Skip to content

Commit 6f0c59c

Browse files
authored
Merge pull request #840 from Azure/issue-823
Updating all APIs
2 parents 7334732 + 6ef40fc commit 6f0c59c

File tree

101 files changed

+5786
-1039
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

101 files changed

+5786
-1039
lines changed

avm/1.0.0/ptn/authorization/policy-assignment/modules/resource-group.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ var identityVar = identity == 'SystemAssigned' ? {
7676
}
7777
} : null
7878

79-
resource policyAssignment 'Microsoft.Authorization/policyAssignments@2022-06-01' = {
79+
resource policyAssignment 'Microsoft.Authorization/policyAssignments@2025-03-01' = {
8080
name: name
8181
location: location
8282
properties: {

avm/1.0.0/ptn/policy-insights/remediation/modules/resource-group.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ param location string = resourceGroup().location
4747
// Resources //
4848
// ================ //
4949

50-
resource remediation 'Microsoft.PolicyInsights/remediations@2021-10-01' = {
50+
resource remediation 'Microsoft.PolicyInsights/remediations@2024-10-01' = {
5151
name: name
5252
properties: {
5353
failureThreshold: {

avm/1.0.0/res/automation/automation-account/credential/main.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ param automationAccountName string
88
@description('Required. The credential definition.')
99
param credentials credentialType
1010

11-
resource automationAccount 'Microsoft.Automation/automationAccounts@2022-08-08' existing = {
11+
resource automationAccount 'Microsoft.Automation/automationAccounts@2024-10-23' existing = {
1212
name: automationAccountName
1313
}
1414

15-
resource automationAccount_credential 'Microsoft.Automation/automationAccounts/credentials@2023-11-01' = [
15+
resource automationAccount_credential 'Microsoft.Automation/automationAccounts/credentials@2024-10-23' = [
1616
for credential in credentials: {
1717
name: credential.name
1818
parent: automationAccount

avm/1.0.0/res/automation/automation-account/main.bicep

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ var builtInRoleNames = {
123123
)
124124
}
125125

126-
resource avmTelemetry 'Microsoft.Resources/deployments@2023-07-01' = if (enableTelemetry) {
126+
resource avmTelemetry 'Microsoft.Resources/deployments@2025-04-01' = if (enableTelemetry) {
127127
name: '46d3xbcp.res.automation-automationaccount.${replace('-..--..-', '.', '-')}.${substring(uniqueString(deployment().name, location), 0, 4)}'
128128
properties: {
129129
mode: 'Incremental'
@@ -141,27 +141,27 @@ resource avmTelemetry 'Microsoft.Resources/deployments@2023-07-01' = if (enableT
141141
}
142142
}
143143

144-
resource cMKKeyVault 'Microsoft.KeyVault/vaults@2023-02-01' existing = if (!empty(customerManagedKey.?keyVaultResourceId)) {
144+
resource cMKKeyVault 'Microsoft.KeyVault/vaults@2024-12-01-preview' existing = if (!empty(customerManagedKey.?keyVaultResourceId)) {
145145
name: last(split((customerManagedKey.?keyVaultResourceId ?? 'dummyVault'), '/'))
146146
scope: resourceGroup(
147147
split((customerManagedKey.?keyVaultResourceId ?? '//'), '/')[2],
148148
split((customerManagedKey.?keyVaultResourceId ?? '////'), '/')[4]
149149
)
150150

151-
resource cMKKey 'keys@2023-02-01' existing = if (!empty(customerManagedKey.?keyVaultResourceId) && !empty(customerManagedKey.?keyName)) {
151+
resource cMKKey 'keys@2024-12-01-preview' existing = if (!empty(customerManagedKey.?keyVaultResourceId) && !empty(customerManagedKey.?keyName)) {
152152
name: customerManagedKey.?keyName ?? 'dummyKey'
153153
}
154154
}
155155

156-
resource cMKUserAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' existing = if (!empty(customerManagedKey.?userAssignedIdentityResourceId)) {
156+
resource cMKUserAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2025-01-31-preview' existing = if (!empty(customerManagedKey.?userAssignedIdentityResourceId)) {
157157
name: last(split(customerManagedKey.?userAssignedIdentityResourceId ?? 'dummyMsi', '/'))
158158
scope: resourceGroup(
159159
split((customerManagedKey.?userAssignedIdentityResourceId ?? '//'), '/')[2],
160160
split((customerManagedKey.?userAssignedIdentityResourceId ?? '////'), '/')[4]
161161
)
162162
}
163163

164-
resource automationAccount 'Microsoft.Automation/automationAccounts@2022-08-08' = {
164+
resource automationAccount 'Microsoft.Automation/automationAccounts@2024-10-23' = {
165165
name: name
166166
location: location
167167
tags: tags

avm/1.0.0/res/automation/automation-account/module/main.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ param location string = resourceGroup().location
2020
@description('Optional. Tags of the Automation Account resource.')
2121
param tags object?
2222

23-
resource automationAccount 'Microsoft.Automation/automationAccounts@2022-08-08' existing = {
23+
resource automationAccount 'Microsoft.Automation/automationAccounts@2024-10-23' existing = {
2424
name: automationAccountName
2525
}
2626

27-
resource module 'Microsoft.Automation/automationAccounts/modules@2022-08-08' = {
27+
resource module 'Microsoft.Automation/automationAccounts/modules@2024-10-23' = {
2828
name: name
2929
parent: automationAccount
3030
location: location

avm/1.0.0/res/automation/automation-account/schedule/main.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ param timeZone string = ''
4545
@sys.description('Generated. Time used as a basis for e.g. the schedule start date.')
4646
param baseTime string = utcNow('u')
4747

48-
resource automationAccount 'Microsoft.Automation/automationAccounts@2022-08-08' existing = {
48+
resource automationAccount 'Microsoft.Automation/automationAccounts@2024-10-23' existing = {
4949
name: automationAccountName
5050
}
5151

52-
resource schedule 'Microsoft.Automation/automationAccounts/schedules@2022-08-08' = {
52+
resource schedule 'Microsoft.Automation/automationAccounts/schedules@2024-10-23' = {
5353
name: name
5454
parent: automationAccount
5555
properties: {

avm/1.0.0/res/compute/disk-encryption-set/main.bicep

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ var builtInRoleNames = {
9696
)
9797
}
9898

99-
resource avmTelemetry 'Microsoft.Resources/deployments@2023-07-01' =
99+
resource avmTelemetry 'Microsoft.Resources/deployments@2025-04-01' =
100100
if (enableTelemetry) {
101101
name: '46d3xbcp.res.compute-diskencryptionset.${replace('-..--..-', '.', '-')}.${substring(uniqueString(deployment().name, location), 0, 4)}'
102102
properties: {
@@ -115,11 +115,11 @@ resource avmTelemetry 'Microsoft.Resources/deployments@2023-07-01' =
115115
}
116116
}
117117

118-
resource keyVault 'Microsoft.KeyVault/vaults@2021-10-01' existing = {
118+
resource keyVault 'Microsoft.KeyVault/vaults@2024-12-01-preview' existing = {
119119
name: last(split(keyVaultResourceId, '/'))!
120120
scope: resourceGroup(split(keyVaultResourceId, '/')[2], split(keyVaultResourceId, '/')[4])
121121

122-
resource key 'keys@2021-10-01' existing = {
122+
resource key 'keys@2024-12-01-preview' existing = {
123123
name: keyName
124124
}
125125
}
@@ -139,7 +139,7 @@ module keyVaultPermissions 'modules/nested_keyVaultPermissions.bicep' = [
139139
}
140140
]
141141

142-
resource diskEncryptionSet 'Microsoft.Compute/diskEncryptionSets@2023-10-02' = {
142+
resource diskEncryptionSet 'Microsoft.Compute/diskEncryptionSets@2025-01-02' = {
143143
name: name
144144
location: location
145145
tags: tags

avm/1.0.0/res/compute/disk-encryption-set/modules/key-vault.vault.access-policy.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@ var formattedAccessPolicies = [for accessPolicy in (accessPolicies ?? []): {
1515
tenantId: accessPolicy.?tenantId ?? tenant().tenantId
1616
}]
1717

18-
resource keyVault 'Microsoft.KeyVault/vaults@2022-07-01' existing = {
18+
resource keyVault 'Microsoft.KeyVault/vaults@2024-12-01-preview' existing = {
1919
name: keyVaultName
2020
}
2121

22-
resource policies 'Microsoft.KeyVault/vaults/accessPolicies@2022-07-01' = {
22+
resource policies 'Microsoft.KeyVault/vaults/accessPolicies@2024-12-01-preview' = {
2323
name: 'add'
2424
parent: keyVault
2525
properties: {

avm/1.0.0/res/compute/disk-encryption-set/modules/nested_keyVaultPermissions.bicep

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,15 @@ param keyVaultResourceId string
1313
@description('Required. Name of the key to set the permissions for.')
1414
param keyName string
1515

16-
resource keyVault 'Microsoft.KeyVault/vaults@2021-10-01' existing = {
16+
resource keyVault 'Microsoft.KeyVault/vaults@2024-12-01-preview' existing = {
1717
name: last(split(keyVaultResourceId, '/'))!
1818

19-
resource key 'keys@2021-10-01' existing = {
19+
resource key 'keys@2024-12-01-preview' existing = {
2020
name: keyName
2121
}
2222
}
2323

24-
resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' existing = {
24+
resource userAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2025-01-31-preview' existing = {
2525
name: last(split(userAssignedIdentityResourceId, '/'))!
2626
scope: resourceGroup(split(userAssignedIdentityResourceId, '/')[2], split(userAssignedIdentityResourceId, '/')[4])
2727

avm/1.0.0/res/compute/virtual-machine/extension/main.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,11 @@ param enableAutomaticUpgrade bool
4242
@description('Optional. Tags of the resource.')
4343
param tags object?
4444

45-
resource virtualMachine 'Microsoft.Compute/virtualMachines@2022-11-01' existing = {
45+
resource virtualMachine 'Microsoft.Compute/virtualMachines@2024-11-01' existing = {
4646
name: virtualMachineName
4747
}
4848

49-
resource extension 'Microsoft.Compute/virtualMachines/extensions@2022-11-01' = {
49+
resource extension 'Microsoft.Compute/virtualMachines/extensions@2024-11-01' = {
5050
name: name
5151
parent: virtualMachine
5252
location: location

0 commit comments

Comments
 (0)