Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions schemas/2018-05-01/subscriptionDeploymentTemplate.json
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@
},
"resources": {
"description": "Collection of resources to be deployed",
"oneOf":[
"oneOf": [
{
"$ref": "#/definitions/resourcesWithoutSymbolicNames"
},
Expand Down Expand Up @@ -987,14 +987,14 @@
}
]
},
"resourcesWithSymbolicNames":{
"resourcesWithSymbolicNames": {
"type": "object",
"description": "Resources with symbolic names",
"additionalProperties": {
"$ref": "#/definitions/resource"
}
},
"resourcesWithoutSymbolicNames":{
"resourcesWithoutSymbolicNames": {
"type": "array",
"description": "Resources without symbolic names",
"items": {
Expand Down
6 changes: 3 additions & 3 deletions schemas/2019-08-01/managementGroupDeploymentTemplate.json
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@
},
"resources": {
"description": "Collection of resources to be deployed",
"oneOf":[
"oneOf": [
{
"$ref": "#/definitions/resourcesWithoutSymbolicNames"
},
Expand Down Expand Up @@ -678,14 +678,14 @@
}
]
},
"resourcesWithSymbolicNames":{
"resourcesWithSymbolicNames": {
"type": "object",
"description": "Resources with symbolic names",
"additionalProperties": {
"$ref": "#/definitions/resource"
}
},
"resourcesWithoutSymbolicNames":{
"resourcesWithoutSymbolicNames": {
"type": "array",
"description": "Resources without symbolic names",
"items": {
Expand Down
6 changes: 3 additions & 3 deletions schemas/2019-08-01/tenantDeploymentTemplate.json
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@
},
"resources": {
"description": "Collection of resources to be deployed",
"oneOf":[
"oneOf": [
{
"$ref": "#/definitions/resourcesWithoutSymbolicNames"
},
Expand Down Expand Up @@ -798,14 +798,14 @@
}
]
},
"resourcesWithSymbolicNames":{
"resourcesWithSymbolicNames": {
"type": "object",
"description": "Resources with symbolic names",
"additionalProperties": {
"$ref": "#/definitions/resource"
}
},
"resourcesWithoutSymbolicNames":{
"resourcesWithoutSymbolicNames": {
"type": "array",
"description": "Resources without symbolic names",
"items": {
Expand Down
2 changes: 1 addition & 1 deletion schemas/2019-09-01/Microsoft.KeyVault.json
Original file line number Diff line number Diff line change
Expand Up @@ -983,7 +983,7 @@
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC."
"description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC."
},
"enableSoftDelete": {
"oneOf": [
Expand Down
2 changes: 1 addition & 1 deletion schemas/2020-04-01-preview/Microsoft.KeyVault.json
Original file line number Diff line number Diff line change
Expand Up @@ -1180,7 +1180,7 @@
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC."
"description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC."
},
"enableSoftDelete": {
"oneOf": [
Expand Down
2 changes: 1 addition & 1 deletion schemas/2021-04-01-preview/Microsoft.KeyVault.json
Original file line number Diff line number Diff line change
Expand Up @@ -1743,7 +1743,7 @@
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC."
"description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC."
},
"enableSoftDelete": {
"oneOf": [
Expand Down