pulumi-azure-native 2.24.0__py3-none-any.whl → 2.24.1a1704477298__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-azure-native might be problematic. Click here for more details.

@@ -7829,6 +7829,7 @@ _utilities.register(
7829
7829
  "mod": "keyvault",
7830
7830
  "fqn": "pulumi_azure_native.keyvault",
7831
7831
  "classes": {
7832
+ "azure-native:keyvault:AccessPolicy": "AccessPolicy",
7832
7833
  "azure-native:keyvault:Key": "Key",
7833
7834
  "azure-native:keyvault:MHSMPrivateEndpointConnection": "MHSMPrivateEndpointConnection",
7834
7835
  "azure-native:keyvault:ManagedHsm": "ManagedHsm",
@@ -6,6 +6,7 @@ from .. import _utilities
6
6
  import typing
7
7
  # Export this package's modules as members:
8
8
  from ._enums import *
9
+ from .access_policy import *
9
10
  from .get_key import *
10
11
  from .get_managed_hsm import *
11
12
  from .get_mhsm_private_endpoint_connection import *
@@ -1309,6 +1309,7 @@ class VaultPropertiesArgs:
1309
1309
  :param pulumi.Input['SkuArgs'] sku: SKU details
1310
1310
  :param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
1311
1311
  :param pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1312
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1312
1313
  :param pulumi.Input['CreateMode'] create_mode: The vault's create mode to indicate whether the vault need to be recovered or not.
1313
1314
  :param pulumi.Input[bool] enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
1314
1315
  :param pulumi.Input[bool] enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
@@ -1388,6 +1389,7 @@ class VaultPropertiesArgs:
1388
1389
  def access_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]]:
1389
1390
  """
1390
1391
  An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1392
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1391
1393
  """
1392
1394
  return pulumi.get(self, "access_policies")
1393
1395
 
@@ -0,0 +1,183 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._enums import *
13
+ from ._inputs import *
14
+
15
+ __all__ = ['AccessPolicyArgs', 'AccessPolicy']
16
+
17
+ @pulumi.input_type
18
+ class AccessPolicyArgs:
19
+ def __init__(__self__, *,
20
+ policy: pulumi.Input['AccessPolicyEntryArgs'],
21
+ resource_group_name: pulumi.Input[str],
22
+ vault_name: pulumi.Input[str]):
23
+ """
24
+ The set of arguments for constructing a AccessPolicy resource.
25
+ :param pulumi.Input['AccessPolicyEntryArgs'] policy: The definition of the access policy.
26
+ :param pulumi.Input[str] resource_group_name: Name of the resource group that contains the vault.
27
+ :param pulumi.Input[str] vault_name: Name of the Key Vault.
28
+ """
29
+ pulumi.set(__self__, "policy", policy)
30
+ pulumi.set(__self__, "resource_group_name", resource_group_name)
31
+ pulumi.set(__self__, "vault_name", vault_name)
32
+
33
+ @property
34
+ @pulumi.getter
35
+ def policy(self) -> pulumi.Input['AccessPolicyEntryArgs']:
36
+ """
37
+ The definition of the access policy.
38
+ """
39
+ return pulumi.get(self, "policy")
40
+
41
+ @policy.setter
42
+ def policy(self, value: pulumi.Input['AccessPolicyEntryArgs']):
43
+ pulumi.set(self, "policy", value)
44
+
45
+ @property
46
+ @pulumi.getter(name="resourceGroupName")
47
+ def resource_group_name(self) -> pulumi.Input[str]:
48
+ """
49
+ Name of the resource group that contains the vault.
50
+ """
51
+ return pulumi.get(self, "resource_group_name")
52
+
53
+ @resource_group_name.setter
54
+ def resource_group_name(self, value: pulumi.Input[str]):
55
+ pulumi.set(self, "resource_group_name", value)
56
+
57
+ @property
58
+ @pulumi.getter(name="vaultName")
59
+ def vault_name(self) -> pulumi.Input[str]:
60
+ """
61
+ Name of the Key Vault.
62
+ """
63
+ return pulumi.get(self, "vault_name")
64
+
65
+ @vault_name.setter
66
+ def vault_name(self, value: pulumi.Input[str]):
67
+ pulumi.set(self, "vault_name", value)
68
+
69
+
70
+ class AccessPolicy(pulumi.CustomResource):
71
+ @overload
72
+ def __init__(__self__,
73
+ resource_name: str,
74
+ opts: Optional[pulumi.ResourceOptions] = None,
75
+ policy: Optional[pulumi.Input[pulumi.InputType['AccessPolicyEntryArgs']]] = None,
76
+ resource_group_name: Optional[pulumi.Input[str]] = None,
77
+ vault_name: Optional[pulumi.Input[str]] = None,
78
+ __props__=None):
79
+ """
80
+ Key Vault Access Policy for managing policies on existing vaults.
81
+
82
+ :param str resource_name: The name of the resource.
83
+ :param pulumi.ResourceOptions opts: Options for the resource.
84
+ :param pulumi.Input[pulumi.InputType['AccessPolicyEntryArgs']] policy: The definition of the access policy.
85
+ :param pulumi.Input[str] resource_group_name: Name of the resource group that contains the vault.
86
+ :param pulumi.Input[str] vault_name: Name of the Key Vault.
87
+ """
88
+ ...
89
+ @overload
90
+ def __init__(__self__,
91
+ resource_name: str,
92
+ args: AccessPolicyArgs,
93
+ opts: Optional[pulumi.ResourceOptions] = None):
94
+ """
95
+ Key Vault Access Policy for managing policies on existing vaults.
96
+
97
+ :param str resource_name: The name of the resource.
98
+ :param AccessPolicyArgs args: The arguments to use to populate this resource's properties.
99
+ :param pulumi.ResourceOptions opts: Options for the resource.
100
+ """
101
+ ...
102
+ def __init__(__self__, resource_name: str, *args, **kwargs):
103
+ resource_args, opts = _utilities.get_resource_args_opts(AccessPolicyArgs, pulumi.ResourceOptions, *args, **kwargs)
104
+ if resource_args is not None:
105
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
106
+ else:
107
+ __self__._internal_init(resource_name, *args, **kwargs)
108
+
109
+ def _internal_init(__self__,
110
+ resource_name: str,
111
+ opts: Optional[pulumi.ResourceOptions] = None,
112
+ policy: Optional[pulumi.Input[pulumi.InputType['AccessPolicyEntryArgs']]] = None,
113
+ resource_group_name: Optional[pulumi.Input[str]] = None,
114
+ vault_name: Optional[pulumi.Input[str]] = None,
115
+ __props__=None):
116
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
117
+ if not isinstance(opts, pulumi.ResourceOptions):
118
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
119
+ if opts.id is None:
120
+ if __props__ is not None:
121
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
122
+ __props__ = AccessPolicyArgs.__new__(AccessPolicyArgs)
123
+
124
+ if policy is None and not opts.urn:
125
+ raise TypeError("Missing required property 'policy'")
126
+ __props__.__dict__["policy"] = policy
127
+ if resource_group_name is None and not opts.urn:
128
+ raise TypeError("Missing required property 'resource_group_name'")
129
+ __props__.__dict__["resource_group_name"] = resource_group_name
130
+ if vault_name is None and not opts.urn:
131
+ raise TypeError("Missing required property 'vault_name'")
132
+ __props__.__dict__["vault_name"] = vault_name
133
+ super(AccessPolicy, __self__).__init__(
134
+ 'azure-native:keyvault:AccessPolicy',
135
+ resource_name,
136
+ __props__,
137
+ opts)
138
+
139
+ @staticmethod
140
+ def get(resource_name: str,
141
+ id: pulumi.Input[str],
142
+ opts: Optional[pulumi.ResourceOptions] = None) -> 'AccessPolicy':
143
+ """
144
+ Get an existing AccessPolicy resource's state with the given name, id, and optional extra
145
+ properties used to qualify the lookup.
146
+
147
+ :param str resource_name: The unique name of the resulting resource.
148
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
149
+ :param pulumi.ResourceOptions opts: Options for the resource.
150
+ """
151
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
152
+
153
+ __props__ = AccessPolicyArgs.__new__(AccessPolicyArgs)
154
+
155
+ __props__.__dict__["policy"] = None
156
+ __props__.__dict__["resource_group_name"] = None
157
+ __props__.__dict__["vault_name"] = None
158
+ return AccessPolicy(resource_name, opts=opts, __props__=__props__)
159
+
160
+ @property
161
+ @pulumi.getter
162
+ def policy(self) -> pulumi.Output[Optional['outputs.AccessPolicyEntry']]:
163
+ """
164
+ The definition of the access policy.
165
+ """
166
+ return pulumi.get(self, "policy")
167
+
168
+ @property
169
+ @pulumi.getter(name="resourceGroupName")
170
+ def resource_group_name(self) -> pulumi.Output[Optional[str]]:
171
+ """
172
+ Name of the resource group that contains the vault.
173
+ """
174
+ return pulumi.get(self, "resource_group_name")
175
+
176
+ @property
177
+ @pulumi.getter(name="vaultName")
178
+ def vault_name(self) -> pulumi.Output[Optional[str]]:
179
+ """
180
+ Name of the Key Vault.
181
+ """
182
+ return pulumi.get(self, "vault_name")
183
+
@@ -12,6 +12,7 @@ from . import outputs
12
12
  from ._enums import *
13
13
 
14
14
  __all__ = [
15
+ 'AccessPolicyEntry',
15
16
  'AccessPolicyEntryResponse',
16
17
  'ActionResponse',
17
18
  'IPRuleResponse',
@@ -30,6 +31,7 @@ __all__ = [
30
31
  'ManagedHsmPropertiesResponse',
31
32
  'ManagedHsmSkuResponse',
32
33
  'NetworkRuleSetResponse',
34
+ 'Permissions',
33
35
  'PermissionsResponse',
34
36
  'PrivateEndpointConnectionItemResponse',
35
37
  'PrivateEndpointResponse',
@@ -44,6 +46,83 @@ __all__ = [
44
46
  'VirtualNetworkRuleResponse',
45
47
  ]
46
48
 
49
+ @pulumi.output_type
50
+ class AccessPolicyEntry(dict):
51
+ """
52
+ An identity that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID.
53
+ """
54
+ @staticmethod
55
+ def __key_warning(key: str):
56
+ suggest = None
57
+ if key == "objectId":
58
+ suggest = "object_id"
59
+ elif key == "tenantId":
60
+ suggest = "tenant_id"
61
+ elif key == "applicationId":
62
+ suggest = "application_id"
63
+
64
+ if suggest:
65
+ pulumi.log.warn(f"Key '{key}' not found in AccessPolicyEntry. Access the value via the '{suggest}' property getter instead.")
66
+
67
+ def __getitem__(self, key: str) -> Any:
68
+ AccessPolicyEntry.__key_warning(key)
69
+ return super().__getitem__(key)
70
+
71
+ def get(self, key: str, default = None) -> Any:
72
+ AccessPolicyEntry.__key_warning(key)
73
+ return super().get(key, default)
74
+
75
+ def __init__(__self__, *,
76
+ object_id: str,
77
+ permissions: 'outputs.Permissions',
78
+ tenant_id: str,
79
+ application_id: Optional[str] = None):
80
+ """
81
+ An identity that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID.
82
+ :param str object_id: The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
83
+ :param 'Permissions' permissions: Permissions the identity has for keys, secrets and certificates.
84
+ :param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
85
+ :param str application_id: Application ID of the client making request on behalf of a principal
86
+ """
87
+ pulumi.set(__self__, "object_id", object_id)
88
+ pulumi.set(__self__, "permissions", permissions)
89
+ pulumi.set(__self__, "tenant_id", tenant_id)
90
+ if application_id is not None:
91
+ pulumi.set(__self__, "application_id", application_id)
92
+
93
+ @property
94
+ @pulumi.getter(name="objectId")
95
+ def object_id(self) -> str:
96
+ """
97
+ The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
98
+ """
99
+ return pulumi.get(self, "object_id")
100
+
101
+ @property
102
+ @pulumi.getter
103
+ def permissions(self) -> 'outputs.Permissions':
104
+ """
105
+ Permissions the identity has for keys, secrets and certificates.
106
+ """
107
+ return pulumi.get(self, "permissions")
108
+
109
+ @property
110
+ @pulumi.getter(name="tenantId")
111
+ def tenant_id(self) -> str:
112
+ """
113
+ The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
114
+ """
115
+ return pulumi.get(self, "tenant_id")
116
+
117
+ @property
118
+ @pulumi.getter(name="applicationId")
119
+ def application_id(self) -> Optional[str]:
120
+ """
121
+ Application ID of the client making request on behalf of a principal
122
+ """
123
+ return pulumi.get(self, "application_id")
124
+
125
+
47
126
  @pulumi.output_type
48
127
  class AccessPolicyEntryResponse(dict):
49
128
  """
@@ -1167,6 +1246,65 @@ class NetworkRuleSetResponse(dict):
1167
1246
  return pulumi.get(self, "virtual_network_rules")
1168
1247
 
1169
1248
 
1249
+ @pulumi.output_type
1250
+ class Permissions(dict):
1251
+ """
1252
+ Permissions the identity has for keys, secrets, certificates and storage.
1253
+ """
1254
+ def __init__(__self__, *,
1255
+ certificates: Optional[Sequence[str]] = None,
1256
+ keys: Optional[Sequence[str]] = None,
1257
+ secrets: Optional[Sequence[str]] = None,
1258
+ storage: Optional[Sequence[str]] = None):
1259
+ """
1260
+ Permissions the identity has for keys, secrets, certificates and storage.
1261
+ :param Sequence[Union[str, 'CertificatePermissions']] certificates: Permissions to certificates
1262
+ :param Sequence[Union[str, 'KeyPermissions']] keys: Permissions to keys
1263
+ :param Sequence[Union[str, 'SecretPermissions']] secrets: Permissions to secrets
1264
+ :param Sequence[Union[str, 'StoragePermissions']] storage: Permissions to storage accounts
1265
+ """
1266
+ if certificates is not None:
1267
+ pulumi.set(__self__, "certificates", certificates)
1268
+ if keys is not None:
1269
+ pulumi.set(__self__, "keys", keys)
1270
+ if secrets is not None:
1271
+ pulumi.set(__self__, "secrets", secrets)
1272
+ if storage is not None:
1273
+ pulumi.set(__self__, "storage", storage)
1274
+
1275
+ @property
1276
+ @pulumi.getter
1277
+ def certificates(self) -> Optional[Sequence[str]]:
1278
+ """
1279
+ Permissions to certificates
1280
+ """
1281
+ return pulumi.get(self, "certificates")
1282
+
1283
+ @property
1284
+ @pulumi.getter
1285
+ def keys(self) -> Optional[Sequence[str]]:
1286
+ """
1287
+ Permissions to keys
1288
+ """
1289
+ return pulumi.get(self, "keys")
1290
+
1291
+ @property
1292
+ @pulumi.getter
1293
+ def secrets(self) -> Optional[Sequence[str]]:
1294
+ """
1295
+ Permissions to secrets
1296
+ """
1297
+ return pulumi.get(self, "secrets")
1298
+
1299
+ @property
1300
+ @pulumi.getter
1301
+ def storage(self) -> Optional[Sequence[str]]:
1302
+ """
1303
+ Permissions to storage accounts
1304
+ """
1305
+ return pulumi.get(self, "storage")
1306
+
1307
+
1170
1308
  @pulumi.output_type
1171
1309
  class PermissionsResponse(dict):
1172
1310
  """
@@ -1894,6 +2032,7 @@ class VaultPropertiesResponse(dict):
1894
2032
  :param 'SkuResponse' sku: SKU details
1895
2033
  :param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
1896
2034
  :param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
2035
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1897
2036
  :param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
1898
2037
  :param bool enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
1899
2038
  :param bool enable_soft_delete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
@@ -1980,6 +2119,7 @@ class VaultPropertiesResponse(dict):
1980
2119
  def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
1981
2120
  """
1982
2121
  An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
2122
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1983
2123
  """
1984
2124
  return pulumi.get(self, "access_policies")
1985
2125
 
@@ -1309,6 +1309,7 @@ class VaultPropertiesArgs:
1309
1309
  :param pulumi.Input['SkuArgs'] sku: SKU details
1310
1310
  :param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
1311
1311
  :param pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1312
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1312
1313
  :param pulumi.Input['CreateMode'] create_mode: The vault's create mode to indicate whether the vault need to be recovered or not.
1313
1314
  :param pulumi.Input[bool] enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
1314
1315
  :param pulumi.Input[bool] enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
@@ -1388,6 +1389,7 @@ class VaultPropertiesArgs:
1388
1389
  def access_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]]:
1389
1390
  """
1390
1391
  An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1392
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1391
1393
  """
1392
1394
  return pulumi.get(self, "access_policies")
1393
1395
 
@@ -1894,6 +1894,7 @@ class VaultPropertiesResponse(dict):
1894
1894
  :param 'SkuResponse' sku: SKU details
1895
1895
  :param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
1896
1896
  :param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1897
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1897
1898
  :param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
1898
1899
  :param bool enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
1899
1900
  :param bool enable_soft_delete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
@@ -1980,6 +1981,7 @@ class VaultPropertiesResponse(dict):
1980
1981
  def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
1981
1982
  """
1982
1983
  An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1984
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1983
1985
  """
1984
1986
  return pulumi.get(self, "access_policies")
1985
1987
 
@@ -1349,6 +1349,7 @@ class VaultPropertiesArgs:
1349
1349
  :param pulumi.Input['SkuArgs'] sku: SKU details
1350
1350
  :param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
1351
1351
  :param pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1352
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1352
1353
  :param pulumi.Input['CreateMode'] create_mode: The vault's create mode to indicate whether the vault need to be recovered or not.
1353
1354
  :param pulumi.Input[bool] enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
1354
1355
  :param pulumi.Input[bool] enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
@@ -1428,6 +1429,7 @@ class VaultPropertiesArgs:
1428
1429
  def access_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]]:
1429
1430
  """
1430
1431
  An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1432
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1431
1433
  """
1432
1434
  return pulumi.get(self, "access_policies")
1433
1435
 
@@ -2025,6 +2025,7 @@ class VaultPropertiesResponse(dict):
2025
2025
  :param 'SkuResponse' sku: SKU details
2026
2026
  :param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
2027
2027
  :param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
2028
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
2028
2029
  :param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
2029
2030
  :param bool enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
2030
2031
  :param bool enable_soft_delete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
@@ -2111,6 +2112,7 @@ class VaultPropertiesResponse(dict):
2111
2112
  def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
2112
2113
  """
2113
2114
  An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
2115
+ These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
2114
2116
  """
2115
2117
  return pulumi.get(self, "access_policies")
2116
2118
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_azure_native
3
- Version: 2.24.0
3
+ Version: 2.24.1a1704477298
4
4
  Summary: A native Pulumi package for creating and managing Azure resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.com
@@ -74,6 +74,12 @@ quality and higher fidelity with the Azure platform.
74
74
 
75
75
  To learn how to configure credentials refer to the [Azure configuration options](https://www.pulumi.com/registry/packages/azure-native/installation-configuration/#configuration-options).
76
76
 
77
+ ## Other Configuration
78
+
79
+ In addition to the configuration options in the official documentation linked above, the following environment variables can be used to tweak lower-level behavior of the provider:
80
+
81
+ - `PULUMI_FORCE_NEW_FROM_SUBTYPES`: if, after a change in your program, the provider does not replace a resource that should be replaced because it cannot be updated, setting this variable to `true` might allow the provider to infer the correct behavior. For more details please see PR #2970. We're planning to make this behavior the default in the future.
82
+
77
83
  ## Building
78
84
 
79
85
  See [contributing](CONTRIBUTING.md) for details on how to build and contribute to this provider.
@@ -1,4 +1,4 @@
1
- pulumi_azure_native/__init__.py,sha256=9kKkZnZ8-6uyxQb7-lmrXQHeo2sueRx1hEr79SAc93c,743924
1
+ pulumi_azure_native/__init__.py,sha256=RTNNiPhkg8BfGCyw21PB3FxHNlPKIgmbguRR6bDyIvU,743981
2
2
  pulumi_azure_native/_utilities.py,sha256=WjjUoMUWgEBJiE2KZ76Lihj4rx_1_v__96T1_-RwY0I,9231
3
3
  pulumi_azure_native/provider.py,sha256=LNUQF0if_Zo-PnKfRhLCMwTAj8sZScuh5SUu6m7_e3k,23122
4
4
  pulumi_azure_native/pulumi-plugin.json,sha256=V6SbnACkF8XN-KxV-K5PJhTTTqe9VRprRxzLHQ9nkO8,49
@@ -9372,9 +9372,10 @@ pulumi_azure_native/iotoperationsorchestrator/v20231004preview/instance.py,sha25
9372
9372
  pulumi_azure_native/iotoperationsorchestrator/v20231004preview/outputs.py,sha256=73MomPL6awjLy0E9XJK7vIPsKdWcXejdXXC8N4eFfuc,10645
9373
9373
  pulumi_azure_native/iotoperationsorchestrator/v20231004preview/solution.py,sha256=IBDFSzkUpldm_3B3wr2UAbHyv8_UfuELQb2SXJifCOI,13097
9374
9374
  pulumi_azure_native/iotoperationsorchestrator/v20231004preview/target.py,sha256=Km1QRbNgU6anMeBshTu8T_Hjp2a4ViRDNjF14nRbWIY,17293
9375
- pulumi_azure_native/keyvault/__init__.py,sha256=IsDl9_0McoyWMjRB-VugXactXalGnBaGsWCgqM8V4ro,1113
9375
+ pulumi_azure_native/keyvault/__init__.py,sha256=26dXKLZKcrlFO_I0bOcC9AJmV2GAcE9bTw4EC5mDUXE,1142
9376
9376
  pulumi_azure_native/keyvault/_enums.py,sha256=0R0h_sfeWKsD7zMW-V2pPXF1L7zG6HjLRH5o3xvmYoM,5399
9377
- pulumi_azure_native/keyvault/_inputs.py,sha256=qiRtaPU5SSQ58wmDwFA7hsiIzcfQ3ldj_dlHBKXYwoA,71533
9377
+ pulumi_azure_native/keyvault/_inputs.py,sha256=CVTYf4fhdxpG8qZr2k89hF-VCvoDpfQF88VjAHEVlTU,71880
9378
+ pulumi_azure_native/keyvault/access_policy.py,sha256=b63yqVVN89IJGfPGuFJO1X6VgoILcCMYjXnhts2DUZs,7487
9378
9379
  pulumi_azure_native/keyvault/get_key.py,sha256=l0Jhy95z5bdxs07lW9-OSShh5NHd_7sNuaEfqbPl3GE,9530
9379
9380
  pulumi_azure_native/keyvault/get_managed_hsm.py,sha256=WTF3HNt2b28vkBxpaiaHbAHXVfVaukPaE04Dh1F6vf0,5968
9380
9381
  pulumi_azure_native/keyvault/get_mhsm_private_endpoint_connection.py,sha256=TBlj2cvhcQT9LT420rUBZmrhQ82aw4iGzBaImjXHKrU,9119
@@ -9384,13 +9385,13 @@ pulumi_azure_native/keyvault/get_vault.py,sha256=rcQv0Bgpn1xAcOSBFr7VF7GWSZDsWkg
9384
9385
  pulumi_azure_native/keyvault/key.py,sha256=tIUXB7vXJVBNZwbrOBarqepXGYeU5WwuSZi6TIjrAGY,14249
9385
9386
  pulumi_azure_native/keyvault/managed_hsm.py,sha256=pxp43VHhVF0QMxXu7k6aYJtHaWBMLosQPUzYRFVYsaQ,12157
9386
9387
  pulumi_azure_native/keyvault/mhsm_private_endpoint_connection.py,sha256=w_TkbM26KQ4ATImxnrCi-gGhnWnsobrtnZdEgQh-Ynk,15829
9387
- pulumi_azure_native/keyvault/outputs.py,sha256=2rHtbxePWwJxMDXp3jXck4so5VSitQAiQjpwGbhFPWg,86409
9388
+ pulumi_azure_native/keyvault/outputs.py,sha256=qJ9bFtL8-9X6NfdBrcdRVt8lbXDS7h38kxsJr6tbqA0,91960
9388
9389
  pulumi_azure_native/keyvault/private_endpoint_connection.py,sha256=bfGrhpMf-WG-Wycx5DsbEctSLr1wqdSAcSuFwQcwi0Y,12821
9389
9390
  pulumi_azure_native/keyvault/secret.py,sha256=5cQDOIRD0hWKOa3kxMtzRJrFtqp9VuXJXD2ydvaaZvo,11499
9390
9391
  pulumi_azure_native/keyvault/vault.py,sha256=Z0aZzfyl1KLcEcwy7H8Nckfk3Oh1kLfY56OBsJ6Yuio,11412
9391
9392
  pulumi_azure_native/keyvault/v20230201/__init__.py,sha256=p2NBewW_qVLoI93T1icpgn9xDy16NtY3noUkbWMgIXc,703
9392
9393
  pulumi_azure_native/keyvault/v20230201/_enums.py,sha256=0R0h_sfeWKsD7zMW-V2pPXF1L7zG6HjLRH5o3xvmYoM,5399
9393
- pulumi_azure_native/keyvault/v20230201/_inputs.py,sha256=S-ROXjtudCFMoasdB1LkcIyu1QKKF6JyQUiBKX-GwkY,71534
9394
+ pulumi_azure_native/keyvault/v20230201/_inputs.py,sha256=pX01lBQvFhFIn-2O1GDVEpK_vKlE950ufIbJh-B7dbk,71881
9394
9395
  pulumi_azure_native/keyvault/v20230201/get_key.py,sha256=hJdie__SSYCm8Ocb5V_lA6WWptNQWE4ywDpJyg3pAH8,9367
9395
9396
  pulumi_azure_native/keyvault/v20230201/get_managed_hsm.py,sha256=tCAGjkztbRQdVmMX6HzprW6sfo_E6grlohDMQLLU1BQ,5805
9396
9397
  pulumi_azure_native/keyvault/v20230201/get_mhsm_private_endpoint_connection.py,sha256=ZjmS6mCt-8sL78gf2CdVmF3SMHdaT-qSapuL7E4q6JA,8956
@@ -9400,13 +9401,13 @@ pulumi_azure_native/keyvault/v20230201/get_vault.py,sha256=VAORp6PBUVVIx-Z83gZ_C
9400
9401
  pulumi_azure_native/keyvault/v20230201/key.py,sha256=y2YWVkdCi2YXtmgeAdo8_w4kpFALmIfmJW7GafX12ps,13958
9401
9402
  pulumi_azure_native/keyvault/v20230201/managed_hsm.py,sha256=HPF7LM0DpUwV5eJo6KWIUMOQGQ2B-Wt9e6IgJ7MpcAo,11850
9402
9403
  pulumi_azure_native/keyvault/v20230201/mhsm_private_endpoint_connection.py,sha256=_cfZZiWmf7e0qxT2IaZRu2ZvU_9HnWftWd91vYUoKNQ,15522
9403
- pulumi_azure_native/keyvault/v20230201/outputs.py,sha256=ilhh8WcXsyxWLl1cf7S9N1ZqkAy_Nyu5EUeVadwEAWM,86410
9404
+ pulumi_azure_native/keyvault/v20230201/outputs.py,sha256=5bCg_bmjKNnSOqbvoR4BwjXroct_inFz5-tCGKOYHks,86757
9404
9405
  pulumi_azure_native/keyvault/v20230201/private_endpoint_connection.py,sha256=TMbWucI74gx7Jy3ToA6fjQtEuKdsniGCleAT4zSeGj8,12530
9405
9406
  pulumi_azure_native/keyvault/v20230201/secret.py,sha256=avtZfiTZiprwb2MDZ2NqG6PqTyrrE1hQzwE1cLptSP0,11208
9406
9407
  pulumi_azure_native/keyvault/v20230201/vault.py,sha256=nfAVqnNsNJYGXvFrPxtQnhJdasf7Q-gL4FZSslOl_CY,11081
9407
9408
  pulumi_azure_native/keyvault/v20230701/__init__.py,sha256=p2NBewW_qVLoI93T1icpgn9xDy16NtY3noUkbWMgIXc,703
9408
9409
  pulumi_azure_native/keyvault/v20230701/_enums.py,sha256=iFdgoR7GSNKr5dqE4Rp5sf-eBZpJCHUKZBvgsxbeAQo,5544
9409
- pulumi_azure_native/keyvault/v20230701/_inputs.py,sha256=9BJkbJhJWKkVjF4mgCIo_jIOEe_r5yveIUa5Scb8R_0,73846
9410
+ pulumi_azure_native/keyvault/v20230701/_inputs.py,sha256=AQVmR8G0zLXYWPIoftmGNJEAVld6KaXbv_zi_rUKD6s,74193
9410
9411
  pulumi_azure_native/keyvault/v20230701/get_key.py,sha256=pVF2_wan-qrkHq1kA7nEaq9WJ1SO_Q-ntauVqSRDeKE,9367
9411
9412
  pulumi_azure_native/keyvault/v20230701/get_managed_hsm.py,sha256=ztHGlDuAAk0ab4HORcdIL-jPmLXIDLcSFSnO2LrSeMM,6349
9412
9413
  pulumi_azure_native/keyvault/v20230701/get_mhsm_private_endpoint_connection.py,sha256=jJ2s1cBRVtTlpvjhpHvrmXL_P_Cru-gG8Tj0vl1zYuc,9500
@@ -9416,7 +9417,7 @@ pulumi_azure_native/keyvault/v20230701/get_vault.py,sha256=fRSJJ0YK0jatcRRaiNUqB
9416
9417
  pulumi_azure_native/keyvault/v20230701/key.py,sha256=DXcLSb-Iiz0sXYkwBLmKGM5HK-boAN1vOHacd5XuhqE,13958
9417
9418
  pulumi_azure_native/keyvault/v20230701/managed_hsm.py,sha256=l7KhyFqT0xYG3mzcz3O8T9aUsieWun_mX8AnJhavRCo,13336
9418
9419
  pulumi_azure_native/keyvault/v20230701/mhsm_private_endpoint_connection.py,sha256=jGl-37SI3uGNKyJ_a3o9PFsAV2NXXZG-B1i9gxib4ZU,17008
9419
- pulumi_azure_native/keyvault/v20230701/outputs.py,sha256=BV9QwzXidAaPxuTH5_ZT3ZsrZc6pBPRfysY1dvOWGik,91855
9420
+ pulumi_azure_native/keyvault/v20230701/outputs.py,sha256=y4J1hfqrOjrbx8kRvsO0J0o_4E1JKx6kjfKXV4vq7Z0,92202
9420
9421
  pulumi_azure_native/keyvault/v20230701/private_endpoint_connection.py,sha256=YKhmVYi4EmGGNWP7eCUOgaUGcFo49RIf1wsNiHykI58,12530
9421
9422
  pulumi_azure_native/keyvault/v20230701/secret.py,sha256=ghp2SyKkY0ljEcA5-IhV3OwLX8LEl2y1bCb83yfsaP0,11208
9422
9423
  pulumi_azure_native/keyvault/v20230701/vault.py,sha256=3h79HjoTFjT2aaf2ghXFpw1fRl7RQcIEZk20xpeT1yE,11081
@@ -19606,7 +19607,7 @@ pulumi_azure_native/workloads/v20231001preview/sap_central_instance.py,sha256=Ke
19606
19607
  pulumi_azure_native/workloads/v20231001preview/sap_database_instance.py,sha256=-aR0aCgupI8LNymrLC6Llgkky68v4ZTd2mawd9Lj13U,13907
19607
19608
  pulumi_azure_native/workloads/v20231001preview/sap_landscape_monitor.py,sha256=kh_uPVrU8zJqqfe7v2--2sR1w5evu1dVlo0K44bTAQ0,11157
19608
19609
  pulumi_azure_native/workloads/v20231001preview/sap_virtual_instance.py,sha256=dMa-ylYX90O5UGT8A5yheKhQqS2_1pLbw3OhbgCfLMQ,24031
19609
- pulumi_azure_native-2.24.0.dist-info/METADATA,sha256=ck1S9GPsLl_z9KlZRU8wXQ8Vj1LynSfkG8QOztplCdU,3556
19610
- pulumi_azure_native-2.24.0.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
19611
- pulumi_azure_native-2.24.0.dist-info/top_level.txt,sha256=8Vl7910-df5jOZ9lvILrFhlMOEUrsaaX2dkztIt4Pkw,20
19612
- pulumi_azure_native-2.24.0.dist-info/RECORD,,
19610
+ pulumi_azure_native-2.24.1a1704477298.dist-info/METADATA,sha256=XGaYB0iJJ3B2yvXPdKelz231Wq4PAr6vuuuY6WoRhHg,4132
19611
+ pulumi_azure_native-2.24.1a1704477298.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
19612
+ pulumi_azure_native-2.24.1a1704477298.dist-info/top_level.txt,sha256=8Vl7910-df5jOZ9lvILrFhlMOEUrsaaX2dkztIt4Pkw,20
19613
+ pulumi_azure_native-2.24.1a1704477298.dist-info/RECORD,,