Skip to content

Commit c4d65cd

Browse files
update bicep to adhere to latest waf standards
1 parent 50ce231 commit c4d65cd

11 files changed

Lines changed: 13861 additions & 5691 deletions

infra/main.bicep

Lines changed: 329 additions & 53 deletions
Large diffs are not rendered by default.

infra/main.json

Lines changed: 13500 additions & 5615 deletions
Large diffs are not rendered by default.

infra/modules/ai-foundry/ai-services.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ var formattedRoleAssignments = [
260260
})
261261
]
262262

263-
resource cognitiveService 'Microsoft.CognitiveServices/accounts@2025-04-01-preview' = {
263+
resource cognitiveService 'Microsoft.CognitiveServices/accounts@2025-07-01-preview' = {
264264
name: name
265265
kind: kind
266266
identity: identity
@@ -355,7 +355,7 @@ resource cognitiveService_diagnosticSettings 'Microsoft.Insights/diagnosticSetti
355355
}
356356
]
357357

358-
module cognitiveService_privateEndpoints 'br/public:avm/res/network/private-endpoint:0.11.0' = [
358+
module cognitiveService_privateEndpoints 'br/public:avm/res/network/private-endpoint:0.11.1' = [
359359
for (privateEndpoint, index) in (privateEndpoints ?? []): {
360360
name: take('${uniqueString(deployment().name, location)}-cognitiveService-PrivateEndpoint-${index}', 64)
361361
scope: resourceGroup(

infra/modules/ai-foundry/aifoundry.bicep

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ var identity = !empty(managedIdentities)
156156
userAssignedIdentities: !empty(formattedUserAssignedIdentities) ? formattedUserAssignedIdentities : null
157157
}
158158
: null
159-
159+
160160
#disable-next-line no-deployments-resources
161161
resource avmTelemetry 'Microsoft.Resources/deployments@2024-03-01' = if (enableTelemetry) {
162162
name: '46d3xbcp.res.cognitiveservices-account.${replace('-..--..-', '.', '-')}.${substring(uniqueString(deployment().name, location), 0, 4)}'
@@ -176,14 +176,14 @@ resource avmTelemetry 'Microsoft.Resources/deployments@2024-03-01' = if (enableT
176176
}
177177
}
178178

179-
resource cMKKeyVault 'Microsoft.KeyVault/vaults@2023-07-01' existing = if (!empty(customerManagedKey.?keyVaultResourceId)) {
179+
resource cMKKeyVault 'Microsoft.KeyVault/vaults@2025-05-01' existing = if (!empty(customerManagedKey.?keyVaultResourceId)) {
180180
name: last(split(customerManagedKey.?keyVaultResourceId!, '/'))
181181
scope: resourceGroup(
182182
split(customerManagedKey.?keyVaultResourceId!, '/')[2],
183183
split(customerManagedKey.?keyVaultResourceId!, '/')[4]
184184
)
185185

186-
resource cMKKey 'keys@2023-07-01' existing = if (!empty(customerManagedKey.?keyVaultResourceId) && !empty(customerManagedKey.?keyName)) {
186+
resource cMKKey 'keys@2025-05-01' existing = if (!empty(customerManagedKey.?keyVaultResourceId) && !empty(customerManagedKey.?keyName)) {
187187
name: customerManagedKey.?keyName!
188188
}
189189
}
@@ -208,7 +208,7 @@ var aiServicesPrivateDnsZoneResourceId = privateNetworking != null
208208
? privateNetworking.?aiServicesPrivateDnsZoneResourceId ?? ''
209209
: ''
210210

211-
resource cognitiveServiceNew 'Microsoft.CognitiveServices/accounts@2025-04-01-preview' = if(!useExistingService) {
211+
resource cognitiveServiceNew 'Microsoft.CognitiveServices/accounts@2025-07-01-preview' = if(!useExistingService) {
212212
name: name
213213
kind: kind
214214
identity: identity

infra/modules/ai-foundry/dependencies.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,7 @@ var formattedRoleAssignments = [
187187

188188
var enableReferencedModulesTelemetry = false
189189

190-
resource cognitiveService 'Microsoft.CognitiveServices/accounts@2025-04-01-preview' existing = {
190+
resource cognitiveService 'Microsoft.CognitiveServices/accounts@2025-07-01-preview' existing = {
191191
name: name
192192
}
193193

@@ -251,7 +251,7 @@ resource cognitiveService_diagnosticSettings 'Microsoft.Insights/diagnosticSetti
251251
}
252252
]
253253

254-
module cognitiveService_privateEndpoints 'br/public:avm/res/network/private-endpoint:0.11.0' = [
254+
module cognitiveService_privateEndpoints 'br/public:avm/res/network/private-endpoint:0.11.1' = [
255255
for (privateEndpoint, index) in (privateEndpoints ?? []): {
256256
name: '${uniqueString(deployment().name, location)}-cognitiveService-PrivateEndpoint-${index}'
257257
scope: resourceGroup(

infra/modules/ai-foundry/keyVaultExport.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,11 @@ param secretsToSet secretToSetType[]
1313
// Resources //
1414
// ============= //
1515

16-
resource keyVault 'Microsoft.KeyVault/vaults@2023-07-01' existing = {
16+
resource keyVault 'Microsoft.KeyVault/vaults@2025-05-01' existing = {
1717
name: keyVaultName
1818
}
1919

20-
resource secrets 'Microsoft.KeyVault/vaults/secrets@2023-07-01' = [
20+
resource secrets 'Microsoft.KeyVault/vaults/secrets@2025-05-01' = [
2121
for secret in secretsToSet: {
2222
name: secret.name
2323
parent: keyVault

infra/modules/ai-foundry/project.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ resource cogServiceReference 'Microsoft.CognitiveServices/accounts@2024-10-01' e
2727
}
2828

2929
// Create new AI project only if not reusing existing one
30-
resource aiProject 'Microsoft.CognitiveServices/accounts/projects@2025-04-01-preview' = if(!useExistingProject) {
30+
resource aiProject 'Microsoft.CognitiveServices/accounts/projects@2025-07-01-preview' = if(!useExistingProject) {
3131
parent: cogServiceReference
3232
name: name
3333
tags: tags

infra/modules/cosmosDb.bicep

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ var batchContainerName = 'cmsabatch'
4343
var fileContainerName = 'cmsafile'
4444
var logContainerName = 'cmsalog'
4545

46-
module cosmosAccount 'br/public:avm/res/document-db/database-account:0.15.0' = {
46+
module cosmosAccount 'br/public:avm/res/document-db/database-account:0.18.0' = {
4747
name: take('avm.res.document-db.database-account.${name}', 64)
4848
params: {
4949
name: name
@@ -58,7 +58,6 @@ module cosmosAccount 'br/public:avm/res/document-db/database-account:0.15.0' = {
5858
virtualNetworkRules: []
5959
}
6060
zoneRedundant: zoneRedundant
61-
automaticFailover: !empty(secondaryLocation)
6261
failoverLocations: !empty(secondaryLocation)
6362
? [
6463
{
@@ -132,7 +131,7 @@ module cosmosAccount 'br/public:avm/res/document-db/database-account:0.15.0' = {
132131
name: databaseName
133132
}
134133
]
135-
dataPlaneRoleAssignments: [
134+
sqlRoleAssignments: [
136135
{
137136
principalId: dataAccessIdentityPrincipalId
138137
roleDefinitionId: sqlContributorRoleDefinition.id

infra/modules/keyVault.bicep

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ import { roleAssignmentType } from 'br/public:avm/utl/types/avm-common-types:0.5
2525
@description('Optional. Array of role assignments to create.')
2626
param roleAssignments roleAssignmentType[]?
2727

28-
import { secretType } from 'br/public:avm/res/key-vault/vault:0.12.1'
28+
import { secretType } from 'br/public:avm/res/key-vault/vault:0.13.3'
2929
@description('Optional. Array of secrets to create in the Key Vault.')
3030
param secrets secretType[]?
3131

@@ -36,7 +36,7 @@ var privateDnsZoneResourceId = privateNetworking != null
3636
? privateNetworking.?privateDnsZoneResourceId ?? ''
3737
: ''
3838

39-
module keyvault 'br/public:avm/res/key-vault/vault:0.12.1' = {
39+
module keyvault 'br/public:avm/res/key-vault/vault:0.13.3' = {
4040
name: take('avm.res.key-vault.vault.${name}', 64)
4141
params: {
4242
name: name

infra/modules/storageAccount.bicep

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ var filePrivateDnsZoneResourceId = privateNetworking != null
4343
? privateNetworking.?filePrivateDnsZoneResourceId ?? ''
4444
: ''
4545

46-
module storageAccount 'br/public:avm/res/storage/storage-account:0.20.0' = {
46+
module storageAccount 'br/public:avm/res/storage/storage-account:0.28.0' = {
4747
name: take('avm.res.storage.storage-account.${name}', 64)
4848
#disable-next-line no-unnecessary-dependson
4949
params: {
@@ -108,6 +108,10 @@ module storageAccount 'br/public:avm/res/storage/storage-account:0.20.0' = {
108108
roleAssignments: roleAssignments
109109
blobServices: {
110110
containers: containers ?? []
111+
deleteRetentionPolicyEnabled: true
112+
deleteRetentionPolicyDays: 7
113+
containerDeleteRetentionPolicyEnabled: true
114+
containerDeleteRetentionPolicyDays: 7
111115
}
112116
enableTelemetry: enableTelemetry
113117
}

0 commit comments

Comments
 (0)