespace"] = $resourceProviderNamespace $arguments["resourceType"] = $resourceType $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getManagementLockAtResourceLevel -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetManagementLockAtResourceGroupLevel { param ( [parameter(mandatory=$False,HelpMessage='The name of the lock to get.)')] [string] $lockName, [parameter(mandatory=$False,HelpMessage='The name of the locked resource group.)')] [string] $resourceGroupName ) process { $arguments = @{} $arguments["lockName"] = $lockName $arguments["resourceGroupName"] = $resourceGroupName $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getManagementLockAtResourceGroupLevel -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetClientToken { param ( [parameter(mandatory=$False,HelpMessage='Optional authentication endpoint. Defaults to the endpoint of Azure Resource Manager.)')] [string] $endpoint ) process { $arguments = @{} if($PSBoundParameters.Keys -icontains 'endpoint') { $arguments["endpoint"] = $endpoint } $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getClientToken -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetPrivateLinkAssociation { param ( [parameter(mandatory=$False,HelpMessage='The management group ID.)')] [string] $groupId, [parameter(mandatory=$False,HelpMessage='The ID of the PLA)')] [string] $plaId ) process { $arguments = @{} $arguments["groupId"] = $groupId $arguments["plaId"] = $plaId $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getPrivateLinkAssociation -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } function Invoke-AzureNativeFunctionAuthorizationGetRoleDefinition { param ( [parameter(mandatory=$False,HelpMessage='The ID of the role definition.)')] [string] $roleDefinitionId, [parameter(mandatory=$False,HelpMessage='The scope of the role definition.)')] [string] $scope ) process { $arguments = @{} $arguments["roleDefinitionId"] = $roleDefinitionId $arguments["scope"] = $scope $functionObject = Invoke-PulumiFunction -Name azure-native:authorization:getRoleDefinition -variableName $([guid]::NewGuid().Guid) -Arguments $arguments return $functionObject } } class ParameterDefinitionsValueMetadata { [string] $displayName [string] $description [bool] $assignPermissions [string] $strongType } function New-AzureNativeTypeAuthorizationParameterDefinitionsValueMetadata { param ( [parameter(mandatory=$False,HelpMessage='The display name for the parameter.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The description of the parameter.)')] [string] $description, [parameter(mandatory=$False,HelpMessage='Set to true to have Azure portal create role assignments on the resource ID or resource scope value of this parameter during policy assignment. This property is useful in case you wish to assign permissions outside the assignment scope.)')] [bool] $assignPermissions, [parameter(mandatory=$False,HelpMessage='Used when assigning the policy definition through the portal. Provides a context aware list of values for the user to choose from.)')] [string] $strongType ) process { return $([ParameterDefinitionsValueMetadata]$PSBoundParameters) } } class ParameterDefinitionsValue { [object[]] $allowedValues [ParameterDefinitionsValueMetadata] $metadata [ArgumentCompletions('String', 'Array', 'Object', 'Boolean', 'Integer', 'Float', 'DateTime')] [string] $type [object] $defaultValue } function New-AzureNativeTypeAuthorizationParameterDefinitionsValue { param ( [parameter(mandatory=$False,HelpMessage='The allowed values for the parameter.)')] $allowedValues, [parameter(mandatory=$False,HelpMessage='General metadata for the parameter.)')] [ParameterDefinitionsValueMetadata] $metadata, [parameter(mandatory=$False,HelpMessage='The data type of the parameter.)')] [string] [ValidateSet('String', 'Array', 'Object', 'Boolean', 'Integer', 'Float', 'DateTime')] $type, [parameter(mandatory=$False,HelpMessage='The default value for the parameter if no value is provided.)')] $defaultValue ) process { return $([ParameterDefinitionsValue]$PSBoundParameters) } } function New-AzureNativeAuthorizationPolicyDefinitionAtManagementGroup { [Alias('azure_native_authorization_policydefinitionatmanagementgroup')] param ( [parameter(mandatory=$False,HelpMessage='The parameter definitions for parameters used in the policy rule. The keys are the parameter names.)')] [ParameterDefinitionsValue] $parameters, [parameter(mandatory=$False,HelpMessage='The policy definition metadata. Metadata is an open ended object and is typically a collection of key value pairs.)')] $metadata, [parameter(mandatory=$False,HelpMessage='The type of policy definition. Possible values are NotSpecified, BuiltIn, Custom, and Static.)')] [string] [ValidateSet('NotSpecified', 'BuiltIn', 'Custom', 'Static')] $policyType, [parameter(mandatory=$False,HelpMessage='The name of the policy definition to create.)')] [string] $policyDefinitionName, [parameter(mandatory=$False,HelpMessage='The ID of the management group.)')] [string] $managementGroupId, [parameter(mandatory=$False,HelpMessage='The display name of the policy definition.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The policy rule.)')] $policyRule, [parameter(mandatory=$False,HelpMessage='The policy definition mode. Some examples are All, Indexed, Microsoft.KeyVault.Data.)')] [string] $mode, [parameter(mandatory=$False,HelpMessage='The policy definition description.)')] [string] $description, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:PolicyDefinitionAtManagementGroup") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["managementGroupId"] = $managementGroupId if($PSBoundParameters.Keys -icontains 'parameters') { $resource.properties["parameters"] = $parameters } if($PSBoundParameters.Keys -icontains 'metadata') { $resource.properties["metadata"] = $metadata } if($PSBoundParameters.Keys -icontains 'policyType') { $resource.properties["policyType"] = $policyType } if($PSBoundParameters.Keys -icontains 'policyDefinitionName') { $resource.properties["policyDefinitionName"] = $policyDefinitionName } if($PSBoundParameters.Keys -icontains 'displayName') { $resource.properties["displayName"] = $displayName } if($PSBoundParameters.Keys -icontains 'policyRule') { $resource.properties["policyRule"] = $policyRule } if($PSBoundParameters.Keys -icontains 'mode') { $resource.properties["mode"] = $mode } if($PSBoundParameters.Keys -icontains 'description') { $resource.properties["description"] = $description } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationManagementLockAtSubscriptionLevel { [Alias('azure_native_authorization_managementlockatsubscriptionlevel')] param ( [parameter(mandatory=$False,HelpMessage='The owners of the lock.)')] $owners, [parameter(mandatory=$False,HelpMessage='The level of the lock. Possible values are: NotSpecified, CanNotDelete, ReadOnly. CanNotDelete means authorized users are able to read and modify the resources, but not delete. ReadOnly means authorized users can only read from a resource, but they can''t modify or delete it.)')] [string] [ValidateSet('NotSpecified', 'CanNotDelete', 'ReadOnly')] $level, [parameter(mandatory=$False,HelpMessage='The name of lock. The lock name can be a maximum of 260 characters. It cannot contain <, > %, &, :, \, ?, /, or any control characters.)')] [string] $lockName, [parameter(mandatory=$False,HelpMessage='Notes about the lock. Maximum of 512 characters.)')] [string] $notes, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:ManagementLockAtSubscriptionLevel") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["level"] = $level if($PSBoundParameters.Keys -icontains 'owners') { $resource.properties["owners"] = $owners } if($PSBoundParameters.Keys -icontains 'lockName') { $resource.properties["lockName"] = $lockName } if($PSBoundParameters.Keys -icontains 'notes') { $resource.properties["notes"] = $notes } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationRoleManagementPolicyAssignment { [Alias('azure_native_authorization_rolemanagementpolicyassignment')] param ( [parameter(mandatory=$False,HelpMessage='The policy id role management policy assignment.)')] [string] $policyId, [parameter(mandatory=$False,HelpMessage='The name of format {guid_guid} the role management policy assignment to upsert.)')] [string] $roleManagementPolicyAssignmentName, [parameter(mandatory=$False,HelpMessage='The role definition of management policy assignment.)')] [string] $roleDefinitionId, [parameter(mandatory=$False,HelpMessage='The role management policy scope.)')] [string] $scope, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:RoleManagementPolicyAssignment") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["scope"] = $scope if($PSBoundParameters.Keys -icontains 'policyId') { $resource.properties["policyId"] = $policyId } if($PSBoundParameters.Keys -icontains 'roleManagementPolicyAssignmentName') { $resource.properties["roleManagementPolicyAssignmentName"] = $roleManagementPolicyAssignmentName } if($PSBoundParameters.Keys -icontains 'roleDefinitionId') { $resource.properties["roleDefinitionId"] = $roleDefinitionId } $global:pulumiresources += $resource return $resource } } class ParameterValuesValue { [object] $value } function New-AzureNativeTypeAuthorizationParameterValuesValue { param ( [parameter(mandatory=$False,HelpMessage='The value of the parameter.)')] $value ) process { return $([ParameterValuesValue]$PSBoundParameters) } } class Identity { [ArgumentCompletions('SystemAssigned', 'None')] [object] $type } function New-AzureNativeTypeAuthorizationIdentity { param ( [parameter(mandatory=$False,HelpMessage='The identity type. This is the only required field when adding a system assigned identity to a resource.)')] $type ) process { return $([Identity]$PSBoundParameters) } } function New-AzureNativeAuthorizationPolicyAssignment { [Alias('azure_native_authorization_policyassignment')] param ( [parameter(mandatory=$False,HelpMessage='The parameter values for the assigned policy rule. The keys are the parameter names.)')] [ParameterValuesValue] $parameters, [parameter(mandatory=$False,HelpMessage='The policy assignment enforcement mode. Possible values are Default and DoNotEnforce.)')] [string] [ValidateSet('Default', 'DoNotEnforce')] $enforcementMode, [parameter(mandatory=$False,HelpMessage='The policy assignment metadata. Metadata is an open ended object and is typically a collection of key value pairs.)')] $metadata, [parameter(mandatory=$False,HelpMessage='The managed identity associated with the policy assignment.)')] [Identity] $identity, [parameter(mandatory=$False,HelpMessage='The messages that describe why a resource is non-compliant with the policy.)')] $nonComplianceMessages, [parameter(mandatory=$False,HelpMessage='The scope of the policy assignment. Valid scopes are: management group (format: ''/providers/Microsoft.Management/managementGroups/{managementGroup}''), subscription (format: ''/subscriptions/{subscriptionId}''), resource group (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}'', or resource (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/[{parentResourcePath}/]{resourceType}/{resourceName}'')')] [string] $scope, [parameter(mandatory=$False,HelpMessage='The ID of the policy definition or policy set definition being assigned.)')] [string] $policyDefinitionId, [parameter(mandatory=$False,HelpMessage='The name of the policy assignment.)')] [string] $policyAssignmentName, [parameter(mandatory=$False,HelpMessage='The display name of the policy assignment.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The location of the policy assignment. Only required when utilizing managed identity.)')] [string] $location, [parameter(mandatory=$False,HelpMessage='This message will be part of response in case of policy violation.)')] [string] $description, [parameter(mandatory=$False,HelpMessage='The policy''s excluded scopes.)')] [string[]] $notScopes, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:PolicyAssignment") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["scope"] = $scope if($PSBoundParameters.Keys -icontains 'parameters') { $resource.properties["parameters"] = $parameters } if($PSBoundParameters.Keys -icontains 'enforcementMode') { $resource.properties["enforcementMode"] = $enforcementMode } if($PSBoundParameters.Keys -icontains 'metadata') { $resource.properties["metadata"] = $metadata } if($PSBoundParameters.Keys -icontains 'identity') { $resource.properties["identity"] = $identity } if($PSBoundParameters.Keys -icontains 'nonComplianceMessages') { $resource.properties["nonComplianceMessages"] = $nonComplianceMessages } if($PSBoundParameters.Keys -icontains 'policyDefinitionId') { $resource.properties["policyDefinitionId"] = $policyDefinitionId } if($PSBoundParameters.Keys -icontains 'policyAssignmentName') { $resource.properties["policyAssignmentName"] = $policyAssignmentName } if($PSBoundParameters.Keys -icontains 'displayName') { $resource.properties["displayName"] = $displayName } if($PSBoundParameters.Keys -icontains 'location') { $resource.properties["location"] = $location } if($PSBoundParameters.Keys -icontains 'description') { $resource.properties["description"] = $description } if($PSBoundParameters.Keys -icontains 'notScopes') { $resource.properties["notScopes"] = $notScopes } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationPolicySetDefinition { [Alias('azure_native_authorization_policysetdefinition')] param ( [parameter(mandatory=$False,HelpMessage='The metadata describing groups of policy definition references within the policy set definition.)')] $policyDefinitionGroups, [parameter(mandatory=$False,HelpMessage='The display name of the policy set definition.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The policy set definition description.)')] [string] $description, [parameter(mandatory=$False,HelpMessage='The type of policy definition. Possible values are NotSpecified, BuiltIn, Custom, and Static.)')] [string] [ValidateSet('NotSpecified', 'BuiltIn', 'Custom', 'Static')] $policyType, [parameter(mandatory=$False,HelpMessage='The policy set definition parameters that can be used in policy definition references.)')] [ParameterDefinitionsValue] $parameters, [parameter(mandatory=$False,HelpMessage='An array of policy definition references.)')] $policyDefinitions, [parameter(mandatory=$False,HelpMessage='The name of the policy set definition to create.)')] [string] $policySetDefinitionName, [parameter(mandatory=$False,HelpMessage='The policy set definition metadata. Metadata is an open ended object and is typically a collection of key value pairs.)')] $metadata, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:PolicySetDefinition") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["policyDefinitions"] = $policyDefinitions if($PSBoundParameters.Keys -icontains 'policyDefinitionGroups') { $resource.properties["policyDefinitionGroups"] = $policyDefinitionGroups } if($PSBoundParameters.Keys -icontains 'displayName') { $resource.properties["displayName"] = $displayName } if($PSBoundParameters.Keys -icontains 'description') { $resource.properties["description"] = $description } if($PSBoundParameters.Keys -icontains 'policyType') { $resource.properties["policyType"] = $policyType } if($PSBoundParameters.Keys -icontains 'parameters') { $resource.properties["parameters"] = $parameters } if($PSBoundParameters.Keys -icontains 'policySetDefinitionName') { $resource.properties["policySetDefinitionName"] = $policySetDefinitionName } if($PSBoundParameters.Keys -icontains 'metadata') { $resource.properties["metadata"] = $metadata } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationPolicySetDefinitionAtManagementGroup { [Alias('azure_native_authorization_policysetdefinitionatmanagementgroup')] param ( [parameter(mandatory=$False,HelpMessage='The policy set definition parameters that can be used in policy definition references.)')] [ParameterDefinitionsValue] $parameters, [parameter(mandatory=$False,HelpMessage='The policy set definition metadata. Metadata is an open ended object and is typically a collection of key value pairs.)')] $metadata, [parameter(mandatory=$False,HelpMessage='The type of policy definition. Possible values are NotSpecified, BuiltIn, Custom, and Static.)')] [string] [ValidateSet('NotSpecified', 'BuiltIn', 'Custom', 'Static')] $policyType, [parameter(mandatory=$False,HelpMessage='The name of the policy set definition to create.)')] [string] $policySetDefinitionName, [parameter(mandatory=$False,HelpMessage='An array of policy definition references.)')] $policyDefinitions, [parameter(mandatory=$False,HelpMessage='The metadata describing groups of policy definition references within the policy set definition.)')] $policyDefinitionGroups, [parameter(mandatory=$False,HelpMessage='The ID of the management group.)')] [string] $managementGroupId, [parameter(mandatory=$False,HelpMessage='The display name of the policy set definition.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The policy set definition description.)')] [string] $description, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:PolicySetDefinitionAtManagementGroup") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["managementGroupId"] = $managementGroupId $resource.properties["policyDefinitions"] = $policyDefinitions if($PSBoundParameters.Keys -icontains 'parameters') { $resource.properties["parameters"] = $parameters } if($PSBoundParameters.Keys -icontains 'metadata') { $resource.properties["metadata"] = $metadata } if($PSBoundParameters.Keys -icontains 'policyType') { $resource.properties["policyType"] = $policyType } if($PSBoundParameters.Keys -icontains 'policySetDefinitionName') { $resource.properties["policySetDefinitionName"] = $policySetDefinitionName } if($PSBoundParameters.Keys -icontains 'policyDefinitionGroups') { $resource.properties["policyDefinitionGroups"] = $policyDefinitionGroups } if($PSBoundParameters.Keys -icontains 'displayName') { $resource.properties["displayName"] = $displayName } if($PSBoundParameters.Keys -icontains 'description') { $resource.properties["description"] = $description } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationManagementLockAtResourceLevel { [Alias('azure_native_authorization_managementlockatresourcelevel')] param ( [parameter(mandatory=$False,HelpMessage='The parent resource identity.)')] [string] $parentResourcePath, [parameter(mandatory=$False,HelpMessage='The level of the lock. Possible values are: NotSpecified, CanNotDelete, ReadOnly. CanNotDelete means authorized users are able to read and modify the resources, but not delete. ReadOnly means authorized users can only read from a resource, but they can''t modify or delete it.)')] [string] [ValidateSet('NotSpecified', 'CanNotDelete', 'ReadOnly')] $level, [parameter(mandatory=$False,HelpMessage='Notes about the lock. Maximum of 512 characters.)')] [string] $notes, [parameter(mandatory=$False,HelpMessage='The name of lock. The lock name can be a maximum of 260 characters. It cannot contain <, > %, &, :, \, ?, /, or any control characters.)')] [string] $lockName, [parameter(mandatory=$False,HelpMessage='The owners of the lock.)')] $owners, [parameter(mandatory=$False,HelpMessage='The resource type of the resource to lock.)')] [string] $resourceType, [parameter(mandatory=$False,HelpMessage='The resource provider namespace of the resource to lock.)')] [string] $resourceProviderNamespace, [parameter(mandatory=$False,HelpMessage='The name of the resource to lock.)')] [string] $resourceName, [parameter(mandatory=$False,HelpMessage='The name of the resource group containing the resource to lock. )')] [string] $resourceGroupName, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:ManagementLockAtResourceLevel") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["level"] = $level $resource.properties["parentResourcePath"] = $parentResourcePath $resource.properties["resourceGroupName"] = $resourceGroupName $resource.properties["resourceName"] = $resourceName $resource.properties["resourceProviderNamespace"] = $resourceProviderNamespace $resource.properties["resourceType"] = $resourceType if($PSBoundParameters.Keys -icontains 'notes') { $resource.properties["notes"] = $notes } if($PSBoundParameters.Keys -icontains 'lockName') { $resource.properties["lockName"] = $lockName } if($PSBoundParameters.Keys -icontains 'owners') { $resource.properties["owners"] = $owners } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationManagementLockByScope { [Alias('azure_native_authorization_managementlockbyscope')] param ( [parameter(mandatory=$False,HelpMessage='The owners of the lock.)')] $owners, [parameter(mandatory=$False,HelpMessage='The level of the lock. Possible values are: NotSpecified, CanNotDelete, ReadOnly. CanNotDelete means authorized users are able to read and modify the resources, but not delete. ReadOnly means authorized users can only read from a resource, but they can''t modify or delete it.)')] [string] [ValidateSet('NotSpecified', 'CanNotDelete', 'ReadOnly')] $level, [parameter(mandatory=$False,HelpMessage='The name of lock.)')] [string] $lockName, [parameter(mandatory=$False,HelpMessage='The scope for the lock. When providing a scope for the assignment, use ''/subscriptions/{subscriptionId}'' for subscriptions, ''/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}'' for resource groups, and ''/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePathIfPresent}/{resourceType}/{resourceName}'' for resources.)')] [string] $scope, [parameter(mandatory=$False,HelpMessage='Notes about the lock. Maximum of 512 characters.)')] [string] $notes, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:ManagementLockByScope") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["level"] = $level $resource.properties["scope"] = $scope if($PSBoundParameters.Keys -icontains 'owners') { $resource.properties["owners"] = $owners } if($PSBoundParameters.Keys -icontains 'lockName') { $resource.properties["lockName"] = $lockName } if($PSBoundParameters.Keys -icontains 'notes') { $resource.properties["notes"] = $notes } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationRoleDefinition { [Alias('azure_native_authorization_roledefinition')] param ( [parameter(mandatory=$False,HelpMessage='The ID of the role definition.)')] [string] $roleDefinitionId, [parameter(mandatory=$False,HelpMessage='The role definition description.)')] [string] $description, [parameter(mandatory=$False,HelpMessage='The role name.)')] [string] $roleName, [parameter(mandatory=$False,HelpMessage='The role type.)')] [string] $roleType, [parameter(mandatory=$False,HelpMessage='Role definition assignable scopes.)')] [string[]] $assignableScopes, [parameter(mandatory=$False,HelpMessage='Role definition permissions.)')] $permissions, [parameter(mandatory=$False,HelpMessage='The scope of the role definition.)')] [string] $scope, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:RoleDefinition") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["scope"] = $scope if($PSBoundParameters.Keys -icontains 'roleDefinitionId') { $resource.properties["roleDefinitionId"] = $roleDefinitionId } if($PSBoundParameters.Keys -icontains 'description') { $resource.properties["description"] = $description } if($PSBoundParameters.Keys -icontains 'roleName') { $resource.properties["roleName"] = $roleName } if($PSBoundParameters.Keys -icontains 'roleType') { $resource.properties["roleType"] = $roleType } if($PSBoundParameters.Keys -icontains 'assignableScopes') { $resource.properties["assignableScopes"] = $assignableScopes } if($PSBoundParameters.Keys -icontains 'permissions') { $resource.properties["permissions"] = $permissions } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationManagementLockAtResourceGroupLevel { [Alias('azure_native_authorization_managementlockatresourcegrouplevel')] param ( [parameter(mandatory=$False,HelpMessage='The owners of the lock.)')] $owners, [parameter(mandatory=$False,HelpMessage='The level of the lock. Possible values are: NotSpecified, CanNotDelete, ReadOnly. CanNotDelete means authorized users are able to read and modify the resources, but not delete. ReadOnly means authorized users can only read from a resource, but they can''t modify or delete it.)')] [string] [ValidateSet('NotSpecified', 'CanNotDelete', 'ReadOnly')] $level, [parameter(mandatory=$False,HelpMessage='The lock name. The lock name can be a maximum of 260 characters. It cannot contain <, > %, &, :, \, ?, /, or any control characters.)')] [string] $lockName, [parameter(mandatory=$False,HelpMessage='The name of the resource group to lock.)')] [string] $resourceGroupName, [parameter(mandatory=$False,HelpMessage='Notes about the lock. Maximum of 512 characters.)')] [string] $notes, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:ManagementLockAtResourceGroupLevel") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["level"] = $level $resource.properties["resourceGroupName"] = $resourceGroupName if($PSBoundParameters.Keys -icontains 'owners') { $resource.properties["owners"] = $owners } if($PSBoundParameters.Keys -icontains 'lockName') { $resource.properties["lockName"] = $lockName } if($PSBoundParameters.Keys -icontains 'notes') { $resource.properties["notes"] = $notes } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationResourceManagementPrivateLink { [Alias('azure_native_authorization_resourcemanagementprivatelink')] param ( [parameter(mandatory=$False,HelpMessage='the region to create private link association.)')] [string] $location, [parameter(mandatory=$False,HelpMessage='The name of the resource management private link.)')] [string] $rmplName, [parameter(mandatory=$False,HelpMessage='The name of the resource group. The name is case insensitive.)')] [string] $resourceGroupName, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:ResourceManagementPrivateLink") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["resourceGroupName"] = $resourceGroupName if($PSBoundParameters.Keys -icontains 'location') { $resource.properties["location"] = $location } if($PSBoundParameters.Keys -icontains 'rmplName') { $resource.properties["rmplName"] = $rmplName } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationPolicyExemption { [Alias('azure_native_authorization_policyexemption')] param ( [parameter(mandatory=$False,HelpMessage='The name of the policy exemption to delete.)')] [string] $policyExemptionName, [parameter(mandatory=$False,HelpMessage='The policy exemption metadata. Metadata is an open ended object and is typically a collection of key value pairs.)')] $metadata, [parameter(mandatory=$False,HelpMessage='The policy definition reference ID list when the associated policy assignment is an assignment of a policy set definition.)')] [string[]] $policyDefinitionReferenceIds, [parameter(mandatory=$False,HelpMessage='The scope of the policy exemption. Valid scopes are: management group (format: ''/providers/Microsoft.Management/managementGroups/{managementGroup}''), subscription (format: ''/subscriptions/{subscriptionId}''), resource group (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}'', or resource (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/[{parentResourcePath}/]{resourceType}/{resourceName}'')')] [string] $scope, [parameter(mandatory=$False,HelpMessage='The policy exemption category. Possible values are Waiver and Mitigated.)')] [string] [ValidateSet('Waiver', 'Mitigated')] $exemptionCategory, [parameter(mandatory=$False,HelpMessage='The ID of the policy assignment that is being exempted.)')] [string] $policyAssignmentId, [parameter(mandatory=$False,HelpMessage='The display name of the policy exemption.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The expiration date and time (in UTC ISO 8601 format yyyy-MM-ddTHH:mm:ssZ) of the policy exemption.)')] [string] $expiresOn, [parameter(mandatory=$False,HelpMessage='The description of the policy exemption.)')] [string] $description, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:PolicyExemption") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["exemptionCategory"] = $exemptionCategory $resource.properties["policyAssignmentId"] = $policyAssignmentId $resource.properties["scope"] = $scope if($PSBoundParameters.Keys -icontains 'policyExemptionName') { $resource.properties["policyExemptionName"] = $policyExemptionName } if($PSBoundParameters.Keys -icontains 'metadata') { $resource.properties["metadata"] = $metadata } if($PSBoundParameters.Keys -icontains 'policyDefinitionReferenceIds') { $resource.properties["policyDefinitionReferenceIds"] = $policyDefinitionReferenceIds } if($PSBoundParameters.Keys -icontains 'displayName') { $resource.properties["displayName"] = $displayName } if($PSBoundParameters.Keys -icontains 'expiresOn') { $resource.properties["expiresOn"] = $expiresOn } if($PSBoundParameters.Keys -icontains 'description') { $resource.properties["description"] = $description } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationAccessReviewScheduleDefinitionById { [Alias('azure_native_authorization_accessreviewscheduledefinitionbyid')] param ( [parameter(mandatory=$False,HelpMessage='The DateTime when the review is scheduled to be start. This could be a date in the future. Required on create.)')] [string] $startDate, [parameter(mandatory=$False,HelpMessage='This is the collection of reviewers.)')] $reviewers, [parameter(mandatory=$False,HelpMessage='The interval for recurrence. For a quarterly review, the interval is 3 for type : absoluteMonthly.)')] [int] $interval, [parameter(mandatory=$False,HelpMessage='The display name for the schedule definition.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The id of the access review schedule definition.)')] [string] $scheduleDefinitionId, [parameter(mandatory=$False,HelpMessage='Duration users are inactive for. The value should be in ISO 8601 format (http://en.wikipedia.org/wiki/ISO_8601#Durations).This code can be used to convert TimeSpan to a valid interval string: XmlConvert.ToString(new TimeSpan(hours, minutes, seconds)))')] [string] $inactiveDuration, [parameter(mandatory=$False,HelpMessage='The duration in days for an instance.)')] [int] $instanceDurationInDays, [parameter(mandatory=$False,HelpMessage='The recurrence range type. The possible values are: endDate, noEnd, numbered.)')] [string] [ValidateSet('endDate', 'noEnd', 'numbered')] $type, [parameter(mandatory=$False,HelpMessage='This specifies the behavior for the autoReview feature when an access review completes.)')] [string] [ValidateSet('Approve', 'Deny', 'Recommendation')] $defaultDecision, [parameter(mandatory=$False,HelpMessage='The number of times to repeat the access review. Required and must be positive if type is numbered.)')] [int] $numberOfOccurrences, [parameter(mandatory=$False,HelpMessage='The description provided by the access review creator and visible to admins.)')] [string] $descriptionForAdmins, [parameter(mandatory=$False,HelpMessage='This is the collection of instances returned when one does an expand on it.)')] $instances, [parameter(mandatory=$False,HelpMessage='Flag to indicate whether reviewers are required to provide a justification when reviewing access.)')] [bool] $defaultDecisionEnabled, [parameter(mandatory=$False,HelpMessage='Flag to indicate whether sending reminder emails to reviewers are enabled.)')] [bool] $reminderNotificationsEnabled, [parameter(mandatory=$False,HelpMessage='This is the collection of backup reviewers.)')] $backupReviewers, [parameter(mandatory=$False,HelpMessage='The DateTime when the review is scheduled to end. Required if type is endDate)')] [string] $endDate, [parameter(mandatory=$False,HelpMessage='The description provided by the access review creator to be shown to reviewers.)')] [string] $descriptionForReviewers, [parameter(mandatory=$False,HelpMessage='Flag to indicate whether showing recommendations to reviewers is enabled.)')] [bool] $recommendationsEnabled, [parameter(mandatory=$False,HelpMessage='Flag to indicate whether the reviewer is required to pass justification when recording a decision.)')] [bool] $justificationRequiredOnApproval, [parameter(mandatory=$False,HelpMessage='Flag to indicate whether sending mails to reviewers and the review creator is enabled.)')] [bool] $mailNotificationsEnabled, [parameter(mandatory=$False,HelpMessage='Flag to indicate whether auto-apply capability, to automatically change the target object access resource, is enabled. If not enabled, a user must, after the review completes, apply the access review.)')] [bool] $autoApplyDecisionsEnabled, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:AccessReviewScheduleDefinitionById") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } if($PSBoundParameters.Keys -icontains 'startDate') { $resource.properties["startDate"] = $startDate } if($PSBoundParameters.Keys -icontains 'reviewers') { $resource.properties["reviewers"] = $reviewers } if($PSBoundParameters.Keys -icontains 'interval') { $resource.properties["interval"] = $interval } if($PSBoundParameters.Keys -icontains 'displayName') { $resource.properties["displayName"] = $displayName } if($PSBoundParameters.Keys -icontains 'scheduleDefinitionId') { $resource.properties["scheduleDefinitionId"] = $scheduleDefinitionId } if($PSBoundParameters.Keys -icontains 'inactiveDuration') { $resource.properties["inactiveDuration"] = $inactiveDuration } if($PSBoundParameters.Keys -icontains 'instanceDurationInDays') { $resource.properties["instanceDurationInDays"] = $instanceDurationInDays } if($PSBoundParameters.Keys -icontains 'type') { $resource.properties["type"] = $type } if($PSBoundParameters.Keys -icontains 'defaultDecision') { $resource.properties["defaultDecision"] = $defaultDecision } if($PSBoundParameters.Keys -icontains 'numberOfOccurrences') { $resource.properties["numberOfOccurrences"] = $numberOfOccurrences } if($PSBoundParameters.Keys -icontains 'descriptionForAdmins') { $resource.properties["descriptionForAdmins"] = $descriptionForAdmins } if($PSBoundParameters.Keys -icontains 'instances') { $resource.properties["instances"] = $instances } if($PSBoundParameters.Keys -icontains 'defaultDecisionEnabled') { $resource.properties["defaultDecisionEnabled"] = $defaultDecisionEnabled } if($PSBoundParameters.Keys -icontains 'reminderNotificationsEnabled') { $resource.properties["reminderNotificationsEnabled"] = $reminderNotificationsEnabled } if($PSBoundParameters.Keys -icontains 'backupReviewers') { $resource.properties["backupReviewers"] = $backupReviewers } if($PSBoundParameters.Keys -icontains 'endDate') { $resource.properties["endDate"] = $endDate } if($PSBoundParameters.Keys -icontains 'descriptionForReviewers') { $resource.properties["descriptionForReviewers"] = $descriptionForReviewers } if($PSBoundParameters.Keys -icontains 'recommendationsEnabled') { $resource.properties["recommendationsEnabled"] = $recommendationsEnabled } if($PSBoundParameters.Keys -icontains 'justificationRequiredOnApproval') { $resource.properties["justificationRequiredOnApproval"] = $justificationRequiredOnApproval } if($PSBoundParameters.Keys -icontains 'mailNotificationsEnabled') { $resource.properties["mailNotificationsEnabled"] = $mailNotificationsEnabled } if($PSBoundParameters.Keys -icontains 'autoApplyDecisionsEnabled') { $resource.properties["autoApplyDecisionsEnabled"] = $autoApplyDecisionsEnabled } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationAccessReviewHistoryDefinitionById { [Alias('azure_native_authorization_accessreviewhistorydefinitionbyid')] param ( [parameter(mandatory=$False,HelpMessage='A collection of scopes used when selecting review history data)')] $scopes, [parameter(mandatory=$False,HelpMessage='The number of times to repeat the access review. Required and must be positive if type is numbered.)')] [int] $numberOfOccurrences, [parameter(mandatory=$False,HelpMessage='The DateTime when the review is scheduled to be start. This could be a date in the future. Required on create.)')] [string] $startDate, [parameter(mandatory=$False,HelpMessage='The interval for recurrence. For a quarterly review, the interval is 3 for type : absoluteMonthly.)')] [int] $interval, [parameter(mandatory=$False,HelpMessage='Set of access review history instances for this history definition.)')] $instances, [parameter(mandatory=$False,HelpMessage='Collection of review decisions which the history data should be filtered on. For example if Approve and Deny are supplied the data will only contain review results in which the decision maker approved or denied a review request.)')] $decisions, [parameter(mandatory=$False,HelpMessage='The display name for the history definition.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The DateTime when the review is scheduled to end. Required if type is endDate)')] [string] $endDate, [parameter(mandatory=$False,HelpMessage='The id of the access review history definition.)')] [string] $historyDefinitionId, [parameter(mandatory=$False,HelpMessage='The recurrence range type. The possible values are: endDate, noEnd, numbered.)')] [string] [ValidateSet('endDate', 'noEnd', 'numbered')] $type, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:AccessReviewHistoryDefinitionById") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } if($PSBoundParameters.Keys -icontains 'scopes') { $resource.properties["scopes"] = $scopes } if($PSBoundParameters.Keys -icontains 'numberOfOccurrences') { $resource.properties["numberOfOccurrences"] = $numberOfOccurrences } if($PSBoundParameters.Keys -icontains 'startDate') { $resource.properties["startDate"] = $startDate } if($PSBoundParameters.Keys -icontains 'interval') { $resource.properties["interval"] = $interval } if($PSBoundParameters.Keys -icontains 'instances') { $resource.properties["instances"] = $instances } if($PSBoundParameters.Keys -icontains 'decisions') { $resource.properties["decisions"] = $decisions } if($PSBoundParameters.Keys -icontains 'displayName') { $resource.properties["displayName"] = $displayName } if($PSBoundParameters.Keys -icontains 'endDate') { $resource.properties["endDate"] = $endDate } if($PSBoundParameters.Keys -icontains 'historyDefinitionId') { $resource.properties["historyDefinitionId"] = $historyDefinitionId } if($PSBoundParameters.Keys -icontains 'type') { $resource.properties["type"] = $type } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationRoleAssignment { [Alias('azure_native_authorization_roleassignment')] param ( [parameter(mandatory=$False,HelpMessage='The principal type of the assigned principal ID.)')] [string] [ValidateSet('User', 'Group', 'ServicePrincipal', 'ForeignGroup', 'Device')] $principalType, [parameter(mandatory=$False,HelpMessage='The name of the role assignment. It can be any valid GUID.)')] [string] $roleAssignmentName, [parameter(mandatory=$False,HelpMessage='The scope of the operation or resource. Valid scopes are: subscription (format: ''/subscriptions/{subscriptionId}''), resource group (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}'', or resource (format: ''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/[{parentResourcePath}/]{resourceType}/{resourceName}'')')] [string] $scope, [parameter(mandatory=$False,HelpMessage='Id of the delegated managed identity resource)')] [string] $delegatedManagedIdentityResourceId, [parameter(mandatory=$False,HelpMessage='Version of the condition. Currently accepted value is ''2.0'')')] [string] $conditionVersion, [parameter(mandatory=$False,HelpMessage='The conditions on the role assignment. This limits the resources it can be assigned to. e.g.: @Resource[Microsoft.Storage/storageAccounts/blobServices/containers:ContainerName] StringEqualsIgnoreCase ''foo_storage_container'')')] [string] $condition, [parameter(mandatory=$False,HelpMessage='The principal ID.)')] [string] $principalId, [parameter(mandatory=$False,HelpMessage='The role definition ID.)')] [string] $roleDefinitionId, [parameter(mandatory=$False,HelpMessage='Description of role assignment)')] [string] $description, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:RoleAssignment") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["principalId"] = $principalId $resource.properties["roleDefinitionId"] = $roleDefinitionId $resource.properties["scope"] = $scope if($PSBoundParameters.Keys -icontains 'principalType') { $resource.properties["principalType"] = $principalType } if($PSBoundParameters.Keys -icontains 'roleAssignmentName') { $resource.properties["roleAssignmentName"] = $roleAssignmentName } if($PSBoundParameters.Keys -icontains 'delegatedManagedIdentityResourceId') { $resource.properties["delegatedManagedIdentityResourceId"] = $delegatedManagedIdentityResourceId } if($PSBoundParameters.Keys -icontains 'conditionVersion') { $resource.properties["conditionVersion"] = $conditionVersion } if($PSBoundParameters.Keys -icontains 'condition') { $resource.properties["condition"] = $condition } if($PSBoundParameters.Keys -icontains 'description') { $resource.properties["description"] = $description } $global:pulumiresources += $resource return $resource } } function New-AzureNativeAuthorizationPolicyDefinition { [Alias('azure_native_authorization_policydefinition')] param ( [parameter(mandatory=$False,HelpMessage='The display name of the policy definition.)')] [string] $displayName, [parameter(mandatory=$False,HelpMessage='The policy definition description.)')] [string] $description, [parameter(mandatory=$False,HelpMessage='The policy definition mode. Some examples are All, Indexed, Microsoft.KeyVault.Data.)')] [string] $mode, [parameter(mandatory=$False,HelpMessage='The name of the policy definition to create.)')] [string] $policyDefinitionName, [parameter(mandatory=$False,HelpMessage='The parameter definitions for parameters used in the policy rule. The keys are the parameter names.)')] [ParameterDefinitionsValue] $parameters, [parameter(mandatory=$False,HelpMessage='The type of policy definition. Possible values are NotSpecified, BuiltIn, Custom, and Static.)')] [string] [ValidateSet('NotSpecified', 'BuiltIn', 'Custom', 'Static')] $policyType, [parameter(mandatory=$False,HelpMessage='The policy rule.)')] $policyRule, [parameter(mandatory=$False,HelpMessage='The policy definition metadata. Metadata is an open ended object and is typically a collection of key value pairs.)')] $metadata, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:PolicyDefinition") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } if($PSBoundParameters.Keys -icontains 'displayName') { $resource.properties["displayName"] = $displayName } if($PSBoundParameters.Keys -icontains 'description') { $resource.properties["description"] = $description } if($PSBoundParameters.Keys -icontains 'mode') { $resource.properties["mode"] = $mode } if($PSBoundParameters.Keys -icontains 'policyDefinitionName') { $resource.properties["policyDefinitionName"] = $policyDefinitionName } if($PSBoundParameters.Keys -icontains 'parameters') { $resource.properties["parameters"] = $parameters } if($PSBoundParameters.Keys -icontains 'policyType') { $resource.properties["policyType"] = $policyType } if($PSBoundParameters.Keys -icontains 'policyRule') { $resource.properties["policyRule"] = $policyRule } if($PSBoundParameters.Keys -icontains 'metadata') { $resource.properties["metadata"] = $metadata } $global:pulumiresources += $resource return $resource } } class PrivateLinkAssociationProperties { [string] $privateLink [ArgumentCompletions('Enabled', 'Disabled')] [string] $publicNetworkAccess } function New-AzureNativeTypeAuthorizationPrivateLinkAssociationProperties { param ( [parameter(mandatory=$False,HelpMessage='The rmpl Resource ID.)')] [string] $privateLink, [parameter(mandatory=$False,HelpMessage=')')] [string] [ValidateSet('Enabled', 'Disabled')] $publicNetworkAccess ) process { return $([PrivateLinkAssociationProperties]$PSBoundParameters) } } function New-AzureNativeAuthorizationPrivateLinkAssociation { [Alias('azure_native_authorization_privatelinkassociation')] param ( [parameter(mandatory=$False,HelpMessage='The management group ID.)')] [string] $groupId, [parameter(mandatory=$False,HelpMessage='The properties of the PrivateLinkAssociation.)')] [PrivateLinkAssociationProperties] $properties, [parameter(mandatory=$False,HelpMessage='The ID of the PLA)')] [string] $plaId, [parameter(mandatory,HelpMessage='The reference to call when you want to make a dependency to another resource')] [string] $pulumiid, [parameter(mandatory,HelpMessage='Pass in the resources you make to make this resource dependant on')] [object] $DependsOn ) process { $resource = [pulumiresource]::new($pulumiid, "azure-native:authorization:PrivateLinkAssociation") foreach($Dependency in $DependsOn) { if($Dependency -is [pulumiresource]) { $resource.dependson += $Dependency.Reference() } else { $resource.dependson += $Dependency } } $resource.properties["groupId"] = $groupId if($PSBoundParameters.Keys -icontains 'properties') { $resource.properties["properties"] = $properties } if($PSBoundParameters.Keys -icontains 'plaId') { $resource.properties["plaId"] = $plaId } $global:pulumiresources += $resource return $resource } } |