pulumi-azure-native 2.24.0__py3-none-any.whl → 2.24.1a1704477298__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-azure-native might be problematic. Click here for more details.
- pulumi_azure_native/__init__.py +1 -0
- pulumi_azure_native/keyvault/__init__.py +1 -0
- pulumi_azure_native/keyvault/_inputs.py +2 -0
- pulumi_azure_native/keyvault/access_policy.py +183 -0
- pulumi_azure_native/keyvault/outputs.py +140 -0
- pulumi_azure_native/keyvault/v20230201/_inputs.py +2 -0
- pulumi_azure_native/keyvault/v20230201/outputs.py +2 -0
- pulumi_azure_native/keyvault/v20230701/_inputs.py +2 -0
- pulumi_azure_native/keyvault/v20230701/outputs.py +2 -0
- {pulumi_azure_native-2.24.0.dist-info → pulumi_azure_native-2.24.1a1704477298.dist-info}/METADATA +7 -1
- {pulumi_azure_native-2.24.0.dist-info → pulumi_azure_native-2.24.1a1704477298.dist-info}/RECORD +13 -12
- {pulumi_azure_native-2.24.0.dist-info → pulumi_azure_native-2.24.1a1704477298.dist-info}/WHEEL +0 -0
- {pulumi_azure_native-2.24.0.dist-info → pulumi_azure_native-2.24.1a1704477298.dist-info}/top_level.txt +0 -0
pulumi_azure_native/__init__.py
CHANGED
|
@@ -7829,6 +7829,7 @@ _utilities.register(
|
|
|
7829
7829
|
"mod": "keyvault",
|
|
7830
7830
|
"fqn": "pulumi_azure_native.keyvault",
|
|
7831
7831
|
"classes": {
|
|
7832
|
+
"azure-native:keyvault:AccessPolicy": "AccessPolicy",
|
|
7832
7833
|
"azure-native:keyvault:Key": "Key",
|
|
7833
7834
|
"azure-native:keyvault:MHSMPrivateEndpointConnection": "MHSMPrivateEndpointConnection",
|
|
7834
7835
|
"azure-native:keyvault:ManagedHsm": "ManagedHsm",
|
|
@@ -1309,6 +1309,7 @@ class VaultPropertiesArgs:
|
|
|
1309
1309
|
:param pulumi.Input['SkuArgs'] sku: SKU details
|
|
1310
1310
|
:param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1311
1311
|
:param pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1312
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1312
1313
|
:param pulumi.Input['CreateMode'] create_mode: The vault's create mode to indicate whether the vault need to be recovered or not.
|
|
1313
1314
|
:param pulumi.Input[bool] enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
1314
1315
|
:param pulumi.Input[bool] enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
@@ -1388,6 +1389,7 @@ class VaultPropertiesArgs:
|
|
|
1388
1389
|
def access_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]]:
|
|
1389
1390
|
"""
|
|
1390
1391
|
An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1392
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1391
1393
|
"""
|
|
1392
1394
|
return pulumi.get(self, "access_policies")
|
|
1393
1395
|
|
|
@@ -0,0 +1,183 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import copy
|
|
6
|
+
import warnings
|
|
7
|
+
import pulumi
|
|
8
|
+
import pulumi.runtime
|
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
|
+
from .. import _utilities
|
|
11
|
+
from . import outputs
|
|
12
|
+
from ._enums import *
|
|
13
|
+
from ._inputs import *
|
|
14
|
+
|
|
15
|
+
__all__ = ['AccessPolicyArgs', 'AccessPolicy']
|
|
16
|
+
|
|
17
|
+
@pulumi.input_type
|
|
18
|
+
class AccessPolicyArgs:
|
|
19
|
+
def __init__(__self__, *,
|
|
20
|
+
policy: pulumi.Input['AccessPolicyEntryArgs'],
|
|
21
|
+
resource_group_name: pulumi.Input[str],
|
|
22
|
+
vault_name: pulumi.Input[str]):
|
|
23
|
+
"""
|
|
24
|
+
The set of arguments for constructing a AccessPolicy resource.
|
|
25
|
+
:param pulumi.Input['AccessPolicyEntryArgs'] policy: The definition of the access policy.
|
|
26
|
+
:param pulumi.Input[str] resource_group_name: Name of the resource group that contains the vault.
|
|
27
|
+
:param pulumi.Input[str] vault_name: Name of the Key Vault.
|
|
28
|
+
"""
|
|
29
|
+
pulumi.set(__self__, "policy", policy)
|
|
30
|
+
pulumi.set(__self__, "resource_group_name", resource_group_name)
|
|
31
|
+
pulumi.set(__self__, "vault_name", vault_name)
|
|
32
|
+
|
|
33
|
+
@property
|
|
34
|
+
@pulumi.getter
|
|
35
|
+
def policy(self) -> pulumi.Input['AccessPolicyEntryArgs']:
|
|
36
|
+
"""
|
|
37
|
+
The definition of the access policy.
|
|
38
|
+
"""
|
|
39
|
+
return pulumi.get(self, "policy")
|
|
40
|
+
|
|
41
|
+
@policy.setter
|
|
42
|
+
def policy(self, value: pulumi.Input['AccessPolicyEntryArgs']):
|
|
43
|
+
pulumi.set(self, "policy", value)
|
|
44
|
+
|
|
45
|
+
@property
|
|
46
|
+
@pulumi.getter(name="resourceGroupName")
|
|
47
|
+
def resource_group_name(self) -> pulumi.Input[str]:
|
|
48
|
+
"""
|
|
49
|
+
Name of the resource group that contains the vault.
|
|
50
|
+
"""
|
|
51
|
+
return pulumi.get(self, "resource_group_name")
|
|
52
|
+
|
|
53
|
+
@resource_group_name.setter
|
|
54
|
+
def resource_group_name(self, value: pulumi.Input[str]):
|
|
55
|
+
pulumi.set(self, "resource_group_name", value)
|
|
56
|
+
|
|
57
|
+
@property
|
|
58
|
+
@pulumi.getter(name="vaultName")
|
|
59
|
+
def vault_name(self) -> pulumi.Input[str]:
|
|
60
|
+
"""
|
|
61
|
+
Name of the Key Vault.
|
|
62
|
+
"""
|
|
63
|
+
return pulumi.get(self, "vault_name")
|
|
64
|
+
|
|
65
|
+
@vault_name.setter
|
|
66
|
+
def vault_name(self, value: pulumi.Input[str]):
|
|
67
|
+
pulumi.set(self, "vault_name", value)
|
|
68
|
+
|
|
69
|
+
|
|
70
|
+
class AccessPolicy(pulumi.CustomResource):
|
|
71
|
+
@overload
|
|
72
|
+
def __init__(__self__,
|
|
73
|
+
resource_name: str,
|
|
74
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
75
|
+
policy: Optional[pulumi.Input[pulumi.InputType['AccessPolicyEntryArgs']]] = None,
|
|
76
|
+
resource_group_name: Optional[pulumi.Input[str]] = None,
|
|
77
|
+
vault_name: Optional[pulumi.Input[str]] = None,
|
|
78
|
+
__props__=None):
|
|
79
|
+
"""
|
|
80
|
+
Key Vault Access Policy for managing policies on existing vaults.
|
|
81
|
+
|
|
82
|
+
:param str resource_name: The name of the resource.
|
|
83
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
84
|
+
:param pulumi.Input[pulumi.InputType['AccessPolicyEntryArgs']] policy: The definition of the access policy.
|
|
85
|
+
:param pulumi.Input[str] resource_group_name: Name of the resource group that contains the vault.
|
|
86
|
+
:param pulumi.Input[str] vault_name: Name of the Key Vault.
|
|
87
|
+
"""
|
|
88
|
+
...
|
|
89
|
+
@overload
|
|
90
|
+
def __init__(__self__,
|
|
91
|
+
resource_name: str,
|
|
92
|
+
args: AccessPolicyArgs,
|
|
93
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
94
|
+
"""
|
|
95
|
+
Key Vault Access Policy for managing policies on existing vaults.
|
|
96
|
+
|
|
97
|
+
:param str resource_name: The name of the resource.
|
|
98
|
+
:param AccessPolicyArgs args: The arguments to use to populate this resource's properties.
|
|
99
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
100
|
+
"""
|
|
101
|
+
...
|
|
102
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
103
|
+
resource_args, opts = _utilities.get_resource_args_opts(AccessPolicyArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
104
|
+
if resource_args is not None:
|
|
105
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
106
|
+
else:
|
|
107
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
108
|
+
|
|
109
|
+
def _internal_init(__self__,
|
|
110
|
+
resource_name: str,
|
|
111
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
112
|
+
policy: Optional[pulumi.Input[pulumi.InputType['AccessPolicyEntryArgs']]] = None,
|
|
113
|
+
resource_group_name: Optional[pulumi.Input[str]] = None,
|
|
114
|
+
vault_name: Optional[pulumi.Input[str]] = None,
|
|
115
|
+
__props__=None):
|
|
116
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
117
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
118
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
119
|
+
if opts.id is None:
|
|
120
|
+
if __props__ is not None:
|
|
121
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
122
|
+
__props__ = AccessPolicyArgs.__new__(AccessPolicyArgs)
|
|
123
|
+
|
|
124
|
+
if policy is None and not opts.urn:
|
|
125
|
+
raise TypeError("Missing required property 'policy'")
|
|
126
|
+
__props__.__dict__["policy"] = policy
|
|
127
|
+
if resource_group_name is None and not opts.urn:
|
|
128
|
+
raise TypeError("Missing required property 'resource_group_name'")
|
|
129
|
+
__props__.__dict__["resource_group_name"] = resource_group_name
|
|
130
|
+
if vault_name is None and not opts.urn:
|
|
131
|
+
raise TypeError("Missing required property 'vault_name'")
|
|
132
|
+
__props__.__dict__["vault_name"] = vault_name
|
|
133
|
+
super(AccessPolicy, __self__).__init__(
|
|
134
|
+
'azure-native:keyvault:AccessPolicy',
|
|
135
|
+
resource_name,
|
|
136
|
+
__props__,
|
|
137
|
+
opts)
|
|
138
|
+
|
|
139
|
+
@staticmethod
|
|
140
|
+
def get(resource_name: str,
|
|
141
|
+
id: pulumi.Input[str],
|
|
142
|
+
opts: Optional[pulumi.ResourceOptions] = None) -> 'AccessPolicy':
|
|
143
|
+
"""
|
|
144
|
+
Get an existing AccessPolicy resource's state with the given name, id, and optional extra
|
|
145
|
+
properties used to qualify the lookup.
|
|
146
|
+
|
|
147
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
148
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
149
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
150
|
+
"""
|
|
151
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
152
|
+
|
|
153
|
+
__props__ = AccessPolicyArgs.__new__(AccessPolicyArgs)
|
|
154
|
+
|
|
155
|
+
__props__.__dict__["policy"] = None
|
|
156
|
+
__props__.__dict__["resource_group_name"] = None
|
|
157
|
+
__props__.__dict__["vault_name"] = None
|
|
158
|
+
return AccessPolicy(resource_name, opts=opts, __props__=__props__)
|
|
159
|
+
|
|
160
|
+
@property
|
|
161
|
+
@pulumi.getter
|
|
162
|
+
def policy(self) -> pulumi.Output[Optional['outputs.AccessPolicyEntry']]:
|
|
163
|
+
"""
|
|
164
|
+
The definition of the access policy.
|
|
165
|
+
"""
|
|
166
|
+
return pulumi.get(self, "policy")
|
|
167
|
+
|
|
168
|
+
@property
|
|
169
|
+
@pulumi.getter(name="resourceGroupName")
|
|
170
|
+
def resource_group_name(self) -> pulumi.Output[Optional[str]]:
|
|
171
|
+
"""
|
|
172
|
+
Name of the resource group that contains the vault.
|
|
173
|
+
"""
|
|
174
|
+
return pulumi.get(self, "resource_group_name")
|
|
175
|
+
|
|
176
|
+
@property
|
|
177
|
+
@pulumi.getter(name="vaultName")
|
|
178
|
+
def vault_name(self) -> pulumi.Output[Optional[str]]:
|
|
179
|
+
"""
|
|
180
|
+
Name of the Key Vault.
|
|
181
|
+
"""
|
|
182
|
+
return pulumi.get(self, "vault_name")
|
|
183
|
+
|
|
@@ -12,6 +12,7 @@ from . import outputs
|
|
|
12
12
|
from ._enums import *
|
|
13
13
|
|
|
14
14
|
__all__ = [
|
|
15
|
+
'AccessPolicyEntry',
|
|
15
16
|
'AccessPolicyEntryResponse',
|
|
16
17
|
'ActionResponse',
|
|
17
18
|
'IPRuleResponse',
|
|
@@ -30,6 +31,7 @@ __all__ = [
|
|
|
30
31
|
'ManagedHsmPropertiesResponse',
|
|
31
32
|
'ManagedHsmSkuResponse',
|
|
32
33
|
'NetworkRuleSetResponse',
|
|
34
|
+
'Permissions',
|
|
33
35
|
'PermissionsResponse',
|
|
34
36
|
'PrivateEndpointConnectionItemResponse',
|
|
35
37
|
'PrivateEndpointResponse',
|
|
@@ -44,6 +46,83 @@ __all__ = [
|
|
|
44
46
|
'VirtualNetworkRuleResponse',
|
|
45
47
|
]
|
|
46
48
|
|
|
49
|
+
@pulumi.output_type
|
|
50
|
+
class AccessPolicyEntry(dict):
|
|
51
|
+
"""
|
|
52
|
+
An identity that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID.
|
|
53
|
+
"""
|
|
54
|
+
@staticmethod
|
|
55
|
+
def __key_warning(key: str):
|
|
56
|
+
suggest = None
|
|
57
|
+
if key == "objectId":
|
|
58
|
+
suggest = "object_id"
|
|
59
|
+
elif key == "tenantId":
|
|
60
|
+
suggest = "tenant_id"
|
|
61
|
+
elif key == "applicationId":
|
|
62
|
+
suggest = "application_id"
|
|
63
|
+
|
|
64
|
+
if suggest:
|
|
65
|
+
pulumi.log.warn(f"Key '{key}' not found in AccessPolicyEntry. Access the value via the '{suggest}' property getter instead.")
|
|
66
|
+
|
|
67
|
+
def __getitem__(self, key: str) -> Any:
|
|
68
|
+
AccessPolicyEntry.__key_warning(key)
|
|
69
|
+
return super().__getitem__(key)
|
|
70
|
+
|
|
71
|
+
def get(self, key: str, default = None) -> Any:
|
|
72
|
+
AccessPolicyEntry.__key_warning(key)
|
|
73
|
+
return super().get(key, default)
|
|
74
|
+
|
|
75
|
+
def __init__(__self__, *,
|
|
76
|
+
object_id: str,
|
|
77
|
+
permissions: 'outputs.Permissions',
|
|
78
|
+
tenant_id: str,
|
|
79
|
+
application_id: Optional[str] = None):
|
|
80
|
+
"""
|
|
81
|
+
An identity that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID.
|
|
82
|
+
:param str object_id: The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
|
|
83
|
+
:param 'Permissions' permissions: Permissions the identity has for keys, secrets and certificates.
|
|
84
|
+
:param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
85
|
+
:param str application_id: Application ID of the client making request on behalf of a principal
|
|
86
|
+
"""
|
|
87
|
+
pulumi.set(__self__, "object_id", object_id)
|
|
88
|
+
pulumi.set(__self__, "permissions", permissions)
|
|
89
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
90
|
+
if application_id is not None:
|
|
91
|
+
pulumi.set(__self__, "application_id", application_id)
|
|
92
|
+
|
|
93
|
+
@property
|
|
94
|
+
@pulumi.getter(name="objectId")
|
|
95
|
+
def object_id(self) -> str:
|
|
96
|
+
"""
|
|
97
|
+
The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
|
|
98
|
+
"""
|
|
99
|
+
return pulumi.get(self, "object_id")
|
|
100
|
+
|
|
101
|
+
@property
|
|
102
|
+
@pulumi.getter
|
|
103
|
+
def permissions(self) -> 'outputs.Permissions':
|
|
104
|
+
"""
|
|
105
|
+
Permissions the identity has for keys, secrets and certificates.
|
|
106
|
+
"""
|
|
107
|
+
return pulumi.get(self, "permissions")
|
|
108
|
+
|
|
109
|
+
@property
|
|
110
|
+
@pulumi.getter(name="tenantId")
|
|
111
|
+
def tenant_id(self) -> str:
|
|
112
|
+
"""
|
|
113
|
+
The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
114
|
+
"""
|
|
115
|
+
return pulumi.get(self, "tenant_id")
|
|
116
|
+
|
|
117
|
+
@property
|
|
118
|
+
@pulumi.getter(name="applicationId")
|
|
119
|
+
def application_id(self) -> Optional[str]:
|
|
120
|
+
"""
|
|
121
|
+
Application ID of the client making request on behalf of a principal
|
|
122
|
+
"""
|
|
123
|
+
return pulumi.get(self, "application_id")
|
|
124
|
+
|
|
125
|
+
|
|
47
126
|
@pulumi.output_type
|
|
48
127
|
class AccessPolicyEntryResponse(dict):
|
|
49
128
|
"""
|
|
@@ -1167,6 +1246,65 @@ class NetworkRuleSetResponse(dict):
|
|
|
1167
1246
|
return pulumi.get(self, "virtual_network_rules")
|
|
1168
1247
|
|
|
1169
1248
|
|
|
1249
|
+
@pulumi.output_type
|
|
1250
|
+
class Permissions(dict):
|
|
1251
|
+
"""
|
|
1252
|
+
Permissions the identity has for keys, secrets, certificates and storage.
|
|
1253
|
+
"""
|
|
1254
|
+
def __init__(__self__, *,
|
|
1255
|
+
certificates: Optional[Sequence[str]] = None,
|
|
1256
|
+
keys: Optional[Sequence[str]] = None,
|
|
1257
|
+
secrets: Optional[Sequence[str]] = None,
|
|
1258
|
+
storage: Optional[Sequence[str]] = None):
|
|
1259
|
+
"""
|
|
1260
|
+
Permissions the identity has for keys, secrets, certificates and storage.
|
|
1261
|
+
:param Sequence[Union[str, 'CertificatePermissions']] certificates: Permissions to certificates
|
|
1262
|
+
:param Sequence[Union[str, 'KeyPermissions']] keys: Permissions to keys
|
|
1263
|
+
:param Sequence[Union[str, 'SecretPermissions']] secrets: Permissions to secrets
|
|
1264
|
+
:param Sequence[Union[str, 'StoragePermissions']] storage: Permissions to storage accounts
|
|
1265
|
+
"""
|
|
1266
|
+
if certificates is not None:
|
|
1267
|
+
pulumi.set(__self__, "certificates", certificates)
|
|
1268
|
+
if keys is not None:
|
|
1269
|
+
pulumi.set(__self__, "keys", keys)
|
|
1270
|
+
if secrets is not None:
|
|
1271
|
+
pulumi.set(__self__, "secrets", secrets)
|
|
1272
|
+
if storage is not None:
|
|
1273
|
+
pulumi.set(__self__, "storage", storage)
|
|
1274
|
+
|
|
1275
|
+
@property
|
|
1276
|
+
@pulumi.getter
|
|
1277
|
+
def certificates(self) -> Optional[Sequence[str]]:
|
|
1278
|
+
"""
|
|
1279
|
+
Permissions to certificates
|
|
1280
|
+
"""
|
|
1281
|
+
return pulumi.get(self, "certificates")
|
|
1282
|
+
|
|
1283
|
+
@property
|
|
1284
|
+
@pulumi.getter
|
|
1285
|
+
def keys(self) -> Optional[Sequence[str]]:
|
|
1286
|
+
"""
|
|
1287
|
+
Permissions to keys
|
|
1288
|
+
"""
|
|
1289
|
+
return pulumi.get(self, "keys")
|
|
1290
|
+
|
|
1291
|
+
@property
|
|
1292
|
+
@pulumi.getter
|
|
1293
|
+
def secrets(self) -> Optional[Sequence[str]]:
|
|
1294
|
+
"""
|
|
1295
|
+
Permissions to secrets
|
|
1296
|
+
"""
|
|
1297
|
+
return pulumi.get(self, "secrets")
|
|
1298
|
+
|
|
1299
|
+
@property
|
|
1300
|
+
@pulumi.getter
|
|
1301
|
+
def storage(self) -> Optional[Sequence[str]]:
|
|
1302
|
+
"""
|
|
1303
|
+
Permissions to storage accounts
|
|
1304
|
+
"""
|
|
1305
|
+
return pulumi.get(self, "storage")
|
|
1306
|
+
|
|
1307
|
+
|
|
1170
1308
|
@pulumi.output_type
|
|
1171
1309
|
class PermissionsResponse(dict):
|
|
1172
1310
|
"""
|
|
@@ -1894,6 +2032,7 @@ class VaultPropertiesResponse(dict):
|
|
|
1894
2032
|
:param 'SkuResponse' sku: SKU details
|
|
1895
2033
|
:param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1896
2034
|
:param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
2035
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1897
2036
|
:param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
1898
2037
|
:param bool enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
1899
2038
|
:param bool enable_soft_delete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
|
|
@@ -1980,6 +2119,7 @@ class VaultPropertiesResponse(dict):
|
|
|
1980
2119
|
def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
|
|
1981
2120
|
"""
|
|
1982
2121
|
An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
2122
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1983
2123
|
"""
|
|
1984
2124
|
return pulumi.get(self, "access_policies")
|
|
1985
2125
|
|
|
@@ -1309,6 +1309,7 @@ class VaultPropertiesArgs:
|
|
|
1309
1309
|
:param pulumi.Input['SkuArgs'] sku: SKU details
|
|
1310
1310
|
:param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1311
1311
|
:param pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1312
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1312
1313
|
:param pulumi.Input['CreateMode'] create_mode: The vault's create mode to indicate whether the vault need to be recovered or not.
|
|
1313
1314
|
:param pulumi.Input[bool] enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
1314
1315
|
:param pulumi.Input[bool] enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
@@ -1388,6 +1389,7 @@ class VaultPropertiesArgs:
|
|
|
1388
1389
|
def access_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]]:
|
|
1389
1390
|
"""
|
|
1390
1391
|
An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1392
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1391
1393
|
"""
|
|
1392
1394
|
return pulumi.get(self, "access_policies")
|
|
1393
1395
|
|
|
@@ -1894,6 +1894,7 @@ class VaultPropertiesResponse(dict):
|
|
|
1894
1894
|
:param 'SkuResponse' sku: SKU details
|
|
1895
1895
|
:param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1896
1896
|
:param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1897
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1897
1898
|
:param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
1898
1899
|
:param bool enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
1899
1900
|
:param bool enable_soft_delete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
|
|
@@ -1980,6 +1981,7 @@ class VaultPropertiesResponse(dict):
|
|
|
1980
1981
|
def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
|
|
1981
1982
|
"""
|
|
1982
1983
|
An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1984
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1983
1985
|
"""
|
|
1984
1986
|
return pulumi.get(self, "access_policies")
|
|
1985
1987
|
|
|
@@ -1349,6 +1349,7 @@ class VaultPropertiesArgs:
|
|
|
1349
1349
|
:param pulumi.Input['SkuArgs'] sku: SKU details
|
|
1350
1350
|
:param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1351
1351
|
:param pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1352
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1352
1353
|
:param pulumi.Input['CreateMode'] create_mode: The vault's create mode to indicate whether the vault need to be recovered or not.
|
|
1353
1354
|
:param pulumi.Input[bool] enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
1354
1355
|
:param pulumi.Input[bool] enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
@@ -1428,6 +1429,7 @@ class VaultPropertiesArgs:
|
|
|
1428
1429
|
def access_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]]:
|
|
1429
1430
|
"""
|
|
1430
1431
|
An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1432
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1431
1433
|
"""
|
|
1432
1434
|
return pulumi.get(self, "access_policies")
|
|
1433
1435
|
|
|
@@ -2025,6 +2025,7 @@ class VaultPropertiesResponse(dict):
|
|
|
2025
2025
|
:param 'SkuResponse' sku: SKU details
|
|
2026
2026
|
:param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
2027
2027
|
:param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
2028
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
2028
2029
|
:param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
2029
2030
|
:param bool enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
2030
2031
|
:param bool enable_soft_delete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
|
|
@@ -2111,6 +2112,7 @@ class VaultPropertiesResponse(dict):
|
|
|
2111
2112
|
def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
|
|
2112
2113
|
"""
|
|
2113
2114
|
An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
2115
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
2114
2116
|
"""
|
|
2115
2117
|
return pulumi.get(self, "access_policies")
|
|
2116
2118
|
|
{pulumi_azure_native-2.24.0.dist-info → pulumi_azure_native-2.24.1a1704477298.dist-info}/METADATA
RENAMED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: pulumi_azure_native
|
|
3
|
-
Version: 2.24.
|
|
3
|
+
Version: 2.24.1a1704477298
|
|
4
4
|
Summary: A native Pulumi package for creating and managing Azure resources.
|
|
5
5
|
License: Apache-2.0
|
|
6
6
|
Project-URL: Homepage, https://pulumi.com
|
|
@@ -74,6 +74,12 @@ quality and higher fidelity with the Azure platform.
|
|
|
74
74
|
|
|
75
75
|
To learn how to configure credentials refer to the [Azure configuration options](https://www.pulumi.com/registry/packages/azure-native/installation-configuration/#configuration-options).
|
|
76
76
|
|
|
77
|
+
## Other Configuration
|
|
78
|
+
|
|
79
|
+
In addition to the configuration options in the official documentation linked above, the following environment variables can be used to tweak lower-level behavior of the provider:
|
|
80
|
+
|
|
81
|
+
- `PULUMI_FORCE_NEW_FROM_SUBTYPES`: if, after a change in your program, the provider does not replace a resource that should be replaced because it cannot be updated, setting this variable to `true` might allow the provider to infer the correct behavior. For more details please see PR #2970. We're planning to make this behavior the default in the future.
|
|
82
|
+
|
|
77
83
|
## Building
|
|
78
84
|
|
|
79
85
|
See [contributing](CONTRIBUTING.md) for details on how to build and contribute to this provider.
|
{pulumi_azure_native-2.24.0.dist-info → pulumi_azure_native-2.24.1a1704477298.dist-info}/RECORD
RENAMED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
pulumi_azure_native/__init__.py,sha256=
|
|
1
|
+
pulumi_azure_native/__init__.py,sha256=RTNNiPhkg8BfGCyw21PB3FxHNlPKIgmbguRR6bDyIvU,743981
|
|
2
2
|
pulumi_azure_native/_utilities.py,sha256=WjjUoMUWgEBJiE2KZ76Lihj4rx_1_v__96T1_-RwY0I,9231
|
|
3
3
|
pulumi_azure_native/provider.py,sha256=LNUQF0if_Zo-PnKfRhLCMwTAj8sZScuh5SUu6m7_e3k,23122
|
|
4
4
|
pulumi_azure_native/pulumi-plugin.json,sha256=V6SbnACkF8XN-KxV-K5PJhTTTqe9VRprRxzLHQ9nkO8,49
|
|
@@ -9372,9 +9372,10 @@ pulumi_azure_native/iotoperationsorchestrator/v20231004preview/instance.py,sha25
|
|
|
9372
9372
|
pulumi_azure_native/iotoperationsorchestrator/v20231004preview/outputs.py,sha256=73MomPL6awjLy0E9XJK7vIPsKdWcXejdXXC8N4eFfuc,10645
|
|
9373
9373
|
pulumi_azure_native/iotoperationsorchestrator/v20231004preview/solution.py,sha256=IBDFSzkUpldm_3B3wr2UAbHyv8_UfuELQb2SXJifCOI,13097
|
|
9374
9374
|
pulumi_azure_native/iotoperationsorchestrator/v20231004preview/target.py,sha256=Km1QRbNgU6anMeBshTu8T_Hjp2a4ViRDNjF14nRbWIY,17293
|
|
9375
|
-
pulumi_azure_native/keyvault/__init__.py,sha256=
|
|
9375
|
+
pulumi_azure_native/keyvault/__init__.py,sha256=26dXKLZKcrlFO_I0bOcC9AJmV2GAcE9bTw4EC5mDUXE,1142
|
|
9376
9376
|
pulumi_azure_native/keyvault/_enums.py,sha256=0R0h_sfeWKsD7zMW-V2pPXF1L7zG6HjLRH5o3xvmYoM,5399
|
|
9377
|
-
pulumi_azure_native/keyvault/_inputs.py,sha256=
|
|
9377
|
+
pulumi_azure_native/keyvault/_inputs.py,sha256=CVTYf4fhdxpG8qZr2k89hF-VCvoDpfQF88VjAHEVlTU,71880
|
|
9378
|
+
pulumi_azure_native/keyvault/access_policy.py,sha256=b63yqVVN89IJGfPGuFJO1X6VgoILcCMYjXnhts2DUZs,7487
|
|
9378
9379
|
pulumi_azure_native/keyvault/get_key.py,sha256=l0Jhy95z5bdxs07lW9-OSShh5NHd_7sNuaEfqbPl3GE,9530
|
|
9379
9380
|
pulumi_azure_native/keyvault/get_managed_hsm.py,sha256=WTF3HNt2b28vkBxpaiaHbAHXVfVaukPaE04Dh1F6vf0,5968
|
|
9380
9381
|
pulumi_azure_native/keyvault/get_mhsm_private_endpoint_connection.py,sha256=TBlj2cvhcQT9LT420rUBZmrhQ82aw4iGzBaImjXHKrU,9119
|
|
@@ -9384,13 +9385,13 @@ pulumi_azure_native/keyvault/get_vault.py,sha256=rcQv0Bgpn1xAcOSBFr7VF7GWSZDsWkg
|
|
|
9384
9385
|
pulumi_azure_native/keyvault/key.py,sha256=tIUXB7vXJVBNZwbrOBarqepXGYeU5WwuSZi6TIjrAGY,14249
|
|
9385
9386
|
pulumi_azure_native/keyvault/managed_hsm.py,sha256=pxp43VHhVF0QMxXu7k6aYJtHaWBMLosQPUzYRFVYsaQ,12157
|
|
9386
9387
|
pulumi_azure_native/keyvault/mhsm_private_endpoint_connection.py,sha256=w_TkbM26KQ4ATImxnrCi-gGhnWnsobrtnZdEgQh-Ynk,15829
|
|
9387
|
-
pulumi_azure_native/keyvault/outputs.py,sha256=
|
|
9388
|
+
pulumi_azure_native/keyvault/outputs.py,sha256=qJ9bFtL8-9X6NfdBrcdRVt8lbXDS7h38kxsJr6tbqA0,91960
|
|
9388
9389
|
pulumi_azure_native/keyvault/private_endpoint_connection.py,sha256=bfGrhpMf-WG-Wycx5DsbEctSLr1wqdSAcSuFwQcwi0Y,12821
|
|
9389
9390
|
pulumi_azure_native/keyvault/secret.py,sha256=5cQDOIRD0hWKOa3kxMtzRJrFtqp9VuXJXD2ydvaaZvo,11499
|
|
9390
9391
|
pulumi_azure_native/keyvault/vault.py,sha256=Z0aZzfyl1KLcEcwy7H8Nckfk3Oh1kLfY56OBsJ6Yuio,11412
|
|
9391
9392
|
pulumi_azure_native/keyvault/v20230201/__init__.py,sha256=p2NBewW_qVLoI93T1icpgn9xDy16NtY3noUkbWMgIXc,703
|
|
9392
9393
|
pulumi_azure_native/keyvault/v20230201/_enums.py,sha256=0R0h_sfeWKsD7zMW-V2pPXF1L7zG6HjLRH5o3xvmYoM,5399
|
|
9393
|
-
pulumi_azure_native/keyvault/v20230201/_inputs.py,sha256=
|
|
9394
|
+
pulumi_azure_native/keyvault/v20230201/_inputs.py,sha256=pX01lBQvFhFIn-2O1GDVEpK_vKlE950ufIbJh-B7dbk,71881
|
|
9394
9395
|
pulumi_azure_native/keyvault/v20230201/get_key.py,sha256=hJdie__SSYCm8Ocb5V_lA6WWptNQWE4ywDpJyg3pAH8,9367
|
|
9395
9396
|
pulumi_azure_native/keyvault/v20230201/get_managed_hsm.py,sha256=tCAGjkztbRQdVmMX6HzprW6sfo_E6grlohDMQLLU1BQ,5805
|
|
9396
9397
|
pulumi_azure_native/keyvault/v20230201/get_mhsm_private_endpoint_connection.py,sha256=ZjmS6mCt-8sL78gf2CdVmF3SMHdaT-qSapuL7E4q6JA,8956
|
|
@@ -9400,13 +9401,13 @@ pulumi_azure_native/keyvault/v20230201/get_vault.py,sha256=VAORp6PBUVVIx-Z83gZ_C
|
|
|
9400
9401
|
pulumi_azure_native/keyvault/v20230201/key.py,sha256=y2YWVkdCi2YXtmgeAdo8_w4kpFALmIfmJW7GafX12ps,13958
|
|
9401
9402
|
pulumi_azure_native/keyvault/v20230201/managed_hsm.py,sha256=HPF7LM0DpUwV5eJo6KWIUMOQGQ2B-Wt9e6IgJ7MpcAo,11850
|
|
9402
9403
|
pulumi_azure_native/keyvault/v20230201/mhsm_private_endpoint_connection.py,sha256=_cfZZiWmf7e0qxT2IaZRu2ZvU_9HnWftWd91vYUoKNQ,15522
|
|
9403
|
-
pulumi_azure_native/keyvault/v20230201/outputs.py,sha256=
|
|
9404
|
+
pulumi_azure_native/keyvault/v20230201/outputs.py,sha256=5bCg_bmjKNnSOqbvoR4BwjXroct_inFz5-tCGKOYHks,86757
|
|
9404
9405
|
pulumi_azure_native/keyvault/v20230201/private_endpoint_connection.py,sha256=TMbWucI74gx7Jy3ToA6fjQtEuKdsniGCleAT4zSeGj8,12530
|
|
9405
9406
|
pulumi_azure_native/keyvault/v20230201/secret.py,sha256=avtZfiTZiprwb2MDZ2NqG6PqTyrrE1hQzwE1cLptSP0,11208
|
|
9406
9407
|
pulumi_azure_native/keyvault/v20230201/vault.py,sha256=nfAVqnNsNJYGXvFrPxtQnhJdasf7Q-gL4FZSslOl_CY,11081
|
|
9407
9408
|
pulumi_azure_native/keyvault/v20230701/__init__.py,sha256=p2NBewW_qVLoI93T1icpgn9xDy16NtY3noUkbWMgIXc,703
|
|
9408
9409
|
pulumi_azure_native/keyvault/v20230701/_enums.py,sha256=iFdgoR7GSNKr5dqE4Rp5sf-eBZpJCHUKZBvgsxbeAQo,5544
|
|
9409
|
-
pulumi_azure_native/keyvault/v20230701/_inputs.py,sha256=
|
|
9410
|
+
pulumi_azure_native/keyvault/v20230701/_inputs.py,sha256=AQVmR8G0zLXYWPIoftmGNJEAVld6KaXbv_zi_rUKD6s,74193
|
|
9410
9411
|
pulumi_azure_native/keyvault/v20230701/get_key.py,sha256=pVF2_wan-qrkHq1kA7nEaq9WJ1SO_Q-ntauVqSRDeKE,9367
|
|
9411
9412
|
pulumi_azure_native/keyvault/v20230701/get_managed_hsm.py,sha256=ztHGlDuAAk0ab4HORcdIL-jPmLXIDLcSFSnO2LrSeMM,6349
|
|
9412
9413
|
pulumi_azure_native/keyvault/v20230701/get_mhsm_private_endpoint_connection.py,sha256=jJ2s1cBRVtTlpvjhpHvrmXL_P_Cru-gG8Tj0vl1zYuc,9500
|
|
@@ -9416,7 +9417,7 @@ pulumi_azure_native/keyvault/v20230701/get_vault.py,sha256=fRSJJ0YK0jatcRRaiNUqB
|
|
|
9416
9417
|
pulumi_azure_native/keyvault/v20230701/key.py,sha256=DXcLSb-Iiz0sXYkwBLmKGM5HK-boAN1vOHacd5XuhqE,13958
|
|
9417
9418
|
pulumi_azure_native/keyvault/v20230701/managed_hsm.py,sha256=l7KhyFqT0xYG3mzcz3O8T9aUsieWun_mX8AnJhavRCo,13336
|
|
9418
9419
|
pulumi_azure_native/keyvault/v20230701/mhsm_private_endpoint_connection.py,sha256=jGl-37SI3uGNKyJ_a3o9PFsAV2NXXZG-B1i9gxib4ZU,17008
|
|
9419
|
-
pulumi_azure_native/keyvault/v20230701/outputs.py,sha256=
|
|
9420
|
+
pulumi_azure_native/keyvault/v20230701/outputs.py,sha256=y4J1hfqrOjrbx8kRvsO0J0o_4E1JKx6kjfKXV4vq7Z0,92202
|
|
9420
9421
|
pulumi_azure_native/keyvault/v20230701/private_endpoint_connection.py,sha256=YKhmVYi4EmGGNWP7eCUOgaUGcFo49RIf1wsNiHykI58,12530
|
|
9421
9422
|
pulumi_azure_native/keyvault/v20230701/secret.py,sha256=ghp2SyKkY0ljEcA5-IhV3OwLX8LEl2y1bCb83yfsaP0,11208
|
|
9422
9423
|
pulumi_azure_native/keyvault/v20230701/vault.py,sha256=3h79HjoTFjT2aaf2ghXFpw1fRl7RQcIEZk20xpeT1yE,11081
|
|
@@ -19606,7 +19607,7 @@ pulumi_azure_native/workloads/v20231001preview/sap_central_instance.py,sha256=Ke
|
|
|
19606
19607
|
pulumi_azure_native/workloads/v20231001preview/sap_database_instance.py,sha256=-aR0aCgupI8LNymrLC6Llgkky68v4ZTd2mawd9Lj13U,13907
|
|
19607
19608
|
pulumi_azure_native/workloads/v20231001preview/sap_landscape_monitor.py,sha256=kh_uPVrU8zJqqfe7v2--2sR1w5evu1dVlo0K44bTAQ0,11157
|
|
19608
19609
|
pulumi_azure_native/workloads/v20231001preview/sap_virtual_instance.py,sha256=dMa-ylYX90O5UGT8A5yheKhQqS2_1pLbw3OhbgCfLMQ,24031
|
|
19609
|
-
pulumi_azure_native-2.24.
|
|
19610
|
-
pulumi_azure_native-2.24.
|
|
19611
|
-
pulumi_azure_native-2.24.
|
|
19612
|
-
pulumi_azure_native-2.24.
|
|
19610
|
+
pulumi_azure_native-2.24.1a1704477298.dist-info/METADATA,sha256=XGaYB0iJJ3B2yvXPdKelz231Wq4PAr6vuuuY6WoRhHg,4132
|
|
19611
|
+
pulumi_azure_native-2.24.1a1704477298.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
|
|
19612
|
+
pulumi_azure_native-2.24.1a1704477298.dist-info/top_level.txt,sha256=8Vl7910-df5jOZ9lvILrFhlMOEUrsaaX2dkztIt4Pkw,20
|
|
19613
|
+
pulumi_azure_native-2.24.1a1704477298.dist-info/RECORD,,
|
{pulumi_azure_native-2.24.0.dist-info → pulumi_azure_native-2.24.1a1704477298.dist-info}/WHEEL
RENAMED
|
File without changes
|
|
File without changes
|