pulumi-azure-native 2.82.0a1736497599__py3-none-any.whl → 2.83.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-azure-native might be problematic. Click here for more details.
- pulumi_azure_native/__init__.py +73 -0
- pulumi_azure_native/azurestackhci/__init__.py +3 -0
- pulumi_azure_native/azurestackhci/gallery_image.py +3 -3
- pulumi_azure_native/azurestackhci/get_gallery_image.py +2 -2
- pulumi_azure_native/azurestackhci/get_guest_agent.py +2 -2
- pulumi_azure_native/azurestackhci/get_logical_network.py +2 -2
- pulumi_azure_native/azurestackhci/get_marketplace_gallery_image.py +2 -2
- pulumi_azure_native/azurestackhci/get_network_interface.py +2 -2
- pulumi_azure_native/azurestackhci/get_network_security_group.py +2 -2
- pulumi_azure_native/azurestackhci/get_security_rule.py +2 -2
- pulumi_azure_native/azurestackhci/get_storage_container.py +2 -2
- pulumi_azure_native/azurestackhci/get_virtual_hard_disk.py +2 -2
- pulumi_azure_native/azurestackhci/get_virtual_machine_instance.py +2 -2
- pulumi_azure_native/azurestackhci/guest_agent.py +2 -2
- pulumi_azure_native/azurestackhci/logical_network.py +3 -3
- pulumi_azure_native/azurestackhci/marketplace_gallery_image.py +3 -3
- pulumi_azure_native/azurestackhci/network_interface.py +3 -3
- pulumi_azure_native/azurestackhci/network_security_group.py +3 -3
- pulumi_azure_native/azurestackhci/security_rule.py +3 -3
- pulumi_azure_native/azurestackhci/storage_container.py +3 -3
- pulumi_azure_native/azurestackhci/v20210901preview/galleryimage_retrieve.py +1 -1
- pulumi_azure_native/azurestackhci/v20210901preview/marketplacegalleryimage.py +1 -1
- pulumi_azure_native/azurestackhci/v20210901preview/networkinterface_retrieve.py +1 -1
- pulumi_azure_native/azurestackhci/v20210901preview/storagecontainer_retrieve.py +1 -1
- pulumi_azure_native/azurestackhci/v20210901preview/virtualharddisk_retrieve.py +1 -1
- pulumi_azure_native/azurestackhci/v20221215preview/gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20221215preview/marketplace_gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20221215preview/network_interface.py +1 -1
- pulumi_azure_native/azurestackhci/v20221215preview/storage_container.py +1 -1
- pulumi_azure_native/azurestackhci/v20221215preview/virtual_hard_disk.py +1 -1
- pulumi_azure_native/azurestackhci/v20230701preview/gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20230701preview/guest_agent.py +1 -1
- pulumi_azure_native/azurestackhci/v20230701preview/marketplace_gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20230701preview/network_interface.py +1 -1
- pulumi_azure_native/azurestackhci/v20230701preview/storage_container.py +1 -1
- pulumi_azure_native/azurestackhci/v20230701preview/virtual_hard_disk.py +1 -1
- pulumi_azure_native/azurestackhci/v20230701preview/virtual_machine_instance.py +1 -1
- pulumi_azure_native/azurestackhci/v20230901preview/gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20230901preview/guest_agent.py +1 -1
- pulumi_azure_native/azurestackhci/v20230901preview/logical_network.py +1 -1
- pulumi_azure_native/azurestackhci/v20230901preview/marketplace_gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20230901preview/network_interface.py +1 -1
- pulumi_azure_native/azurestackhci/v20230901preview/storage_container.py +1 -1
- pulumi_azure_native/azurestackhci/v20230901preview/virtual_hard_disk.py +1 -1
- pulumi_azure_native/azurestackhci/v20230901preview/virtual_machine_instance.py +1 -1
- pulumi_azure_native/azurestackhci/v20240101/gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240101/guest_agent.py +1 -1
- pulumi_azure_native/azurestackhci/v20240101/logical_network.py +1 -1
- pulumi_azure_native/azurestackhci/v20240101/marketplace_gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240101/network_interface.py +1 -1
- pulumi_azure_native/azurestackhci/v20240101/storage_container.py +1 -1
- pulumi_azure_native/azurestackhci/v20240101/virtual_hard_disk.py +1 -1
- pulumi_azure_native/azurestackhci/v20240101/virtual_machine_instance.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/guest_agent.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/logical_network.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/marketplace_gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/network_interface.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/network_security_group.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/security_rule.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/storage_container.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/virtual_hard_disk.py +1 -1
- pulumi_azure_native/azurestackhci/v20240201preview/virtual_machine_instance.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/guest_agent.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/logical_network.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/marketplace_gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/network_interface.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/network_security_group.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/security_rule.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/storage_container.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/virtual_hard_disk.py +1 -1
- pulumi_azure_native/azurestackhci/v20240501preview/virtual_machine_instance.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/guest_agent.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/logical_network.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/marketplace_gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/network_interface.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/network_security_group.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/security_rule.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/storage_container.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/virtual_hard_disk.py +1 -1
- pulumi_azure_native/azurestackhci/v20240715preview/virtual_machine_instance.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/guest_agent.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/logical_network.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/marketplace_gallery_image.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/network_interface.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/network_security_group.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/security_rule.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/storage_container.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/virtual_hard_disk.py +1 -1
- pulumi_azure_native/azurestackhci/v20240801preview/virtual_machine_instance.py +1 -1
- pulumi_azure_native/azurestackhci/v20241001preview/__init__.py +30 -0
- pulumi_azure_native/azurestackhci/v20241001preview/_enums.py +332 -0
- pulumi_azure_native/azurestackhci/v20241001preview/_inputs.py +2417 -0
- pulumi_azure_native/azurestackhci/v20241001preview/gallery_image.py +540 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_gallery_image.py +325 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_guest_agent.py +179 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_logical_network.py +241 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_marketplace_gallery_image.py +283 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_network_interface.py +255 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_network_security_group.py +227 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_security_rule.py +289 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_storage_container.py +213 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_virtual_hard_disk.py +325 -0
- pulumi_azure_native/azurestackhci/v20241001preview/get_virtual_machine_instance.py +319 -0
- pulumi_azure_native/azurestackhci/v20241001preview/guest_agent.py +229 -0
- pulumi_azure_native/azurestackhci/v20241001preview/logical_network.py +365 -0
- pulumi_azure_native/azurestackhci/v20241001preview/marketplace_gallery_image.py +453 -0
- pulumi_azure_native/azurestackhci/v20241001preview/network_interface.py +394 -0
- pulumi_azure_native/azurestackhci/v20241001preview/network_security_group.py +298 -0
- pulumi_azure_native/azurestackhci/v20241001preview/outputs.py +3941 -0
- pulumi_azure_native/azurestackhci/v20241001preview/security_rule.py +496 -0
- pulumi_azure_native/azurestackhci/v20241001preview/storage_container.py +308 -0
- pulumi_azure_native/azurestackhci/v20241001preview/virtual_hard_disk.py +539 -0
- pulumi_azure_native/azurestackhci/v20241001preview/virtual_machine_instance.py +462 -0
- pulumi_azure_native/azurestackhci/virtual_hard_disk.py +3 -3
- pulumi_azure_native/azurestackhci/virtual_machine_instance.py +3 -3
- pulumi_azure_native/batch/v20240701/_enums.py +1 -1
- pulumi_azure_native/batch/v20240701/_inputs.py +12 -12
- pulumi_azure_native/batch/v20240701/get_pool.py +1 -1
- pulumi_azure_native/batch/v20240701/outputs.py +8 -8
- pulumi_azure_native/batch/v20240701/pool.py +4 -4
- pulumi_azure_native/databasewatcher/__init__.py +3 -0
- pulumi_azure_native/databasewatcher/_inputs.py +6 -6
- pulumi_azure_native/databasewatcher/alert_rule_resource.py +3 -3
- pulumi_azure_native/databasewatcher/get_alert_rule_resource.py +2 -2
- pulumi_azure_native/databasewatcher/get_shared_private_link_resource.py +3 -3
- pulumi_azure_native/databasewatcher/get_target.py +2 -2
- pulumi_azure_native/databasewatcher/get_watcher.py +2 -2
- pulumi_azure_native/databasewatcher/outputs.py +4 -4
- pulumi_azure_native/databasewatcher/shared_private_link_resource.py +7 -7
- pulumi_azure_native/databasewatcher/target.py +3 -3
- pulumi_azure_native/databasewatcher/v20230901preview/_inputs.py +6 -6
- pulumi_azure_native/databasewatcher/v20230901preview/get_shared_private_link_resource.py +1 -1
- pulumi_azure_native/databasewatcher/v20230901preview/outputs.py +4 -4
- pulumi_azure_native/databasewatcher/v20230901preview/shared_private_link_resource.py +5 -5
- pulumi_azure_native/databasewatcher/v20230901preview/target.py +1 -1
- pulumi_azure_native/databasewatcher/v20230901preview/watcher.py +1 -1
- pulumi_azure_native/databasewatcher/v20240719preview/_inputs.py +6 -6
- pulumi_azure_native/databasewatcher/v20240719preview/alert_rule_resource.py +1 -1
- pulumi_azure_native/databasewatcher/v20240719preview/get_shared_private_link_resource.py +1 -1
- pulumi_azure_native/databasewatcher/v20240719preview/outputs.py +4 -4
- pulumi_azure_native/databasewatcher/v20240719preview/shared_private_link_resource.py +5 -5
- pulumi_azure_native/databasewatcher/v20240719preview/target.py +1 -1
- pulumi_azure_native/databasewatcher/v20240719preview/watcher.py +1 -1
- pulumi_azure_native/databasewatcher/v20241001preview/_inputs.py +6 -6
- pulumi_azure_native/databasewatcher/v20241001preview/alert_rule_resource.py +1 -1
- pulumi_azure_native/databasewatcher/v20241001preview/get_shared_private_link_resource.py +1 -1
- pulumi_azure_native/databasewatcher/v20241001preview/outputs.py +4 -4
- pulumi_azure_native/databasewatcher/v20241001preview/shared_private_link_resource.py +5 -5
- pulumi_azure_native/databasewatcher/v20241001preview/target.py +1 -1
- pulumi_azure_native/databasewatcher/v20241001preview/watcher.py +1 -1
- pulumi_azure_native/databasewatcher/v20250102/__init__.py +18 -0
- pulumi_azure_native/databasewatcher/v20250102/_enums.py +68 -0
- pulumi_azure_native/databasewatcher/v20250102/_inputs.py +310 -0
- pulumi_azure_native/databasewatcher/v20250102/alert_rule_resource.py +351 -0
- pulumi_azure_native/databasewatcher/v20250102/get_alert_rule_resource.py +219 -0
- pulumi_azure_native/databasewatcher/v20250102/get_shared_private_link_resource.py +219 -0
- pulumi_azure_native/databasewatcher/v20250102/get_target.py +205 -0
- pulumi_azure_native/databasewatcher/v20250102/get_watcher.py +227 -0
- pulumi_azure_native/databasewatcher/v20250102/outputs.py +452 -0
- pulumi_azure_native/databasewatcher/v20250102/shared_private_link_resource.py +329 -0
- pulumi_azure_native/databasewatcher/v20250102/target.py +321 -0
- pulumi_azure_native/databasewatcher/v20250102/watcher.py +336 -0
- pulumi_azure_native/databasewatcher/watcher.py +3 -3
- pulumi_azure_native/keyvault/__init__.py +6 -0
- pulumi_azure_native/keyvault/get_key.py +2 -2
- pulumi_azure_native/keyvault/get_managed_hsm.py +2 -2
- pulumi_azure_native/keyvault/get_mhsm_private_endpoint_connection.py +2 -2
- pulumi_azure_native/keyvault/get_private_endpoint_connection.py +2 -2
- pulumi_azure_native/keyvault/get_secret.py +2 -2
- pulumi_azure_native/keyvault/get_vault.py +2 -2
- pulumi_azure_native/keyvault/key.py +3 -3
- pulumi_azure_native/keyvault/managed_hsm.py +3 -3
- pulumi_azure_native/keyvault/mhsm_private_endpoint_connection.py +3 -3
- pulumi_azure_native/keyvault/private_endpoint_connection.py +3 -3
- pulumi_azure_native/keyvault/secret.py +3 -3
- pulumi_azure_native/keyvault/v20230201/key.py +1 -1
- pulumi_azure_native/keyvault/v20230201/managed_hsm.py +1 -1
- pulumi_azure_native/keyvault/v20230201/mhsm_private_endpoint_connection.py +1 -1
- pulumi_azure_native/keyvault/v20230201/private_endpoint_connection.py +1 -1
- pulumi_azure_native/keyvault/v20230201/secret.py +1 -1
- pulumi_azure_native/keyvault/v20230201/vault.py +1 -1
- pulumi_azure_native/keyvault/v20230701/key.py +1 -1
- pulumi_azure_native/keyvault/v20230701/managed_hsm.py +1 -1
- pulumi_azure_native/keyvault/v20230701/mhsm_private_endpoint_connection.py +1 -1
- pulumi_azure_native/keyvault/v20230701/private_endpoint_connection.py +1 -1
- pulumi_azure_native/keyvault/v20230701/secret.py +1 -1
- pulumi_azure_native/keyvault/v20230701/vault.py +1 -1
- pulumi_azure_native/keyvault/v20240401preview/key.py +1 -1
- pulumi_azure_native/keyvault/v20240401preview/managed_hsm.py +1 -1
- pulumi_azure_native/keyvault/v20240401preview/mhsm_private_endpoint_connection.py +1 -1
- pulumi_azure_native/keyvault/v20240401preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/keyvault/v20240401preview/secret.py +1 -1
- pulumi_azure_native/keyvault/v20240401preview/vault.py +1 -1
- pulumi_azure_native/keyvault/v20241101/__init__.py +22 -0
- pulumi_azure_native/keyvault/v20241101/_enums.py +245 -0
- pulumi_azure_native/keyvault/v20241101/_inputs.py +2194 -0
- pulumi_azure_native/keyvault/v20241101/get_key.py +272 -0
- pulumi_azure_native/keyvault/v20241101/get_managed_hsm.py +199 -0
- pulumi_azure_native/keyvault/v20241101/get_mhsm_private_endpoint_connection.py +247 -0
- pulumi_azure_native/keyvault/v20241101/get_private_endpoint_connection.py +205 -0
- pulumi_azure_native/keyvault/v20241101/get_secret.py +163 -0
- pulumi_azure_native/keyvault/v20241101/get_vault.py +171 -0
- pulumi_azure_native/keyvault/v20241101/key.py +329 -0
- pulumi_azure_native/keyvault/v20241101/managed_hsm.py +315 -0
- pulumi_azure_native/keyvault/v20241101/mhsm_private_endpoint_connection.py +366 -0
- pulumi_azure_native/keyvault/v20241101/outputs.py +2269 -0
- pulumi_azure_native/keyvault/v20241101/private_endpoint_connection.py +261 -0
- pulumi_azure_native/keyvault/v20241101/secret.py +250 -0
- pulumi_azure_native/keyvault/v20241101/vault.py +259 -0
- pulumi_azure_native/keyvault/v20241201preview/__init__.py +22 -0
- pulumi_azure_native/keyvault/v20241201preview/_enums.py +245 -0
- pulumi_azure_native/keyvault/v20241201preview/_inputs.py +2194 -0
- pulumi_azure_native/keyvault/v20241201preview/get_key.py +272 -0
- pulumi_azure_native/keyvault/v20241201preview/get_managed_hsm.py +199 -0
- pulumi_azure_native/keyvault/v20241201preview/get_mhsm_private_endpoint_connection.py +247 -0
- pulumi_azure_native/keyvault/v20241201preview/get_private_endpoint_connection.py +205 -0
- pulumi_azure_native/keyvault/v20241201preview/get_secret.py +163 -0
- pulumi_azure_native/keyvault/v20241201preview/get_vault.py +171 -0
- pulumi_azure_native/keyvault/v20241201preview/key.py +329 -0
- pulumi_azure_native/keyvault/v20241201preview/managed_hsm.py +315 -0
- pulumi_azure_native/keyvault/v20241201preview/mhsm_private_endpoint_connection.py +366 -0
- pulumi_azure_native/keyvault/v20241201preview/outputs.py +2269 -0
- pulumi_azure_native/keyvault/v20241201preview/private_endpoint_connection.py +261 -0
- pulumi_azure_native/keyvault/v20241201preview/secret.py +250 -0
- pulumi_azure_native/keyvault/v20241201preview/vault.py +259 -0
- pulumi_azure_native/keyvault/vault.py +3 -3
- pulumi_azure_native/network/ipam_pool.py +17 -16
- pulumi_azure_native/network/v20240101preview/ipam_pool.py +17 -16
- pulumi_azure_native/pulumi-plugin.json +1 -1
- pulumi_azure_native/quota/__init__.py +3 -0
- pulumi_azure_native/quota/get_group_quota.py +2 -2
- pulumi_azure_native/quota/get_group_quota_subscription.py +2 -2
- pulumi_azure_native/quota/group_quota.py +3 -3
- pulumi_azure_native/quota/group_quota_subscription.py +3 -3
- pulumi_azure_native/quota/v20230601preview/group_quota.py +1 -1
- pulumi_azure_native/quota/v20230601preview/group_quota_subscription.py +1 -1
- pulumi_azure_native/quota/v20241015preview/group_quota.py +1 -1
- pulumi_azure_native/quota/v20241015preview/group_quota_subscription.py +1 -1
- pulumi_azure_native/quota/v20241218preview/group_quota.py +1 -1
- pulumi_azure_native/quota/v20241218preview/group_quota_subscription.py +1 -1
- pulumi_azure_native/quota/v20250301/__init__.py +13 -0
- pulumi_azure_native/quota/v20250301/_inputs.py +55 -0
- pulumi_azure_native/quota/v20250301/get_group_quota.py +140 -0
- pulumi_azure_native/quota/v20250301/get_group_quota_subscription.py +140 -0
- pulumi_azure_native/quota/v20250301/group_quota.py +191 -0
- pulumi_azure_native/quota/v20250301/group_quota_subscription.py +177 -0
- pulumi_azure_native/quota/v20250301/outputs.py +230 -0
- pulumi_azure_native/search/__init__.py +3 -0
- pulumi_azure_native/search/get_private_endpoint_connection.py +2 -2
- pulumi_azure_native/search/get_service.py +2 -2
- pulumi_azure_native/search/get_shared_private_link_resource.py +2 -2
- pulumi_azure_native/search/list_admin_key.py +2 -2
- pulumi_azure_native/search/list_query_key_by_search_service.py +2 -2
- pulumi_azure_native/search/private_endpoint_connection.py +3 -3
- pulumi_azure_native/search/service.py +3 -3
- pulumi_azure_native/search/shared_private_link_resource.py +3 -3
- pulumi_azure_native/search/v20210401preview/service.py +1 -1
- pulumi_azure_native/search/v20220901/private_endpoint_connection.py +1 -1
- pulumi_azure_native/search/v20220901/service.py +1 -1
- pulumi_azure_native/search/v20220901/shared_private_link_resource.py +1 -1
- pulumi_azure_native/search/v20231101/private_endpoint_connection.py +1 -1
- pulumi_azure_native/search/v20231101/service.py +1 -1
- pulumi_azure_native/search/v20231101/shared_private_link_resource.py +1 -1
- pulumi_azure_native/search/v20240301preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/search/v20240301preview/service.py +1 -1
- pulumi_azure_native/search/v20240301preview/shared_private_link_resource.py +1 -1
- pulumi_azure_native/search/v20240601preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/search/v20240601preview/service.py +1 -1
- pulumi_azure_native/search/v20240601preview/shared_private_link_resource.py +1 -1
- pulumi_azure_native/search/v20250201preview/__init__.py +18 -0
- pulumi_azure_native/search/v20250201preview/_enums.py +298 -0
- pulumi_azure_native/search/v20250201preview/_inputs.py +701 -0
- pulumi_azure_native/search/v20250201preview/get_private_endpoint_connection.py +135 -0
- pulumi_azure_native/search/v20250201preview/get_service.py +465 -0
- pulumi_azure_native/search/v20250201preview/get_shared_private_link_resource.py +135 -0
- pulumi_azure_native/search/v20250201preview/list_admin_key.py +100 -0
- pulumi_azure_native/search/v20250201preview/list_query_key_by_search_service.py +101 -0
- pulumi_azure_native/search/v20250201preview/outputs.py +943 -0
- pulumi_azure_native/search/v20250201preview/private_endpoint_connection.py +211 -0
- pulumi_azure_native/search/v20250201preview/service.py +731 -0
- pulumi_azure_native/search/v20250201preview/shared_private_link_resource.py +211 -0
- {pulumi_azure_native-2.82.0a1736497599.dist-info → pulumi_azure_native-2.83.0.dist-info}/METADATA +1 -1
- {pulumi_azure_native-2.82.0a1736497599.dist-info → pulumi_azure_native-2.83.0.dist-info}/RECORD +289 -202
- {pulumi_azure_native-2.82.0a1736497599.dist-info → pulumi_azure_native-2.83.0.dist-info}/WHEEL +0 -0
- {pulumi_azure_native-2.82.0a1736497599.dist-info → pulumi_azure_native-2.83.0.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,2194 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import copy
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from ... import _utilities
|
|
16
|
+
from ._enums import *
|
|
17
|
+
|
|
18
|
+
__all__ = [
|
|
19
|
+
'AccessPolicyEntryArgs',
|
|
20
|
+
'AccessPolicyEntryArgsDict',
|
|
21
|
+
'ActionArgs',
|
|
22
|
+
'ActionArgsDict',
|
|
23
|
+
'IPRuleArgs',
|
|
24
|
+
'IPRuleArgsDict',
|
|
25
|
+
'KeyAttributesArgs',
|
|
26
|
+
'KeyAttributesArgsDict',
|
|
27
|
+
'KeyPropertiesArgs',
|
|
28
|
+
'KeyPropertiesArgsDict',
|
|
29
|
+
'KeyReleasePolicyArgs',
|
|
30
|
+
'KeyReleasePolicyArgsDict',
|
|
31
|
+
'KeyRotationPolicyAttributesArgs',
|
|
32
|
+
'KeyRotationPolicyAttributesArgsDict',
|
|
33
|
+
'LifetimeActionArgs',
|
|
34
|
+
'LifetimeActionArgsDict',
|
|
35
|
+
'MHSMGeoReplicatedRegionArgs',
|
|
36
|
+
'MHSMGeoReplicatedRegionArgsDict',
|
|
37
|
+
'MHSMIPRuleArgs',
|
|
38
|
+
'MHSMIPRuleArgsDict',
|
|
39
|
+
'MHSMNetworkRuleSetArgs',
|
|
40
|
+
'MHSMNetworkRuleSetArgsDict',
|
|
41
|
+
'MHSMPrivateLinkServiceConnectionStateArgs',
|
|
42
|
+
'MHSMPrivateLinkServiceConnectionStateArgsDict',
|
|
43
|
+
'MHSMVirtualNetworkRuleArgs',
|
|
44
|
+
'MHSMVirtualNetworkRuleArgsDict',
|
|
45
|
+
'ManagedHsmPropertiesArgs',
|
|
46
|
+
'ManagedHsmPropertiesArgsDict',
|
|
47
|
+
'ManagedHsmSkuArgs',
|
|
48
|
+
'ManagedHsmSkuArgsDict',
|
|
49
|
+
'ManagedServiceIdentityArgs',
|
|
50
|
+
'ManagedServiceIdentityArgsDict',
|
|
51
|
+
'NetworkRuleSetArgs',
|
|
52
|
+
'NetworkRuleSetArgsDict',
|
|
53
|
+
'PermissionsArgs',
|
|
54
|
+
'PermissionsArgsDict',
|
|
55
|
+
'PrivateLinkServiceConnectionStateArgs',
|
|
56
|
+
'PrivateLinkServiceConnectionStateArgsDict',
|
|
57
|
+
'RotationPolicyArgs',
|
|
58
|
+
'RotationPolicyArgsDict',
|
|
59
|
+
'SecretAttributesArgs',
|
|
60
|
+
'SecretAttributesArgsDict',
|
|
61
|
+
'SecretPropertiesArgs',
|
|
62
|
+
'SecretPropertiesArgsDict',
|
|
63
|
+
'SkuArgs',
|
|
64
|
+
'SkuArgsDict',
|
|
65
|
+
'TriggerArgs',
|
|
66
|
+
'TriggerArgsDict',
|
|
67
|
+
'VaultPropertiesArgs',
|
|
68
|
+
'VaultPropertiesArgsDict',
|
|
69
|
+
'VirtualNetworkRuleArgs',
|
|
70
|
+
'VirtualNetworkRuleArgsDict',
|
|
71
|
+
]
|
|
72
|
+
|
|
73
|
+
MYPY = False
|
|
74
|
+
|
|
75
|
+
if not MYPY:
|
|
76
|
+
class AccessPolicyEntryArgsDict(TypedDict):
|
|
77
|
+
"""
|
|
78
|
+
An identity that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID.
|
|
79
|
+
"""
|
|
80
|
+
object_id: pulumi.Input[str]
|
|
81
|
+
"""
|
|
82
|
+
The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
|
|
83
|
+
"""
|
|
84
|
+
permissions: pulumi.Input['PermissionsArgsDict']
|
|
85
|
+
"""
|
|
86
|
+
Permissions the identity has for keys, secrets and certificates.
|
|
87
|
+
"""
|
|
88
|
+
tenant_id: pulumi.Input[str]
|
|
89
|
+
"""
|
|
90
|
+
The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
91
|
+
"""
|
|
92
|
+
application_id: NotRequired[pulumi.Input[str]]
|
|
93
|
+
"""
|
|
94
|
+
Application ID of the client making request on behalf of a principal
|
|
95
|
+
"""
|
|
96
|
+
elif False:
|
|
97
|
+
AccessPolicyEntryArgsDict: TypeAlias = Mapping[str, Any]
|
|
98
|
+
|
|
99
|
+
@pulumi.input_type
|
|
100
|
+
class AccessPolicyEntryArgs:
|
|
101
|
+
def __init__(__self__, *,
|
|
102
|
+
object_id: pulumi.Input[str],
|
|
103
|
+
permissions: pulumi.Input['PermissionsArgs'],
|
|
104
|
+
tenant_id: pulumi.Input[str],
|
|
105
|
+
application_id: Optional[pulumi.Input[str]] = None):
|
|
106
|
+
"""
|
|
107
|
+
An identity that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID.
|
|
108
|
+
:param pulumi.Input[str] object_id: The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
|
|
109
|
+
:param pulumi.Input['PermissionsArgs'] permissions: Permissions the identity has for keys, secrets and certificates.
|
|
110
|
+
:param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
111
|
+
:param pulumi.Input[str] application_id: Application ID of the client making request on behalf of a principal
|
|
112
|
+
"""
|
|
113
|
+
pulumi.set(__self__, "object_id", object_id)
|
|
114
|
+
pulumi.set(__self__, "permissions", permissions)
|
|
115
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
116
|
+
if application_id is not None:
|
|
117
|
+
pulumi.set(__self__, "application_id", application_id)
|
|
118
|
+
|
|
119
|
+
@property
|
|
120
|
+
@pulumi.getter(name="objectId")
|
|
121
|
+
def object_id(self) -> pulumi.Input[str]:
|
|
122
|
+
"""
|
|
123
|
+
The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
|
|
124
|
+
"""
|
|
125
|
+
return pulumi.get(self, "object_id")
|
|
126
|
+
|
|
127
|
+
@object_id.setter
|
|
128
|
+
def object_id(self, value: pulumi.Input[str]):
|
|
129
|
+
pulumi.set(self, "object_id", value)
|
|
130
|
+
|
|
131
|
+
@property
|
|
132
|
+
@pulumi.getter
|
|
133
|
+
def permissions(self) -> pulumi.Input['PermissionsArgs']:
|
|
134
|
+
"""
|
|
135
|
+
Permissions the identity has for keys, secrets and certificates.
|
|
136
|
+
"""
|
|
137
|
+
return pulumi.get(self, "permissions")
|
|
138
|
+
|
|
139
|
+
@permissions.setter
|
|
140
|
+
def permissions(self, value: pulumi.Input['PermissionsArgs']):
|
|
141
|
+
pulumi.set(self, "permissions", value)
|
|
142
|
+
|
|
143
|
+
@property
|
|
144
|
+
@pulumi.getter(name="tenantId")
|
|
145
|
+
def tenant_id(self) -> pulumi.Input[str]:
|
|
146
|
+
"""
|
|
147
|
+
The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
148
|
+
"""
|
|
149
|
+
return pulumi.get(self, "tenant_id")
|
|
150
|
+
|
|
151
|
+
@tenant_id.setter
|
|
152
|
+
def tenant_id(self, value: pulumi.Input[str]):
|
|
153
|
+
pulumi.set(self, "tenant_id", value)
|
|
154
|
+
|
|
155
|
+
@property
|
|
156
|
+
@pulumi.getter(name="applicationId")
|
|
157
|
+
def application_id(self) -> Optional[pulumi.Input[str]]:
|
|
158
|
+
"""
|
|
159
|
+
Application ID of the client making request on behalf of a principal
|
|
160
|
+
"""
|
|
161
|
+
return pulumi.get(self, "application_id")
|
|
162
|
+
|
|
163
|
+
@application_id.setter
|
|
164
|
+
def application_id(self, value: Optional[pulumi.Input[str]]):
|
|
165
|
+
pulumi.set(self, "application_id", value)
|
|
166
|
+
|
|
167
|
+
|
|
168
|
+
if not MYPY:
|
|
169
|
+
class ActionArgsDict(TypedDict):
|
|
170
|
+
type: NotRequired[pulumi.Input['KeyRotationPolicyActionType']]
|
|
171
|
+
"""
|
|
172
|
+
The type of action.
|
|
173
|
+
"""
|
|
174
|
+
elif False:
|
|
175
|
+
ActionArgsDict: TypeAlias = Mapping[str, Any]
|
|
176
|
+
|
|
177
|
+
@pulumi.input_type
|
|
178
|
+
class ActionArgs:
|
|
179
|
+
def __init__(__self__, *,
|
|
180
|
+
type: Optional[pulumi.Input['KeyRotationPolicyActionType']] = None):
|
|
181
|
+
"""
|
|
182
|
+
:param pulumi.Input['KeyRotationPolicyActionType'] type: The type of action.
|
|
183
|
+
"""
|
|
184
|
+
if type is not None:
|
|
185
|
+
pulumi.set(__self__, "type", type)
|
|
186
|
+
|
|
187
|
+
@property
|
|
188
|
+
@pulumi.getter
|
|
189
|
+
def type(self) -> Optional[pulumi.Input['KeyRotationPolicyActionType']]:
|
|
190
|
+
"""
|
|
191
|
+
The type of action.
|
|
192
|
+
"""
|
|
193
|
+
return pulumi.get(self, "type")
|
|
194
|
+
|
|
195
|
+
@type.setter
|
|
196
|
+
def type(self, value: Optional[pulumi.Input['KeyRotationPolicyActionType']]):
|
|
197
|
+
pulumi.set(self, "type", value)
|
|
198
|
+
|
|
199
|
+
|
|
200
|
+
if not MYPY:
|
|
201
|
+
class IPRuleArgsDict(TypedDict):
|
|
202
|
+
"""
|
|
203
|
+
A rule governing the accessibility of a vault from a specific ip address or ip range.
|
|
204
|
+
"""
|
|
205
|
+
value: pulumi.Input[str]
|
|
206
|
+
"""
|
|
207
|
+
An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all addresses that start with 124.56.78).
|
|
208
|
+
"""
|
|
209
|
+
elif False:
|
|
210
|
+
IPRuleArgsDict: TypeAlias = Mapping[str, Any]
|
|
211
|
+
|
|
212
|
+
@pulumi.input_type
|
|
213
|
+
class IPRuleArgs:
|
|
214
|
+
def __init__(__self__, *,
|
|
215
|
+
value: pulumi.Input[str]):
|
|
216
|
+
"""
|
|
217
|
+
A rule governing the accessibility of a vault from a specific ip address or ip range.
|
|
218
|
+
:param pulumi.Input[str] value: An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all addresses that start with 124.56.78).
|
|
219
|
+
"""
|
|
220
|
+
pulumi.set(__self__, "value", value)
|
|
221
|
+
|
|
222
|
+
@property
|
|
223
|
+
@pulumi.getter
|
|
224
|
+
def value(self) -> pulumi.Input[str]:
|
|
225
|
+
"""
|
|
226
|
+
An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all addresses that start with 124.56.78).
|
|
227
|
+
"""
|
|
228
|
+
return pulumi.get(self, "value")
|
|
229
|
+
|
|
230
|
+
@value.setter
|
|
231
|
+
def value(self, value: pulumi.Input[str]):
|
|
232
|
+
pulumi.set(self, "value", value)
|
|
233
|
+
|
|
234
|
+
|
|
235
|
+
if not MYPY:
|
|
236
|
+
class KeyAttributesArgsDict(TypedDict):
|
|
237
|
+
"""
|
|
238
|
+
The object attributes managed by the Azure Key Vault service.
|
|
239
|
+
"""
|
|
240
|
+
enabled: NotRequired[pulumi.Input[bool]]
|
|
241
|
+
"""
|
|
242
|
+
Determines whether or not the object is enabled.
|
|
243
|
+
"""
|
|
244
|
+
expires: NotRequired[pulumi.Input[float]]
|
|
245
|
+
"""
|
|
246
|
+
Expiry date in seconds since 1970-01-01T00:00:00Z.
|
|
247
|
+
"""
|
|
248
|
+
exportable: NotRequired[pulumi.Input[bool]]
|
|
249
|
+
"""
|
|
250
|
+
Indicates if the private key can be exported.
|
|
251
|
+
"""
|
|
252
|
+
not_before: NotRequired[pulumi.Input[float]]
|
|
253
|
+
"""
|
|
254
|
+
Not before date in seconds since 1970-01-01T00:00:00Z.
|
|
255
|
+
"""
|
|
256
|
+
elif False:
|
|
257
|
+
KeyAttributesArgsDict: TypeAlias = Mapping[str, Any]
|
|
258
|
+
|
|
259
|
+
@pulumi.input_type
|
|
260
|
+
class KeyAttributesArgs:
|
|
261
|
+
def __init__(__self__, *,
|
|
262
|
+
enabled: Optional[pulumi.Input[bool]] = None,
|
|
263
|
+
expires: Optional[pulumi.Input[float]] = None,
|
|
264
|
+
exportable: Optional[pulumi.Input[bool]] = None,
|
|
265
|
+
not_before: Optional[pulumi.Input[float]] = None):
|
|
266
|
+
"""
|
|
267
|
+
The object attributes managed by the Azure Key Vault service.
|
|
268
|
+
:param pulumi.Input[bool] enabled: Determines whether or not the object is enabled.
|
|
269
|
+
:param pulumi.Input[float] expires: Expiry date in seconds since 1970-01-01T00:00:00Z.
|
|
270
|
+
:param pulumi.Input[bool] exportable: Indicates if the private key can be exported.
|
|
271
|
+
:param pulumi.Input[float] not_before: Not before date in seconds since 1970-01-01T00:00:00Z.
|
|
272
|
+
"""
|
|
273
|
+
if enabled is not None:
|
|
274
|
+
pulumi.set(__self__, "enabled", enabled)
|
|
275
|
+
if expires is not None:
|
|
276
|
+
pulumi.set(__self__, "expires", expires)
|
|
277
|
+
if exportable is None:
|
|
278
|
+
exportable = False
|
|
279
|
+
if exportable is not None:
|
|
280
|
+
pulumi.set(__self__, "exportable", exportable)
|
|
281
|
+
if not_before is not None:
|
|
282
|
+
pulumi.set(__self__, "not_before", not_before)
|
|
283
|
+
|
|
284
|
+
@property
|
|
285
|
+
@pulumi.getter
|
|
286
|
+
def enabled(self) -> Optional[pulumi.Input[bool]]:
|
|
287
|
+
"""
|
|
288
|
+
Determines whether or not the object is enabled.
|
|
289
|
+
"""
|
|
290
|
+
return pulumi.get(self, "enabled")
|
|
291
|
+
|
|
292
|
+
@enabled.setter
|
|
293
|
+
def enabled(self, value: Optional[pulumi.Input[bool]]):
|
|
294
|
+
pulumi.set(self, "enabled", value)
|
|
295
|
+
|
|
296
|
+
@property
|
|
297
|
+
@pulumi.getter
|
|
298
|
+
def expires(self) -> Optional[pulumi.Input[float]]:
|
|
299
|
+
"""
|
|
300
|
+
Expiry date in seconds since 1970-01-01T00:00:00Z.
|
|
301
|
+
"""
|
|
302
|
+
return pulumi.get(self, "expires")
|
|
303
|
+
|
|
304
|
+
@expires.setter
|
|
305
|
+
def expires(self, value: Optional[pulumi.Input[float]]):
|
|
306
|
+
pulumi.set(self, "expires", value)
|
|
307
|
+
|
|
308
|
+
@property
|
|
309
|
+
@pulumi.getter
|
|
310
|
+
def exportable(self) -> Optional[pulumi.Input[bool]]:
|
|
311
|
+
"""
|
|
312
|
+
Indicates if the private key can be exported.
|
|
313
|
+
"""
|
|
314
|
+
return pulumi.get(self, "exportable")
|
|
315
|
+
|
|
316
|
+
@exportable.setter
|
|
317
|
+
def exportable(self, value: Optional[pulumi.Input[bool]]):
|
|
318
|
+
pulumi.set(self, "exportable", value)
|
|
319
|
+
|
|
320
|
+
@property
|
|
321
|
+
@pulumi.getter(name="notBefore")
|
|
322
|
+
def not_before(self) -> Optional[pulumi.Input[float]]:
|
|
323
|
+
"""
|
|
324
|
+
Not before date in seconds since 1970-01-01T00:00:00Z.
|
|
325
|
+
"""
|
|
326
|
+
return pulumi.get(self, "not_before")
|
|
327
|
+
|
|
328
|
+
@not_before.setter
|
|
329
|
+
def not_before(self, value: Optional[pulumi.Input[float]]):
|
|
330
|
+
pulumi.set(self, "not_before", value)
|
|
331
|
+
|
|
332
|
+
|
|
333
|
+
if not MYPY:
|
|
334
|
+
class KeyPropertiesArgsDict(TypedDict):
|
|
335
|
+
"""
|
|
336
|
+
The properties of the key.
|
|
337
|
+
"""
|
|
338
|
+
attributes: NotRequired[pulumi.Input['KeyAttributesArgsDict']]
|
|
339
|
+
"""
|
|
340
|
+
The attributes of the key.
|
|
341
|
+
"""
|
|
342
|
+
curve_name: NotRequired[pulumi.Input[Union[str, 'JsonWebKeyCurveName']]]
|
|
343
|
+
"""
|
|
344
|
+
The elliptic curve name. For valid values, see JsonWebKeyCurveName. Default for EC and EC-HSM keys is P-256
|
|
345
|
+
"""
|
|
346
|
+
key_ops: NotRequired[pulumi.Input[Sequence[pulumi.Input[Union[str, 'JsonWebKeyOperation']]]]]
|
|
347
|
+
key_size: NotRequired[pulumi.Input[int]]
|
|
348
|
+
"""
|
|
349
|
+
The key size in bits. For example: 2048, 3072, or 4096 for RSA. Default for RSA and RSA-HSM keys is 2048. Exception made for bring your own key (BYOK), key exchange keys default to 4096.
|
|
350
|
+
"""
|
|
351
|
+
kty: NotRequired[pulumi.Input[Union[str, 'JsonWebKeyType']]]
|
|
352
|
+
"""
|
|
353
|
+
The type of the key. For valid values, see JsonWebKeyType.
|
|
354
|
+
"""
|
|
355
|
+
release_policy: NotRequired[pulumi.Input['KeyReleasePolicyArgsDict']]
|
|
356
|
+
"""
|
|
357
|
+
Key release policy in response. It will be used for both output and input. Omitted if empty
|
|
358
|
+
"""
|
|
359
|
+
rotation_policy: NotRequired[pulumi.Input['RotationPolicyArgsDict']]
|
|
360
|
+
"""
|
|
361
|
+
Key rotation policy in response. It will be used for both output and input. Omitted if empty
|
|
362
|
+
"""
|
|
363
|
+
elif False:
|
|
364
|
+
KeyPropertiesArgsDict: TypeAlias = Mapping[str, Any]
|
|
365
|
+
|
|
366
|
+
@pulumi.input_type
|
|
367
|
+
class KeyPropertiesArgs:
|
|
368
|
+
def __init__(__self__, *,
|
|
369
|
+
attributes: Optional[pulumi.Input['KeyAttributesArgs']] = None,
|
|
370
|
+
curve_name: Optional[pulumi.Input[Union[str, 'JsonWebKeyCurveName']]] = None,
|
|
371
|
+
key_ops: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'JsonWebKeyOperation']]]]] = None,
|
|
372
|
+
key_size: Optional[pulumi.Input[int]] = None,
|
|
373
|
+
kty: Optional[pulumi.Input[Union[str, 'JsonWebKeyType']]] = None,
|
|
374
|
+
release_policy: Optional[pulumi.Input['KeyReleasePolicyArgs']] = None,
|
|
375
|
+
rotation_policy: Optional[pulumi.Input['RotationPolicyArgs']] = None):
|
|
376
|
+
"""
|
|
377
|
+
The properties of the key.
|
|
378
|
+
:param pulumi.Input['KeyAttributesArgs'] attributes: The attributes of the key.
|
|
379
|
+
:param pulumi.Input[Union[str, 'JsonWebKeyCurveName']] curve_name: The elliptic curve name. For valid values, see JsonWebKeyCurveName. Default for EC and EC-HSM keys is P-256
|
|
380
|
+
:param pulumi.Input[int] key_size: The key size in bits. For example: 2048, 3072, or 4096 for RSA. Default for RSA and RSA-HSM keys is 2048. Exception made for bring your own key (BYOK), key exchange keys default to 4096.
|
|
381
|
+
:param pulumi.Input[Union[str, 'JsonWebKeyType']] kty: The type of the key. For valid values, see JsonWebKeyType.
|
|
382
|
+
:param pulumi.Input['KeyReleasePolicyArgs'] release_policy: Key release policy in response. It will be used for both output and input. Omitted if empty
|
|
383
|
+
:param pulumi.Input['RotationPolicyArgs'] rotation_policy: Key rotation policy in response. It will be used for both output and input. Omitted if empty
|
|
384
|
+
"""
|
|
385
|
+
if attributes is not None:
|
|
386
|
+
pulumi.set(__self__, "attributes", attributes)
|
|
387
|
+
if curve_name is not None:
|
|
388
|
+
pulumi.set(__self__, "curve_name", curve_name)
|
|
389
|
+
if key_ops is not None:
|
|
390
|
+
pulumi.set(__self__, "key_ops", key_ops)
|
|
391
|
+
if key_size is not None:
|
|
392
|
+
pulumi.set(__self__, "key_size", key_size)
|
|
393
|
+
if kty is not None:
|
|
394
|
+
pulumi.set(__self__, "kty", kty)
|
|
395
|
+
if release_policy is not None:
|
|
396
|
+
pulumi.set(__self__, "release_policy", release_policy)
|
|
397
|
+
if rotation_policy is not None:
|
|
398
|
+
pulumi.set(__self__, "rotation_policy", rotation_policy)
|
|
399
|
+
|
|
400
|
+
@property
|
|
401
|
+
@pulumi.getter
|
|
402
|
+
def attributes(self) -> Optional[pulumi.Input['KeyAttributesArgs']]:
|
|
403
|
+
"""
|
|
404
|
+
The attributes of the key.
|
|
405
|
+
"""
|
|
406
|
+
return pulumi.get(self, "attributes")
|
|
407
|
+
|
|
408
|
+
@attributes.setter
|
|
409
|
+
def attributes(self, value: Optional[pulumi.Input['KeyAttributesArgs']]):
|
|
410
|
+
pulumi.set(self, "attributes", value)
|
|
411
|
+
|
|
412
|
+
@property
|
|
413
|
+
@pulumi.getter(name="curveName")
|
|
414
|
+
def curve_name(self) -> Optional[pulumi.Input[Union[str, 'JsonWebKeyCurveName']]]:
|
|
415
|
+
"""
|
|
416
|
+
The elliptic curve name. For valid values, see JsonWebKeyCurveName. Default for EC and EC-HSM keys is P-256
|
|
417
|
+
"""
|
|
418
|
+
return pulumi.get(self, "curve_name")
|
|
419
|
+
|
|
420
|
+
@curve_name.setter
|
|
421
|
+
def curve_name(self, value: Optional[pulumi.Input[Union[str, 'JsonWebKeyCurveName']]]):
|
|
422
|
+
pulumi.set(self, "curve_name", value)
|
|
423
|
+
|
|
424
|
+
@property
|
|
425
|
+
@pulumi.getter(name="keyOps")
|
|
426
|
+
def key_ops(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'JsonWebKeyOperation']]]]]:
|
|
427
|
+
return pulumi.get(self, "key_ops")
|
|
428
|
+
|
|
429
|
+
@key_ops.setter
|
|
430
|
+
def key_ops(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'JsonWebKeyOperation']]]]]):
|
|
431
|
+
pulumi.set(self, "key_ops", value)
|
|
432
|
+
|
|
433
|
+
@property
|
|
434
|
+
@pulumi.getter(name="keySize")
|
|
435
|
+
def key_size(self) -> Optional[pulumi.Input[int]]:
|
|
436
|
+
"""
|
|
437
|
+
The key size in bits. For example: 2048, 3072, or 4096 for RSA. Default for RSA and RSA-HSM keys is 2048. Exception made for bring your own key (BYOK), key exchange keys default to 4096.
|
|
438
|
+
"""
|
|
439
|
+
return pulumi.get(self, "key_size")
|
|
440
|
+
|
|
441
|
+
@key_size.setter
|
|
442
|
+
def key_size(self, value: Optional[pulumi.Input[int]]):
|
|
443
|
+
pulumi.set(self, "key_size", value)
|
|
444
|
+
|
|
445
|
+
@property
|
|
446
|
+
@pulumi.getter
|
|
447
|
+
def kty(self) -> Optional[pulumi.Input[Union[str, 'JsonWebKeyType']]]:
|
|
448
|
+
"""
|
|
449
|
+
The type of the key. For valid values, see JsonWebKeyType.
|
|
450
|
+
"""
|
|
451
|
+
return pulumi.get(self, "kty")
|
|
452
|
+
|
|
453
|
+
@kty.setter
|
|
454
|
+
def kty(self, value: Optional[pulumi.Input[Union[str, 'JsonWebKeyType']]]):
|
|
455
|
+
pulumi.set(self, "kty", value)
|
|
456
|
+
|
|
457
|
+
@property
|
|
458
|
+
@pulumi.getter(name="releasePolicy")
|
|
459
|
+
def release_policy(self) -> Optional[pulumi.Input['KeyReleasePolicyArgs']]:
|
|
460
|
+
"""
|
|
461
|
+
Key release policy in response. It will be used for both output and input. Omitted if empty
|
|
462
|
+
"""
|
|
463
|
+
return pulumi.get(self, "release_policy")
|
|
464
|
+
|
|
465
|
+
@release_policy.setter
|
|
466
|
+
def release_policy(self, value: Optional[pulumi.Input['KeyReleasePolicyArgs']]):
|
|
467
|
+
pulumi.set(self, "release_policy", value)
|
|
468
|
+
|
|
469
|
+
@property
|
|
470
|
+
@pulumi.getter(name="rotationPolicy")
|
|
471
|
+
def rotation_policy(self) -> Optional[pulumi.Input['RotationPolicyArgs']]:
|
|
472
|
+
"""
|
|
473
|
+
Key rotation policy in response. It will be used for both output and input. Omitted if empty
|
|
474
|
+
"""
|
|
475
|
+
return pulumi.get(self, "rotation_policy")
|
|
476
|
+
|
|
477
|
+
@rotation_policy.setter
|
|
478
|
+
def rotation_policy(self, value: Optional[pulumi.Input['RotationPolicyArgs']]):
|
|
479
|
+
pulumi.set(self, "rotation_policy", value)
|
|
480
|
+
|
|
481
|
+
|
|
482
|
+
if not MYPY:
|
|
483
|
+
class KeyReleasePolicyArgsDict(TypedDict):
|
|
484
|
+
content_type: NotRequired[pulumi.Input[str]]
|
|
485
|
+
"""
|
|
486
|
+
Content type and version of key release policy
|
|
487
|
+
"""
|
|
488
|
+
data: NotRequired[pulumi.Input[str]]
|
|
489
|
+
"""
|
|
490
|
+
Blob encoding the policy rules under which the key can be released.
|
|
491
|
+
"""
|
|
492
|
+
elif False:
|
|
493
|
+
KeyReleasePolicyArgsDict: TypeAlias = Mapping[str, Any]
|
|
494
|
+
|
|
495
|
+
@pulumi.input_type
|
|
496
|
+
class KeyReleasePolicyArgs:
|
|
497
|
+
def __init__(__self__, *,
|
|
498
|
+
content_type: Optional[pulumi.Input[str]] = None,
|
|
499
|
+
data: Optional[pulumi.Input[str]] = None):
|
|
500
|
+
"""
|
|
501
|
+
:param pulumi.Input[str] content_type: Content type and version of key release policy
|
|
502
|
+
:param pulumi.Input[str] data: Blob encoding the policy rules under which the key can be released.
|
|
503
|
+
"""
|
|
504
|
+
if content_type is None:
|
|
505
|
+
content_type = 'application/json; charset=utf-8'
|
|
506
|
+
if content_type is not None:
|
|
507
|
+
pulumi.set(__self__, "content_type", content_type)
|
|
508
|
+
if data is not None:
|
|
509
|
+
pulumi.set(__self__, "data", data)
|
|
510
|
+
|
|
511
|
+
@property
|
|
512
|
+
@pulumi.getter(name="contentType")
|
|
513
|
+
def content_type(self) -> Optional[pulumi.Input[str]]:
|
|
514
|
+
"""
|
|
515
|
+
Content type and version of key release policy
|
|
516
|
+
"""
|
|
517
|
+
return pulumi.get(self, "content_type")
|
|
518
|
+
|
|
519
|
+
@content_type.setter
|
|
520
|
+
def content_type(self, value: Optional[pulumi.Input[str]]):
|
|
521
|
+
pulumi.set(self, "content_type", value)
|
|
522
|
+
|
|
523
|
+
@property
|
|
524
|
+
@pulumi.getter
|
|
525
|
+
def data(self) -> Optional[pulumi.Input[str]]:
|
|
526
|
+
"""
|
|
527
|
+
Blob encoding the policy rules under which the key can be released.
|
|
528
|
+
"""
|
|
529
|
+
return pulumi.get(self, "data")
|
|
530
|
+
|
|
531
|
+
@data.setter
|
|
532
|
+
def data(self, value: Optional[pulumi.Input[str]]):
|
|
533
|
+
pulumi.set(self, "data", value)
|
|
534
|
+
|
|
535
|
+
|
|
536
|
+
if not MYPY:
|
|
537
|
+
class KeyRotationPolicyAttributesArgsDict(TypedDict):
|
|
538
|
+
expiry_time: NotRequired[pulumi.Input[str]]
|
|
539
|
+
"""
|
|
540
|
+
The expiration time for the new key version. It should be in ISO8601 format. Eg: 'P90D', 'P1Y'.
|
|
541
|
+
"""
|
|
542
|
+
elif False:
|
|
543
|
+
KeyRotationPolicyAttributesArgsDict: TypeAlias = Mapping[str, Any]
|
|
544
|
+
|
|
545
|
+
@pulumi.input_type
|
|
546
|
+
class KeyRotationPolicyAttributesArgs:
|
|
547
|
+
def __init__(__self__, *,
|
|
548
|
+
expiry_time: Optional[pulumi.Input[str]] = None):
|
|
549
|
+
"""
|
|
550
|
+
:param pulumi.Input[str] expiry_time: The expiration time for the new key version. It should be in ISO8601 format. Eg: 'P90D', 'P1Y'.
|
|
551
|
+
"""
|
|
552
|
+
if expiry_time is not None:
|
|
553
|
+
pulumi.set(__self__, "expiry_time", expiry_time)
|
|
554
|
+
|
|
555
|
+
@property
|
|
556
|
+
@pulumi.getter(name="expiryTime")
|
|
557
|
+
def expiry_time(self) -> Optional[pulumi.Input[str]]:
|
|
558
|
+
"""
|
|
559
|
+
The expiration time for the new key version. It should be in ISO8601 format. Eg: 'P90D', 'P1Y'.
|
|
560
|
+
"""
|
|
561
|
+
return pulumi.get(self, "expiry_time")
|
|
562
|
+
|
|
563
|
+
@expiry_time.setter
|
|
564
|
+
def expiry_time(self, value: Optional[pulumi.Input[str]]):
|
|
565
|
+
pulumi.set(self, "expiry_time", value)
|
|
566
|
+
|
|
567
|
+
|
|
568
|
+
if not MYPY:
|
|
569
|
+
class LifetimeActionArgsDict(TypedDict):
|
|
570
|
+
action: NotRequired[pulumi.Input['ActionArgsDict']]
|
|
571
|
+
"""
|
|
572
|
+
The action of key rotation policy lifetimeAction.
|
|
573
|
+
"""
|
|
574
|
+
trigger: NotRequired[pulumi.Input['TriggerArgsDict']]
|
|
575
|
+
"""
|
|
576
|
+
The trigger of key rotation policy lifetimeAction.
|
|
577
|
+
"""
|
|
578
|
+
elif False:
|
|
579
|
+
LifetimeActionArgsDict: TypeAlias = Mapping[str, Any]
|
|
580
|
+
|
|
581
|
+
@pulumi.input_type
|
|
582
|
+
class LifetimeActionArgs:
|
|
583
|
+
def __init__(__self__, *,
|
|
584
|
+
action: Optional[pulumi.Input['ActionArgs']] = None,
|
|
585
|
+
trigger: Optional[pulumi.Input['TriggerArgs']] = None):
|
|
586
|
+
"""
|
|
587
|
+
:param pulumi.Input['ActionArgs'] action: The action of key rotation policy lifetimeAction.
|
|
588
|
+
:param pulumi.Input['TriggerArgs'] trigger: The trigger of key rotation policy lifetimeAction.
|
|
589
|
+
"""
|
|
590
|
+
if action is not None:
|
|
591
|
+
pulumi.set(__self__, "action", action)
|
|
592
|
+
if trigger is not None:
|
|
593
|
+
pulumi.set(__self__, "trigger", trigger)
|
|
594
|
+
|
|
595
|
+
@property
|
|
596
|
+
@pulumi.getter
|
|
597
|
+
def action(self) -> Optional[pulumi.Input['ActionArgs']]:
|
|
598
|
+
"""
|
|
599
|
+
The action of key rotation policy lifetimeAction.
|
|
600
|
+
"""
|
|
601
|
+
return pulumi.get(self, "action")
|
|
602
|
+
|
|
603
|
+
@action.setter
|
|
604
|
+
def action(self, value: Optional[pulumi.Input['ActionArgs']]):
|
|
605
|
+
pulumi.set(self, "action", value)
|
|
606
|
+
|
|
607
|
+
@property
|
|
608
|
+
@pulumi.getter
|
|
609
|
+
def trigger(self) -> Optional[pulumi.Input['TriggerArgs']]:
|
|
610
|
+
"""
|
|
611
|
+
The trigger of key rotation policy lifetimeAction.
|
|
612
|
+
"""
|
|
613
|
+
return pulumi.get(self, "trigger")
|
|
614
|
+
|
|
615
|
+
@trigger.setter
|
|
616
|
+
def trigger(self, value: Optional[pulumi.Input['TriggerArgs']]):
|
|
617
|
+
pulumi.set(self, "trigger", value)
|
|
618
|
+
|
|
619
|
+
|
|
620
|
+
if not MYPY:
|
|
621
|
+
class MHSMGeoReplicatedRegionArgsDict(TypedDict):
|
|
622
|
+
"""
|
|
623
|
+
A region that this managed HSM Pool has been extended to.
|
|
624
|
+
"""
|
|
625
|
+
is_primary: NotRequired[pulumi.Input[bool]]
|
|
626
|
+
"""
|
|
627
|
+
A boolean value that indicates whether the region is the primary region or a secondary region.
|
|
628
|
+
"""
|
|
629
|
+
name: NotRequired[pulumi.Input[str]]
|
|
630
|
+
"""
|
|
631
|
+
Name of the geo replicated region.
|
|
632
|
+
"""
|
|
633
|
+
elif False:
|
|
634
|
+
MHSMGeoReplicatedRegionArgsDict: TypeAlias = Mapping[str, Any]
|
|
635
|
+
|
|
636
|
+
@pulumi.input_type
|
|
637
|
+
class MHSMGeoReplicatedRegionArgs:
|
|
638
|
+
def __init__(__self__, *,
|
|
639
|
+
is_primary: Optional[pulumi.Input[bool]] = None,
|
|
640
|
+
name: Optional[pulumi.Input[str]] = None):
|
|
641
|
+
"""
|
|
642
|
+
A region that this managed HSM Pool has been extended to.
|
|
643
|
+
:param pulumi.Input[bool] is_primary: A boolean value that indicates whether the region is the primary region or a secondary region.
|
|
644
|
+
:param pulumi.Input[str] name: Name of the geo replicated region.
|
|
645
|
+
"""
|
|
646
|
+
if is_primary is not None:
|
|
647
|
+
pulumi.set(__self__, "is_primary", is_primary)
|
|
648
|
+
if name is not None:
|
|
649
|
+
pulumi.set(__self__, "name", name)
|
|
650
|
+
|
|
651
|
+
@property
|
|
652
|
+
@pulumi.getter(name="isPrimary")
|
|
653
|
+
def is_primary(self) -> Optional[pulumi.Input[bool]]:
|
|
654
|
+
"""
|
|
655
|
+
A boolean value that indicates whether the region is the primary region or a secondary region.
|
|
656
|
+
"""
|
|
657
|
+
return pulumi.get(self, "is_primary")
|
|
658
|
+
|
|
659
|
+
@is_primary.setter
|
|
660
|
+
def is_primary(self, value: Optional[pulumi.Input[bool]]):
|
|
661
|
+
pulumi.set(self, "is_primary", value)
|
|
662
|
+
|
|
663
|
+
@property
|
|
664
|
+
@pulumi.getter
|
|
665
|
+
def name(self) -> Optional[pulumi.Input[str]]:
|
|
666
|
+
"""
|
|
667
|
+
Name of the geo replicated region.
|
|
668
|
+
"""
|
|
669
|
+
return pulumi.get(self, "name")
|
|
670
|
+
|
|
671
|
+
@name.setter
|
|
672
|
+
def name(self, value: Optional[pulumi.Input[str]]):
|
|
673
|
+
pulumi.set(self, "name", value)
|
|
674
|
+
|
|
675
|
+
|
|
676
|
+
if not MYPY:
|
|
677
|
+
class MHSMIPRuleArgsDict(TypedDict):
|
|
678
|
+
"""
|
|
679
|
+
A rule governing the accessibility of a managed HSM pool from a specific IP address or IP range.
|
|
680
|
+
"""
|
|
681
|
+
value: pulumi.Input[str]
|
|
682
|
+
"""
|
|
683
|
+
An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all addresses that start with 124.56.78).
|
|
684
|
+
"""
|
|
685
|
+
elif False:
|
|
686
|
+
MHSMIPRuleArgsDict: TypeAlias = Mapping[str, Any]
|
|
687
|
+
|
|
688
|
+
@pulumi.input_type
|
|
689
|
+
class MHSMIPRuleArgs:
|
|
690
|
+
def __init__(__self__, *,
|
|
691
|
+
value: pulumi.Input[str]):
|
|
692
|
+
"""
|
|
693
|
+
A rule governing the accessibility of a managed HSM pool from a specific IP address or IP range.
|
|
694
|
+
:param pulumi.Input[str] value: An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all addresses that start with 124.56.78).
|
|
695
|
+
"""
|
|
696
|
+
pulumi.set(__self__, "value", value)
|
|
697
|
+
|
|
698
|
+
@property
|
|
699
|
+
@pulumi.getter
|
|
700
|
+
def value(self) -> pulumi.Input[str]:
|
|
701
|
+
"""
|
|
702
|
+
An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all addresses that start with 124.56.78).
|
|
703
|
+
"""
|
|
704
|
+
return pulumi.get(self, "value")
|
|
705
|
+
|
|
706
|
+
@value.setter
|
|
707
|
+
def value(self, value: pulumi.Input[str]):
|
|
708
|
+
pulumi.set(self, "value", value)
|
|
709
|
+
|
|
710
|
+
|
|
711
|
+
if not MYPY:
|
|
712
|
+
class MHSMNetworkRuleSetArgsDict(TypedDict):
|
|
713
|
+
"""
|
|
714
|
+
A set of rules governing the network accessibility of a managed hsm pool.
|
|
715
|
+
"""
|
|
716
|
+
bypass: NotRequired[pulumi.Input[Union[str, 'NetworkRuleBypassOptions']]]
|
|
717
|
+
"""
|
|
718
|
+
Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the default is 'AzureServices'.
|
|
719
|
+
"""
|
|
720
|
+
default_action: NotRequired[pulumi.Input[Union[str, 'NetworkRuleAction']]]
|
|
721
|
+
"""
|
|
722
|
+
The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after the bypass property has been evaluated.
|
|
723
|
+
"""
|
|
724
|
+
ip_rules: NotRequired[pulumi.Input[Sequence[pulumi.Input['MHSMIPRuleArgsDict']]]]
|
|
725
|
+
"""
|
|
726
|
+
The list of IP address rules.
|
|
727
|
+
"""
|
|
728
|
+
virtual_network_rules: NotRequired[pulumi.Input[Sequence[pulumi.Input['MHSMVirtualNetworkRuleArgsDict']]]]
|
|
729
|
+
"""
|
|
730
|
+
The list of virtual network rules.
|
|
731
|
+
"""
|
|
732
|
+
elif False:
|
|
733
|
+
MHSMNetworkRuleSetArgsDict: TypeAlias = Mapping[str, Any]
|
|
734
|
+
|
|
735
|
+
@pulumi.input_type
|
|
736
|
+
class MHSMNetworkRuleSetArgs:
|
|
737
|
+
def __init__(__self__, *,
|
|
738
|
+
bypass: Optional[pulumi.Input[Union[str, 'NetworkRuleBypassOptions']]] = None,
|
|
739
|
+
default_action: Optional[pulumi.Input[Union[str, 'NetworkRuleAction']]] = None,
|
|
740
|
+
ip_rules: Optional[pulumi.Input[Sequence[pulumi.Input['MHSMIPRuleArgs']]]] = None,
|
|
741
|
+
virtual_network_rules: Optional[pulumi.Input[Sequence[pulumi.Input['MHSMVirtualNetworkRuleArgs']]]] = None):
|
|
742
|
+
"""
|
|
743
|
+
A set of rules governing the network accessibility of a managed hsm pool.
|
|
744
|
+
:param pulumi.Input[Union[str, 'NetworkRuleBypassOptions']] bypass: Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the default is 'AzureServices'.
|
|
745
|
+
:param pulumi.Input[Union[str, 'NetworkRuleAction']] default_action: The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after the bypass property has been evaluated.
|
|
746
|
+
:param pulumi.Input[Sequence[pulumi.Input['MHSMIPRuleArgs']]] ip_rules: The list of IP address rules.
|
|
747
|
+
:param pulumi.Input[Sequence[pulumi.Input['MHSMVirtualNetworkRuleArgs']]] virtual_network_rules: The list of virtual network rules.
|
|
748
|
+
"""
|
|
749
|
+
if bypass is not None:
|
|
750
|
+
pulumi.set(__self__, "bypass", bypass)
|
|
751
|
+
if default_action is not None:
|
|
752
|
+
pulumi.set(__self__, "default_action", default_action)
|
|
753
|
+
if ip_rules is not None:
|
|
754
|
+
pulumi.set(__self__, "ip_rules", ip_rules)
|
|
755
|
+
if virtual_network_rules is not None:
|
|
756
|
+
pulumi.set(__self__, "virtual_network_rules", virtual_network_rules)
|
|
757
|
+
|
|
758
|
+
@property
|
|
759
|
+
@pulumi.getter
|
|
760
|
+
def bypass(self) -> Optional[pulumi.Input[Union[str, 'NetworkRuleBypassOptions']]]:
|
|
761
|
+
"""
|
|
762
|
+
Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the default is 'AzureServices'.
|
|
763
|
+
"""
|
|
764
|
+
return pulumi.get(self, "bypass")
|
|
765
|
+
|
|
766
|
+
@bypass.setter
|
|
767
|
+
def bypass(self, value: Optional[pulumi.Input[Union[str, 'NetworkRuleBypassOptions']]]):
|
|
768
|
+
pulumi.set(self, "bypass", value)
|
|
769
|
+
|
|
770
|
+
@property
|
|
771
|
+
@pulumi.getter(name="defaultAction")
|
|
772
|
+
def default_action(self) -> Optional[pulumi.Input[Union[str, 'NetworkRuleAction']]]:
|
|
773
|
+
"""
|
|
774
|
+
The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after the bypass property has been evaluated.
|
|
775
|
+
"""
|
|
776
|
+
return pulumi.get(self, "default_action")
|
|
777
|
+
|
|
778
|
+
@default_action.setter
|
|
779
|
+
def default_action(self, value: Optional[pulumi.Input[Union[str, 'NetworkRuleAction']]]):
|
|
780
|
+
pulumi.set(self, "default_action", value)
|
|
781
|
+
|
|
782
|
+
@property
|
|
783
|
+
@pulumi.getter(name="ipRules")
|
|
784
|
+
def ip_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['MHSMIPRuleArgs']]]]:
|
|
785
|
+
"""
|
|
786
|
+
The list of IP address rules.
|
|
787
|
+
"""
|
|
788
|
+
return pulumi.get(self, "ip_rules")
|
|
789
|
+
|
|
790
|
+
@ip_rules.setter
|
|
791
|
+
def ip_rules(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['MHSMIPRuleArgs']]]]):
|
|
792
|
+
pulumi.set(self, "ip_rules", value)
|
|
793
|
+
|
|
794
|
+
@property
|
|
795
|
+
@pulumi.getter(name="virtualNetworkRules")
|
|
796
|
+
def virtual_network_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['MHSMVirtualNetworkRuleArgs']]]]:
|
|
797
|
+
"""
|
|
798
|
+
The list of virtual network rules.
|
|
799
|
+
"""
|
|
800
|
+
return pulumi.get(self, "virtual_network_rules")
|
|
801
|
+
|
|
802
|
+
@virtual_network_rules.setter
|
|
803
|
+
def virtual_network_rules(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['MHSMVirtualNetworkRuleArgs']]]]):
|
|
804
|
+
pulumi.set(self, "virtual_network_rules", value)
|
|
805
|
+
|
|
806
|
+
|
|
807
|
+
if not MYPY:
|
|
808
|
+
class MHSMPrivateLinkServiceConnectionStateArgsDict(TypedDict):
|
|
809
|
+
"""
|
|
810
|
+
An object that represents the approval state of the private link connection.
|
|
811
|
+
"""
|
|
812
|
+
actions_required: NotRequired[pulumi.Input[Union[str, 'ActionsRequired']]]
|
|
813
|
+
"""
|
|
814
|
+
A message indicating if changes on the service provider require any updates on the consumer.
|
|
815
|
+
"""
|
|
816
|
+
description: NotRequired[pulumi.Input[str]]
|
|
817
|
+
"""
|
|
818
|
+
The reason for approval or rejection.
|
|
819
|
+
"""
|
|
820
|
+
status: NotRequired[pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']]]
|
|
821
|
+
"""
|
|
822
|
+
Indicates whether the connection has been approved, rejected or removed by the key vault owner.
|
|
823
|
+
"""
|
|
824
|
+
elif False:
|
|
825
|
+
MHSMPrivateLinkServiceConnectionStateArgsDict: TypeAlias = Mapping[str, Any]
|
|
826
|
+
|
|
827
|
+
@pulumi.input_type
|
|
828
|
+
class MHSMPrivateLinkServiceConnectionStateArgs:
|
|
829
|
+
def __init__(__self__, *,
|
|
830
|
+
actions_required: Optional[pulumi.Input[Union[str, 'ActionsRequired']]] = None,
|
|
831
|
+
description: Optional[pulumi.Input[str]] = None,
|
|
832
|
+
status: Optional[pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']]] = None):
|
|
833
|
+
"""
|
|
834
|
+
An object that represents the approval state of the private link connection.
|
|
835
|
+
:param pulumi.Input[Union[str, 'ActionsRequired']] actions_required: A message indicating if changes on the service provider require any updates on the consumer.
|
|
836
|
+
:param pulumi.Input[str] description: The reason for approval or rejection.
|
|
837
|
+
:param pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']] status: Indicates whether the connection has been approved, rejected or removed by the key vault owner.
|
|
838
|
+
"""
|
|
839
|
+
if actions_required is not None:
|
|
840
|
+
pulumi.set(__self__, "actions_required", actions_required)
|
|
841
|
+
if description is not None:
|
|
842
|
+
pulumi.set(__self__, "description", description)
|
|
843
|
+
if status is not None:
|
|
844
|
+
pulumi.set(__self__, "status", status)
|
|
845
|
+
|
|
846
|
+
@property
|
|
847
|
+
@pulumi.getter(name="actionsRequired")
|
|
848
|
+
def actions_required(self) -> Optional[pulumi.Input[Union[str, 'ActionsRequired']]]:
|
|
849
|
+
"""
|
|
850
|
+
A message indicating if changes on the service provider require any updates on the consumer.
|
|
851
|
+
"""
|
|
852
|
+
return pulumi.get(self, "actions_required")
|
|
853
|
+
|
|
854
|
+
@actions_required.setter
|
|
855
|
+
def actions_required(self, value: Optional[pulumi.Input[Union[str, 'ActionsRequired']]]):
|
|
856
|
+
pulumi.set(self, "actions_required", value)
|
|
857
|
+
|
|
858
|
+
@property
|
|
859
|
+
@pulumi.getter
|
|
860
|
+
def description(self) -> Optional[pulumi.Input[str]]:
|
|
861
|
+
"""
|
|
862
|
+
The reason for approval or rejection.
|
|
863
|
+
"""
|
|
864
|
+
return pulumi.get(self, "description")
|
|
865
|
+
|
|
866
|
+
@description.setter
|
|
867
|
+
def description(self, value: Optional[pulumi.Input[str]]):
|
|
868
|
+
pulumi.set(self, "description", value)
|
|
869
|
+
|
|
870
|
+
@property
|
|
871
|
+
@pulumi.getter
|
|
872
|
+
def status(self) -> Optional[pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']]]:
|
|
873
|
+
"""
|
|
874
|
+
Indicates whether the connection has been approved, rejected or removed by the key vault owner.
|
|
875
|
+
"""
|
|
876
|
+
return pulumi.get(self, "status")
|
|
877
|
+
|
|
878
|
+
@status.setter
|
|
879
|
+
def status(self, value: Optional[pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']]]):
|
|
880
|
+
pulumi.set(self, "status", value)
|
|
881
|
+
|
|
882
|
+
|
|
883
|
+
if not MYPY:
|
|
884
|
+
class MHSMVirtualNetworkRuleArgsDict(TypedDict):
|
|
885
|
+
"""
|
|
886
|
+
A rule governing the accessibility of a managed hsm pool from a specific virtual network.
|
|
887
|
+
"""
|
|
888
|
+
id: pulumi.Input[str]
|
|
889
|
+
"""
|
|
890
|
+
Full resource id of a vnet subnet, such as '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'.
|
|
891
|
+
"""
|
|
892
|
+
elif False:
|
|
893
|
+
MHSMVirtualNetworkRuleArgsDict: TypeAlias = Mapping[str, Any]
|
|
894
|
+
|
|
895
|
+
@pulumi.input_type
|
|
896
|
+
class MHSMVirtualNetworkRuleArgs:
|
|
897
|
+
def __init__(__self__, *,
|
|
898
|
+
id: pulumi.Input[str]):
|
|
899
|
+
"""
|
|
900
|
+
A rule governing the accessibility of a managed hsm pool from a specific virtual network.
|
|
901
|
+
:param pulumi.Input[str] id: Full resource id of a vnet subnet, such as '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'.
|
|
902
|
+
"""
|
|
903
|
+
pulumi.set(__self__, "id", id)
|
|
904
|
+
|
|
905
|
+
@property
|
|
906
|
+
@pulumi.getter
|
|
907
|
+
def id(self) -> pulumi.Input[str]:
|
|
908
|
+
"""
|
|
909
|
+
Full resource id of a vnet subnet, such as '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'.
|
|
910
|
+
"""
|
|
911
|
+
return pulumi.get(self, "id")
|
|
912
|
+
|
|
913
|
+
@id.setter
|
|
914
|
+
def id(self, value: pulumi.Input[str]):
|
|
915
|
+
pulumi.set(self, "id", value)
|
|
916
|
+
|
|
917
|
+
|
|
918
|
+
if not MYPY:
|
|
919
|
+
class ManagedHsmPropertiesArgsDict(TypedDict):
|
|
920
|
+
"""
|
|
921
|
+
Properties of the managed HSM Pool
|
|
922
|
+
"""
|
|
923
|
+
create_mode: NotRequired[pulumi.Input['CreateMode']]
|
|
924
|
+
"""
|
|
925
|
+
The create mode to indicate whether the resource is being created or is being recovered from a deleted resource.
|
|
926
|
+
"""
|
|
927
|
+
enable_purge_protection: NotRequired[pulumi.Input[bool]]
|
|
928
|
+
"""
|
|
929
|
+
Property specifying whether protection against purge is enabled for this managed HSM pool. Setting this property to true activates protection against purge for this managed HSM pool and its content - only the Managed HSM service may initiate a hard, irrecoverable deletion. Enabling this functionality is irreversible.
|
|
930
|
+
"""
|
|
931
|
+
enable_soft_delete: NotRequired[pulumi.Input[bool]]
|
|
932
|
+
"""
|
|
933
|
+
Property to specify whether the 'soft delete' functionality is enabled for this managed HSM pool. Soft delete is enabled by default for all managed HSMs and is immutable.
|
|
934
|
+
"""
|
|
935
|
+
initial_admin_object_ids: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
|
936
|
+
"""
|
|
937
|
+
Array of initial administrators object ids for this managed hsm pool.
|
|
938
|
+
"""
|
|
939
|
+
network_acls: NotRequired[pulumi.Input['MHSMNetworkRuleSetArgsDict']]
|
|
940
|
+
"""
|
|
941
|
+
Rules governing the accessibility of the key vault from specific network locations.
|
|
942
|
+
"""
|
|
943
|
+
public_network_access: NotRequired[pulumi.Input[Union[str, 'PublicNetworkAccess']]]
|
|
944
|
+
"""
|
|
945
|
+
Control permission to the managed HSM from public networks.
|
|
946
|
+
"""
|
|
947
|
+
regions: NotRequired[pulumi.Input[Sequence[pulumi.Input['MHSMGeoReplicatedRegionArgsDict']]]]
|
|
948
|
+
"""
|
|
949
|
+
List of all regions associated with the managed hsm pool.
|
|
950
|
+
"""
|
|
951
|
+
soft_delete_retention_in_days: NotRequired[pulumi.Input[int]]
|
|
952
|
+
"""
|
|
953
|
+
Soft deleted data retention days. When you delete an HSM or a key, it will remain recoverable for the configured retention period or for a default period of 90 days. It accepts values between 7 and 90.
|
|
954
|
+
"""
|
|
955
|
+
tenant_id: NotRequired[pulumi.Input[str]]
|
|
956
|
+
"""
|
|
957
|
+
The Azure Active Directory tenant ID that should be used for authenticating requests to the managed HSM pool.
|
|
958
|
+
"""
|
|
959
|
+
elif False:
|
|
960
|
+
ManagedHsmPropertiesArgsDict: TypeAlias = Mapping[str, Any]
|
|
961
|
+
|
|
962
|
+
@pulumi.input_type
|
|
963
|
+
class ManagedHsmPropertiesArgs:
|
|
964
|
+
def __init__(__self__, *,
|
|
965
|
+
create_mode: Optional[pulumi.Input['CreateMode']] = None,
|
|
966
|
+
enable_purge_protection: Optional[pulumi.Input[bool]] = None,
|
|
967
|
+
enable_soft_delete: Optional[pulumi.Input[bool]] = None,
|
|
968
|
+
initial_admin_object_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
969
|
+
network_acls: Optional[pulumi.Input['MHSMNetworkRuleSetArgs']] = None,
|
|
970
|
+
public_network_access: Optional[pulumi.Input[Union[str, 'PublicNetworkAccess']]] = None,
|
|
971
|
+
regions: Optional[pulumi.Input[Sequence[pulumi.Input['MHSMGeoReplicatedRegionArgs']]]] = None,
|
|
972
|
+
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None,
|
|
973
|
+
tenant_id: Optional[pulumi.Input[str]] = None):
|
|
974
|
+
"""
|
|
975
|
+
Properties of the managed HSM Pool
|
|
976
|
+
:param pulumi.Input['CreateMode'] create_mode: The create mode to indicate whether the resource is being created or is being recovered from a deleted resource.
|
|
977
|
+
:param pulumi.Input[bool] enable_purge_protection: Property specifying whether protection against purge is enabled for this managed HSM pool. Setting this property to true activates protection against purge for this managed HSM pool and its content - only the Managed HSM service may initiate a hard, irrecoverable deletion. Enabling this functionality is irreversible.
|
|
978
|
+
:param pulumi.Input[bool] enable_soft_delete: Property to specify whether the 'soft delete' functionality is enabled for this managed HSM pool. Soft delete is enabled by default for all managed HSMs and is immutable.
|
|
979
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] initial_admin_object_ids: Array of initial administrators object ids for this managed hsm pool.
|
|
980
|
+
:param pulumi.Input['MHSMNetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
981
|
+
:param pulumi.Input[Union[str, 'PublicNetworkAccess']] public_network_access: Control permission to the managed HSM from public networks.
|
|
982
|
+
:param pulumi.Input[Sequence[pulumi.Input['MHSMGeoReplicatedRegionArgs']]] regions: List of all regions associated with the managed hsm pool.
|
|
983
|
+
:param pulumi.Input[int] soft_delete_retention_in_days: Soft deleted data retention days. When you delete an HSM or a key, it will remain recoverable for the configured retention period or for a default period of 90 days. It accepts values between 7 and 90.
|
|
984
|
+
:param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the managed HSM pool.
|
|
985
|
+
"""
|
|
986
|
+
if create_mode is not None:
|
|
987
|
+
pulumi.set(__self__, "create_mode", create_mode)
|
|
988
|
+
if enable_purge_protection is None:
|
|
989
|
+
enable_purge_protection = True
|
|
990
|
+
if enable_purge_protection is not None:
|
|
991
|
+
pulumi.set(__self__, "enable_purge_protection", enable_purge_protection)
|
|
992
|
+
if enable_soft_delete is None:
|
|
993
|
+
enable_soft_delete = True
|
|
994
|
+
if enable_soft_delete is not None:
|
|
995
|
+
pulumi.set(__self__, "enable_soft_delete", enable_soft_delete)
|
|
996
|
+
if initial_admin_object_ids is not None:
|
|
997
|
+
pulumi.set(__self__, "initial_admin_object_ids", initial_admin_object_ids)
|
|
998
|
+
if network_acls is not None:
|
|
999
|
+
pulumi.set(__self__, "network_acls", network_acls)
|
|
1000
|
+
if public_network_access is None:
|
|
1001
|
+
public_network_access = 'Enabled'
|
|
1002
|
+
if public_network_access is not None:
|
|
1003
|
+
pulumi.set(__self__, "public_network_access", public_network_access)
|
|
1004
|
+
if regions is not None:
|
|
1005
|
+
pulumi.set(__self__, "regions", regions)
|
|
1006
|
+
if soft_delete_retention_in_days is None:
|
|
1007
|
+
soft_delete_retention_in_days = 90
|
|
1008
|
+
if soft_delete_retention_in_days is not None:
|
|
1009
|
+
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
1010
|
+
if tenant_id is not None:
|
|
1011
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
1012
|
+
|
|
1013
|
+
@property
|
|
1014
|
+
@pulumi.getter(name="createMode")
|
|
1015
|
+
def create_mode(self) -> Optional[pulumi.Input['CreateMode']]:
|
|
1016
|
+
"""
|
|
1017
|
+
The create mode to indicate whether the resource is being created or is being recovered from a deleted resource.
|
|
1018
|
+
"""
|
|
1019
|
+
return pulumi.get(self, "create_mode")
|
|
1020
|
+
|
|
1021
|
+
@create_mode.setter
|
|
1022
|
+
def create_mode(self, value: Optional[pulumi.Input['CreateMode']]):
|
|
1023
|
+
pulumi.set(self, "create_mode", value)
|
|
1024
|
+
|
|
1025
|
+
@property
|
|
1026
|
+
@pulumi.getter(name="enablePurgeProtection")
|
|
1027
|
+
def enable_purge_protection(self) -> Optional[pulumi.Input[bool]]:
|
|
1028
|
+
"""
|
|
1029
|
+
Property specifying whether protection against purge is enabled for this managed HSM pool. Setting this property to true activates protection against purge for this managed HSM pool and its content - only the Managed HSM service may initiate a hard, irrecoverable deletion. Enabling this functionality is irreversible.
|
|
1030
|
+
"""
|
|
1031
|
+
return pulumi.get(self, "enable_purge_protection")
|
|
1032
|
+
|
|
1033
|
+
@enable_purge_protection.setter
|
|
1034
|
+
def enable_purge_protection(self, value: Optional[pulumi.Input[bool]]):
|
|
1035
|
+
pulumi.set(self, "enable_purge_protection", value)
|
|
1036
|
+
|
|
1037
|
+
@property
|
|
1038
|
+
@pulumi.getter(name="enableSoftDelete")
|
|
1039
|
+
def enable_soft_delete(self) -> Optional[pulumi.Input[bool]]:
|
|
1040
|
+
"""
|
|
1041
|
+
Property to specify whether the 'soft delete' functionality is enabled for this managed HSM pool. Soft delete is enabled by default for all managed HSMs and is immutable.
|
|
1042
|
+
"""
|
|
1043
|
+
return pulumi.get(self, "enable_soft_delete")
|
|
1044
|
+
|
|
1045
|
+
@enable_soft_delete.setter
|
|
1046
|
+
def enable_soft_delete(self, value: Optional[pulumi.Input[bool]]):
|
|
1047
|
+
pulumi.set(self, "enable_soft_delete", value)
|
|
1048
|
+
|
|
1049
|
+
@property
|
|
1050
|
+
@pulumi.getter(name="initialAdminObjectIds")
|
|
1051
|
+
def initial_admin_object_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
1052
|
+
"""
|
|
1053
|
+
Array of initial administrators object ids for this managed hsm pool.
|
|
1054
|
+
"""
|
|
1055
|
+
return pulumi.get(self, "initial_admin_object_ids")
|
|
1056
|
+
|
|
1057
|
+
@initial_admin_object_ids.setter
|
|
1058
|
+
def initial_admin_object_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
1059
|
+
pulumi.set(self, "initial_admin_object_ids", value)
|
|
1060
|
+
|
|
1061
|
+
@property
|
|
1062
|
+
@pulumi.getter(name="networkAcls")
|
|
1063
|
+
def network_acls(self) -> Optional[pulumi.Input['MHSMNetworkRuleSetArgs']]:
|
|
1064
|
+
"""
|
|
1065
|
+
Rules governing the accessibility of the key vault from specific network locations.
|
|
1066
|
+
"""
|
|
1067
|
+
return pulumi.get(self, "network_acls")
|
|
1068
|
+
|
|
1069
|
+
@network_acls.setter
|
|
1070
|
+
def network_acls(self, value: Optional[pulumi.Input['MHSMNetworkRuleSetArgs']]):
|
|
1071
|
+
pulumi.set(self, "network_acls", value)
|
|
1072
|
+
|
|
1073
|
+
@property
|
|
1074
|
+
@pulumi.getter(name="publicNetworkAccess")
|
|
1075
|
+
def public_network_access(self) -> Optional[pulumi.Input[Union[str, 'PublicNetworkAccess']]]:
|
|
1076
|
+
"""
|
|
1077
|
+
Control permission to the managed HSM from public networks.
|
|
1078
|
+
"""
|
|
1079
|
+
return pulumi.get(self, "public_network_access")
|
|
1080
|
+
|
|
1081
|
+
@public_network_access.setter
|
|
1082
|
+
def public_network_access(self, value: Optional[pulumi.Input[Union[str, 'PublicNetworkAccess']]]):
|
|
1083
|
+
pulumi.set(self, "public_network_access", value)
|
|
1084
|
+
|
|
1085
|
+
@property
|
|
1086
|
+
@pulumi.getter
|
|
1087
|
+
def regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['MHSMGeoReplicatedRegionArgs']]]]:
|
|
1088
|
+
"""
|
|
1089
|
+
List of all regions associated with the managed hsm pool.
|
|
1090
|
+
"""
|
|
1091
|
+
return pulumi.get(self, "regions")
|
|
1092
|
+
|
|
1093
|
+
@regions.setter
|
|
1094
|
+
def regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['MHSMGeoReplicatedRegionArgs']]]]):
|
|
1095
|
+
pulumi.set(self, "regions", value)
|
|
1096
|
+
|
|
1097
|
+
@property
|
|
1098
|
+
@pulumi.getter(name="softDeleteRetentionInDays")
|
|
1099
|
+
def soft_delete_retention_in_days(self) -> Optional[pulumi.Input[int]]:
|
|
1100
|
+
"""
|
|
1101
|
+
Soft deleted data retention days. When you delete an HSM or a key, it will remain recoverable for the configured retention period or for a default period of 90 days. It accepts values between 7 and 90.
|
|
1102
|
+
"""
|
|
1103
|
+
return pulumi.get(self, "soft_delete_retention_in_days")
|
|
1104
|
+
|
|
1105
|
+
@soft_delete_retention_in_days.setter
|
|
1106
|
+
def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
|
|
1107
|
+
pulumi.set(self, "soft_delete_retention_in_days", value)
|
|
1108
|
+
|
|
1109
|
+
@property
|
|
1110
|
+
@pulumi.getter(name="tenantId")
|
|
1111
|
+
def tenant_id(self) -> Optional[pulumi.Input[str]]:
|
|
1112
|
+
"""
|
|
1113
|
+
The Azure Active Directory tenant ID that should be used for authenticating requests to the managed HSM pool.
|
|
1114
|
+
"""
|
|
1115
|
+
return pulumi.get(self, "tenant_id")
|
|
1116
|
+
|
|
1117
|
+
@tenant_id.setter
|
|
1118
|
+
def tenant_id(self, value: Optional[pulumi.Input[str]]):
|
|
1119
|
+
pulumi.set(self, "tenant_id", value)
|
|
1120
|
+
|
|
1121
|
+
|
|
1122
|
+
if not MYPY:
|
|
1123
|
+
class ManagedHsmSkuArgsDict(TypedDict):
|
|
1124
|
+
"""
|
|
1125
|
+
SKU details
|
|
1126
|
+
"""
|
|
1127
|
+
family: pulumi.Input[Union[str, 'ManagedHsmSkuFamily']]
|
|
1128
|
+
"""
|
|
1129
|
+
SKU Family of the managed HSM Pool
|
|
1130
|
+
"""
|
|
1131
|
+
name: pulumi.Input['ManagedHsmSkuName']
|
|
1132
|
+
"""
|
|
1133
|
+
SKU of the managed HSM Pool
|
|
1134
|
+
"""
|
|
1135
|
+
elif False:
|
|
1136
|
+
ManagedHsmSkuArgsDict: TypeAlias = Mapping[str, Any]
|
|
1137
|
+
|
|
1138
|
+
@pulumi.input_type
|
|
1139
|
+
class ManagedHsmSkuArgs:
|
|
1140
|
+
def __init__(__self__, *,
|
|
1141
|
+
family: pulumi.Input[Union[str, 'ManagedHsmSkuFamily']],
|
|
1142
|
+
name: pulumi.Input['ManagedHsmSkuName']):
|
|
1143
|
+
"""
|
|
1144
|
+
SKU details
|
|
1145
|
+
:param pulumi.Input[Union[str, 'ManagedHsmSkuFamily']] family: SKU Family of the managed HSM Pool
|
|
1146
|
+
:param pulumi.Input['ManagedHsmSkuName'] name: SKU of the managed HSM Pool
|
|
1147
|
+
"""
|
|
1148
|
+
pulumi.set(__self__, "family", family)
|
|
1149
|
+
pulumi.set(__self__, "name", name)
|
|
1150
|
+
|
|
1151
|
+
@property
|
|
1152
|
+
@pulumi.getter
|
|
1153
|
+
def family(self) -> pulumi.Input[Union[str, 'ManagedHsmSkuFamily']]:
|
|
1154
|
+
"""
|
|
1155
|
+
SKU Family of the managed HSM Pool
|
|
1156
|
+
"""
|
|
1157
|
+
return pulumi.get(self, "family")
|
|
1158
|
+
|
|
1159
|
+
@family.setter
|
|
1160
|
+
def family(self, value: pulumi.Input[Union[str, 'ManagedHsmSkuFamily']]):
|
|
1161
|
+
pulumi.set(self, "family", value)
|
|
1162
|
+
|
|
1163
|
+
@property
|
|
1164
|
+
@pulumi.getter
|
|
1165
|
+
def name(self) -> pulumi.Input['ManagedHsmSkuName']:
|
|
1166
|
+
"""
|
|
1167
|
+
SKU of the managed HSM Pool
|
|
1168
|
+
"""
|
|
1169
|
+
return pulumi.get(self, "name")
|
|
1170
|
+
|
|
1171
|
+
@name.setter
|
|
1172
|
+
def name(self, value: pulumi.Input['ManagedHsmSkuName']):
|
|
1173
|
+
pulumi.set(self, "name", value)
|
|
1174
|
+
|
|
1175
|
+
|
|
1176
|
+
if not MYPY:
|
|
1177
|
+
class ManagedServiceIdentityArgsDict(TypedDict):
|
|
1178
|
+
"""
|
|
1179
|
+
Managed service identity (system assigned and/or user assigned identities)
|
|
1180
|
+
"""
|
|
1181
|
+
type: pulumi.Input[Union[str, 'ManagedServiceIdentityType']]
|
|
1182
|
+
"""
|
|
1183
|
+
Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
|
|
1184
|
+
"""
|
|
1185
|
+
user_assigned_identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
|
1186
|
+
"""
|
|
1187
|
+
The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
|
|
1188
|
+
"""
|
|
1189
|
+
elif False:
|
|
1190
|
+
ManagedServiceIdentityArgsDict: TypeAlias = Mapping[str, Any]
|
|
1191
|
+
|
|
1192
|
+
@pulumi.input_type
|
|
1193
|
+
class ManagedServiceIdentityArgs:
|
|
1194
|
+
def __init__(__self__, *,
|
|
1195
|
+
type: pulumi.Input[Union[str, 'ManagedServiceIdentityType']],
|
|
1196
|
+
user_assigned_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
|
1197
|
+
"""
|
|
1198
|
+
Managed service identity (system assigned and/or user assigned identities)
|
|
1199
|
+
:param pulumi.Input[Union[str, 'ManagedServiceIdentityType']] type: Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
|
|
1200
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] user_assigned_identities: The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
|
|
1201
|
+
"""
|
|
1202
|
+
pulumi.set(__self__, "type", type)
|
|
1203
|
+
if user_assigned_identities is not None:
|
|
1204
|
+
pulumi.set(__self__, "user_assigned_identities", user_assigned_identities)
|
|
1205
|
+
|
|
1206
|
+
@property
|
|
1207
|
+
@pulumi.getter
|
|
1208
|
+
def type(self) -> pulumi.Input[Union[str, 'ManagedServiceIdentityType']]:
|
|
1209
|
+
"""
|
|
1210
|
+
Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
|
|
1211
|
+
"""
|
|
1212
|
+
return pulumi.get(self, "type")
|
|
1213
|
+
|
|
1214
|
+
@type.setter
|
|
1215
|
+
def type(self, value: pulumi.Input[Union[str, 'ManagedServiceIdentityType']]):
|
|
1216
|
+
pulumi.set(self, "type", value)
|
|
1217
|
+
|
|
1218
|
+
@property
|
|
1219
|
+
@pulumi.getter(name="userAssignedIdentities")
|
|
1220
|
+
def user_assigned_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
1221
|
+
"""
|
|
1222
|
+
The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
|
|
1223
|
+
"""
|
|
1224
|
+
return pulumi.get(self, "user_assigned_identities")
|
|
1225
|
+
|
|
1226
|
+
@user_assigned_identities.setter
|
|
1227
|
+
def user_assigned_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
1228
|
+
pulumi.set(self, "user_assigned_identities", value)
|
|
1229
|
+
|
|
1230
|
+
|
|
1231
|
+
if not MYPY:
|
|
1232
|
+
class NetworkRuleSetArgsDict(TypedDict):
|
|
1233
|
+
"""
|
|
1234
|
+
A set of rules governing the network accessibility of a vault.
|
|
1235
|
+
"""
|
|
1236
|
+
bypass: NotRequired[pulumi.Input[Union[str, 'NetworkRuleBypassOptions']]]
|
|
1237
|
+
"""
|
|
1238
|
+
Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the default is 'AzureServices'.
|
|
1239
|
+
"""
|
|
1240
|
+
default_action: NotRequired[pulumi.Input[Union[str, 'NetworkRuleAction']]]
|
|
1241
|
+
"""
|
|
1242
|
+
The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after the bypass property has been evaluated.
|
|
1243
|
+
"""
|
|
1244
|
+
ip_rules: NotRequired[pulumi.Input[Sequence[pulumi.Input['IPRuleArgsDict']]]]
|
|
1245
|
+
"""
|
|
1246
|
+
The list of IP address rules.
|
|
1247
|
+
"""
|
|
1248
|
+
virtual_network_rules: NotRequired[pulumi.Input[Sequence[pulumi.Input['VirtualNetworkRuleArgsDict']]]]
|
|
1249
|
+
"""
|
|
1250
|
+
The list of virtual network rules.
|
|
1251
|
+
"""
|
|
1252
|
+
elif False:
|
|
1253
|
+
NetworkRuleSetArgsDict: TypeAlias = Mapping[str, Any]
|
|
1254
|
+
|
|
1255
|
+
@pulumi.input_type
|
|
1256
|
+
class NetworkRuleSetArgs:
|
|
1257
|
+
def __init__(__self__, *,
|
|
1258
|
+
bypass: Optional[pulumi.Input[Union[str, 'NetworkRuleBypassOptions']]] = None,
|
|
1259
|
+
default_action: Optional[pulumi.Input[Union[str, 'NetworkRuleAction']]] = None,
|
|
1260
|
+
ip_rules: Optional[pulumi.Input[Sequence[pulumi.Input['IPRuleArgs']]]] = None,
|
|
1261
|
+
virtual_network_rules: Optional[pulumi.Input[Sequence[pulumi.Input['VirtualNetworkRuleArgs']]]] = None):
|
|
1262
|
+
"""
|
|
1263
|
+
A set of rules governing the network accessibility of a vault.
|
|
1264
|
+
:param pulumi.Input[Union[str, 'NetworkRuleBypassOptions']] bypass: Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the default is 'AzureServices'.
|
|
1265
|
+
:param pulumi.Input[Union[str, 'NetworkRuleAction']] default_action: The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after the bypass property has been evaluated.
|
|
1266
|
+
:param pulumi.Input[Sequence[pulumi.Input['IPRuleArgs']]] ip_rules: The list of IP address rules.
|
|
1267
|
+
:param pulumi.Input[Sequence[pulumi.Input['VirtualNetworkRuleArgs']]] virtual_network_rules: The list of virtual network rules.
|
|
1268
|
+
"""
|
|
1269
|
+
if bypass is not None:
|
|
1270
|
+
pulumi.set(__self__, "bypass", bypass)
|
|
1271
|
+
if default_action is not None:
|
|
1272
|
+
pulumi.set(__self__, "default_action", default_action)
|
|
1273
|
+
if ip_rules is not None:
|
|
1274
|
+
pulumi.set(__self__, "ip_rules", ip_rules)
|
|
1275
|
+
if virtual_network_rules is not None:
|
|
1276
|
+
pulumi.set(__self__, "virtual_network_rules", virtual_network_rules)
|
|
1277
|
+
|
|
1278
|
+
@property
|
|
1279
|
+
@pulumi.getter
|
|
1280
|
+
def bypass(self) -> Optional[pulumi.Input[Union[str, 'NetworkRuleBypassOptions']]]:
|
|
1281
|
+
"""
|
|
1282
|
+
Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the default is 'AzureServices'.
|
|
1283
|
+
"""
|
|
1284
|
+
return pulumi.get(self, "bypass")
|
|
1285
|
+
|
|
1286
|
+
@bypass.setter
|
|
1287
|
+
def bypass(self, value: Optional[pulumi.Input[Union[str, 'NetworkRuleBypassOptions']]]):
|
|
1288
|
+
pulumi.set(self, "bypass", value)
|
|
1289
|
+
|
|
1290
|
+
@property
|
|
1291
|
+
@pulumi.getter(name="defaultAction")
|
|
1292
|
+
def default_action(self) -> Optional[pulumi.Input[Union[str, 'NetworkRuleAction']]]:
|
|
1293
|
+
"""
|
|
1294
|
+
The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after the bypass property has been evaluated.
|
|
1295
|
+
"""
|
|
1296
|
+
return pulumi.get(self, "default_action")
|
|
1297
|
+
|
|
1298
|
+
@default_action.setter
|
|
1299
|
+
def default_action(self, value: Optional[pulumi.Input[Union[str, 'NetworkRuleAction']]]):
|
|
1300
|
+
pulumi.set(self, "default_action", value)
|
|
1301
|
+
|
|
1302
|
+
@property
|
|
1303
|
+
@pulumi.getter(name="ipRules")
|
|
1304
|
+
def ip_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['IPRuleArgs']]]]:
|
|
1305
|
+
"""
|
|
1306
|
+
The list of IP address rules.
|
|
1307
|
+
"""
|
|
1308
|
+
return pulumi.get(self, "ip_rules")
|
|
1309
|
+
|
|
1310
|
+
@ip_rules.setter
|
|
1311
|
+
def ip_rules(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['IPRuleArgs']]]]):
|
|
1312
|
+
pulumi.set(self, "ip_rules", value)
|
|
1313
|
+
|
|
1314
|
+
@property
|
|
1315
|
+
@pulumi.getter(name="virtualNetworkRules")
|
|
1316
|
+
def virtual_network_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['VirtualNetworkRuleArgs']]]]:
|
|
1317
|
+
"""
|
|
1318
|
+
The list of virtual network rules.
|
|
1319
|
+
"""
|
|
1320
|
+
return pulumi.get(self, "virtual_network_rules")
|
|
1321
|
+
|
|
1322
|
+
@virtual_network_rules.setter
|
|
1323
|
+
def virtual_network_rules(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['VirtualNetworkRuleArgs']]]]):
|
|
1324
|
+
pulumi.set(self, "virtual_network_rules", value)
|
|
1325
|
+
|
|
1326
|
+
|
|
1327
|
+
if not MYPY:
|
|
1328
|
+
class PermissionsArgsDict(TypedDict):
|
|
1329
|
+
"""
|
|
1330
|
+
Permissions the identity has for keys, secrets, certificates and storage.
|
|
1331
|
+
"""
|
|
1332
|
+
certificates: NotRequired[pulumi.Input[Sequence[pulumi.Input[Union[str, 'CertificatePermissions']]]]]
|
|
1333
|
+
"""
|
|
1334
|
+
Permissions to certificates
|
|
1335
|
+
"""
|
|
1336
|
+
keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[Union[str, 'KeyPermissions']]]]]
|
|
1337
|
+
"""
|
|
1338
|
+
Permissions to keys
|
|
1339
|
+
"""
|
|
1340
|
+
secrets: NotRequired[pulumi.Input[Sequence[pulumi.Input[Union[str, 'SecretPermissions']]]]]
|
|
1341
|
+
"""
|
|
1342
|
+
Permissions to secrets
|
|
1343
|
+
"""
|
|
1344
|
+
storage: NotRequired[pulumi.Input[Sequence[pulumi.Input[Union[str, 'StoragePermissions']]]]]
|
|
1345
|
+
"""
|
|
1346
|
+
Permissions to storage accounts
|
|
1347
|
+
"""
|
|
1348
|
+
elif False:
|
|
1349
|
+
PermissionsArgsDict: TypeAlias = Mapping[str, Any]
|
|
1350
|
+
|
|
1351
|
+
@pulumi.input_type
|
|
1352
|
+
class PermissionsArgs:
|
|
1353
|
+
def __init__(__self__, *,
|
|
1354
|
+
certificates: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'CertificatePermissions']]]]] = None,
|
|
1355
|
+
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'KeyPermissions']]]]] = None,
|
|
1356
|
+
secrets: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'SecretPermissions']]]]] = None,
|
|
1357
|
+
storage: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'StoragePermissions']]]]] = None):
|
|
1358
|
+
"""
|
|
1359
|
+
Permissions the identity has for keys, secrets, certificates and storage.
|
|
1360
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union[str, 'CertificatePermissions']]]] certificates: Permissions to certificates
|
|
1361
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union[str, 'KeyPermissions']]]] keys: Permissions to keys
|
|
1362
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union[str, 'SecretPermissions']]]] secrets: Permissions to secrets
|
|
1363
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union[str, 'StoragePermissions']]]] storage: Permissions to storage accounts
|
|
1364
|
+
"""
|
|
1365
|
+
if certificates is not None:
|
|
1366
|
+
pulumi.set(__self__, "certificates", certificates)
|
|
1367
|
+
if keys is not None:
|
|
1368
|
+
pulumi.set(__self__, "keys", keys)
|
|
1369
|
+
if secrets is not None:
|
|
1370
|
+
pulumi.set(__self__, "secrets", secrets)
|
|
1371
|
+
if storage is not None:
|
|
1372
|
+
pulumi.set(__self__, "storage", storage)
|
|
1373
|
+
|
|
1374
|
+
@property
|
|
1375
|
+
@pulumi.getter
|
|
1376
|
+
def certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'CertificatePermissions']]]]]:
|
|
1377
|
+
"""
|
|
1378
|
+
Permissions to certificates
|
|
1379
|
+
"""
|
|
1380
|
+
return pulumi.get(self, "certificates")
|
|
1381
|
+
|
|
1382
|
+
@certificates.setter
|
|
1383
|
+
def certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'CertificatePermissions']]]]]):
|
|
1384
|
+
pulumi.set(self, "certificates", value)
|
|
1385
|
+
|
|
1386
|
+
@property
|
|
1387
|
+
@pulumi.getter
|
|
1388
|
+
def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'KeyPermissions']]]]]:
|
|
1389
|
+
"""
|
|
1390
|
+
Permissions to keys
|
|
1391
|
+
"""
|
|
1392
|
+
return pulumi.get(self, "keys")
|
|
1393
|
+
|
|
1394
|
+
@keys.setter
|
|
1395
|
+
def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'KeyPermissions']]]]]):
|
|
1396
|
+
pulumi.set(self, "keys", value)
|
|
1397
|
+
|
|
1398
|
+
@property
|
|
1399
|
+
@pulumi.getter
|
|
1400
|
+
def secrets(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'SecretPermissions']]]]]:
|
|
1401
|
+
"""
|
|
1402
|
+
Permissions to secrets
|
|
1403
|
+
"""
|
|
1404
|
+
return pulumi.get(self, "secrets")
|
|
1405
|
+
|
|
1406
|
+
@secrets.setter
|
|
1407
|
+
def secrets(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'SecretPermissions']]]]]):
|
|
1408
|
+
pulumi.set(self, "secrets", value)
|
|
1409
|
+
|
|
1410
|
+
@property
|
|
1411
|
+
@pulumi.getter
|
|
1412
|
+
def storage(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'StoragePermissions']]]]]:
|
|
1413
|
+
"""
|
|
1414
|
+
Permissions to storage accounts
|
|
1415
|
+
"""
|
|
1416
|
+
return pulumi.get(self, "storage")
|
|
1417
|
+
|
|
1418
|
+
@storage.setter
|
|
1419
|
+
def storage(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Union[str, 'StoragePermissions']]]]]):
|
|
1420
|
+
pulumi.set(self, "storage", value)
|
|
1421
|
+
|
|
1422
|
+
|
|
1423
|
+
if not MYPY:
|
|
1424
|
+
class PrivateLinkServiceConnectionStateArgsDict(TypedDict):
|
|
1425
|
+
"""
|
|
1426
|
+
An object that represents the approval state of the private link connection.
|
|
1427
|
+
"""
|
|
1428
|
+
actions_required: NotRequired[pulumi.Input[Union[str, 'ActionsRequired']]]
|
|
1429
|
+
"""
|
|
1430
|
+
A message indicating if changes on the service provider require any updates on the consumer.
|
|
1431
|
+
"""
|
|
1432
|
+
description: NotRequired[pulumi.Input[str]]
|
|
1433
|
+
"""
|
|
1434
|
+
The reason for approval or rejection.
|
|
1435
|
+
"""
|
|
1436
|
+
status: NotRequired[pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']]]
|
|
1437
|
+
"""
|
|
1438
|
+
Indicates whether the connection has been approved, rejected or removed by the key vault owner.
|
|
1439
|
+
"""
|
|
1440
|
+
elif False:
|
|
1441
|
+
PrivateLinkServiceConnectionStateArgsDict: TypeAlias = Mapping[str, Any]
|
|
1442
|
+
|
|
1443
|
+
@pulumi.input_type
|
|
1444
|
+
class PrivateLinkServiceConnectionStateArgs:
|
|
1445
|
+
def __init__(__self__, *,
|
|
1446
|
+
actions_required: Optional[pulumi.Input[Union[str, 'ActionsRequired']]] = None,
|
|
1447
|
+
description: Optional[pulumi.Input[str]] = None,
|
|
1448
|
+
status: Optional[pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']]] = None):
|
|
1449
|
+
"""
|
|
1450
|
+
An object that represents the approval state of the private link connection.
|
|
1451
|
+
:param pulumi.Input[Union[str, 'ActionsRequired']] actions_required: A message indicating if changes on the service provider require any updates on the consumer.
|
|
1452
|
+
:param pulumi.Input[str] description: The reason for approval or rejection.
|
|
1453
|
+
:param pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']] status: Indicates whether the connection has been approved, rejected or removed by the key vault owner.
|
|
1454
|
+
"""
|
|
1455
|
+
if actions_required is not None:
|
|
1456
|
+
pulumi.set(__self__, "actions_required", actions_required)
|
|
1457
|
+
if description is not None:
|
|
1458
|
+
pulumi.set(__self__, "description", description)
|
|
1459
|
+
if status is not None:
|
|
1460
|
+
pulumi.set(__self__, "status", status)
|
|
1461
|
+
|
|
1462
|
+
@property
|
|
1463
|
+
@pulumi.getter(name="actionsRequired")
|
|
1464
|
+
def actions_required(self) -> Optional[pulumi.Input[Union[str, 'ActionsRequired']]]:
|
|
1465
|
+
"""
|
|
1466
|
+
A message indicating if changes on the service provider require any updates on the consumer.
|
|
1467
|
+
"""
|
|
1468
|
+
return pulumi.get(self, "actions_required")
|
|
1469
|
+
|
|
1470
|
+
@actions_required.setter
|
|
1471
|
+
def actions_required(self, value: Optional[pulumi.Input[Union[str, 'ActionsRequired']]]):
|
|
1472
|
+
pulumi.set(self, "actions_required", value)
|
|
1473
|
+
|
|
1474
|
+
@property
|
|
1475
|
+
@pulumi.getter
|
|
1476
|
+
def description(self) -> Optional[pulumi.Input[str]]:
|
|
1477
|
+
"""
|
|
1478
|
+
The reason for approval or rejection.
|
|
1479
|
+
"""
|
|
1480
|
+
return pulumi.get(self, "description")
|
|
1481
|
+
|
|
1482
|
+
@description.setter
|
|
1483
|
+
def description(self, value: Optional[pulumi.Input[str]]):
|
|
1484
|
+
pulumi.set(self, "description", value)
|
|
1485
|
+
|
|
1486
|
+
@property
|
|
1487
|
+
@pulumi.getter
|
|
1488
|
+
def status(self) -> Optional[pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']]]:
|
|
1489
|
+
"""
|
|
1490
|
+
Indicates whether the connection has been approved, rejected or removed by the key vault owner.
|
|
1491
|
+
"""
|
|
1492
|
+
return pulumi.get(self, "status")
|
|
1493
|
+
|
|
1494
|
+
@status.setter
|
|
1495
|
+
def status(self, value: Optional[pulumi.Input[Union[str, 'PrivateEndpointServiceConnectionStatus']]]):
|
|
1496
|
+
pulumi.set(self, "status", value)
|
|
1497
|
+
|
|
1498
|
+
|
|
1499
|
+
if not MYPY:
|
|
1500
|
+
class RotationPolicyArgsDict(TypedDict):
|
|
1501
|
+
attributes: NotRequired[pulumi.Input['KeyRotationPolicyAttributesArgsDict']]
|
|
1502
|
+
"""
|
|
1503
|
+
The attributes of key rotation policy.
|
|
1504
|
+
"""
|
|
1505
|
+
lifetime_actions: NotRequired[pulumi.Input[Sequence[pulumi.Input['LifetimeActionArgsDict']]]]
|
|
1506
|
+
"""
|
|
1507
|
+
The lifetimeActions for key rotation action.
|
|
1508
|
+
"""
|
|
1509
|
+
elif False:
|
|
1510
|
+
RotationPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
|
1511
|
+
|
|
1512
|
+
@pulumi.input_type
|
|
1513
|
+
class RotationPolicyArgs:
|
|
1514
|
+
def __init__(__self__, *,
|
|
1515
|
+
attributes: Optional[pulumi.Input['KeyRotationPolicyAttributesArgs']] = None,
|
|
1516
|
+
lifetime_actions: Optional[pulumi.Input[Sequence[pulumi.Input['LifetimeActionArgs']]]] = None):
|
|
1517
|
+
"""
|
|
1518
|
+
:param pulumi.Input['KeyRotationPolicyAttributesArgs'] attributes: The attributes of key rotation policy.
|
|
1519
|
+
:param pulumi.Input[Sequence[pulumi.Input['LifetimeActionArgs']]] lifetime_actions: The lifetimeActions for key rotation action.
|
|
1520
|
+
"""
|
|
1521
|
+
if attributes is not None:
|
|
1522
|
+
pulumi.set(__self__, "attributes", attributes)
|
|
1523
|
+
if lifetime_actions is not None:
|
|
1524
|
+
pulumi.set(__self__, "lifetime_actions", lifetime_actions)
|
|
1525
|
+
|
|
1526
|
+
@property
|
|
1527
|
+
@pulumi.getter
|
|
1528
|
+
def attributes(self) -> Optional[pulumi.Input['KeyRotationPolicyAttributesArgs']]:
|
|
1529
|
+
"""
|
|
1530
|
+
The attributes of key rotation policy.
|
|
1531
|
+
"""
|
|
1532
|
+
return pulumi.get(self, "attributes")
|
|
1533
|
+
|
|
1534
|
+
@attributes.setter
|
|
1535
|
+
def attributes(self, value: Optional[pulumi.Input['KeyRotationPolicyAttributesArgs']]):
|
|
1536
|
+
pulumi.set(self, "attributes", value)
|
|
1537
|
+
|
|
1538
|
+
@property
|
|
1539
|
+
@pulumi.getter(name="lifetimeActions")
|
|
1540
|
+
def lifetime_actions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['LifetimeActionArgs']]]]:
|
|
1541
|
+
"""
|
|
1542
|
+
The lifetimeActions for key rotation action.
|
|
1543
|
+
"""
|
|
1544
|
+
return pulumi.get(self, "lifetime_actions")
|
|
1545
|
+
|
|
1546
|
+
@lifetime_actions.setter
|
|
1547
|
+
def lifetime_actions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['LifetimeActionArgs']]]]):
|
|
1548
|
+
pulumi.set(self, "lifetime_actions", value)
|
|
1549
|
+
|
|
1550
|
+
|
|
1551
|
+
if not MYPY:
|
|
1552
|
+
class SecretAttributesArgsDict(TypedDict):
|
|
1553
|
+
"""
|
|
1554
|
+
The secret management attributes.
|
|
1555
|
+
"""
|
|
1556
|
+
enabled: NotRequired[pulumi.Input[bool]]
|
|
1557
|
+
"""
|
|
1558
|
+
Determines whether the object is enabled.
|
|
1559
|
+
"""
|
|
1560
|
+
expires: NotRequired[pulumi.Input[int]]
|
|
1561
|
+
"""
|
|
1562
|
+
Expiry date in seconds since 1970-01-01T00:00:00Z.
|
|
1563
|
+
"""
|
|
1564
|
+
not_before: NotRequired[pulumi.Input[int]]
|
|
1565
|
+
"""
|
|
1566
|
+
Not before date in seconds since 1970-01-01T00:00:00Z.
|
|
1567
|
+
"""
|
|
1568
|
+
elif False:
|
|
1569
|
+
SecretAttributesArgsDict: TypeAlias = Mapping[str, Any]
|
|
1570
|
+
|
|
1571
|
+
@pulumi.input_type
|
|
1572
|
+
class SecretAttributesArgs:
|
|
1573
|
+
def __init__(__self__, *,
|
|
1574
|
+
enabled: Optional[pulumi.Input[bool]] = None,
|
|
1575
|
+
expires: Optional[pulumi.Input[int]] = None,
|
|
1576
|
+
not_before: Optional[pulumi.Input[int]] = None):
|
|
1577
|
+
"""
|
|
1578
|
+
The secret management attributes.
|
|
1579
|
+
:param pulumi.Input[bool] enabled: Determines whether the object is enabled.
|
|
1580
|
+
:param pulumi.Input[int] expires: Expiry date in seconds since 1970-01-01T00:00:00Z.
|
|
1581
|
+
:param pulumi.Input[int] not_before: Not before date in seconds since 1970-01-01T00:00:00Z.
|
|
1582
|
+
"""
|
|
1583
|
+
if enabled is not None:
|
|
1584
|
+
pulumi.set(__self__, "enabled", enabled)
|
|
1585
|
+
if expires is not None:
|
|
1586
|
+
pulumi.set(__self__, "expires", expires)
|
|
1587
|
+
if not_before is not None:
|
|
1588
|
+
pulumi.set(__self__, "not_before", not_before)
|
|
1589
|
+
|
|
1590
|
+
@property
|
|
1591
|
+
@pulumi.getter
|
|
1592
|
+
def enabled(self) -> Optional[pulumi.Input[bool]]:
|
|
1593
|
+
"""
|
|
1594
|
+
Determines whether the object is enabled.
|
|
1595
|
+
"""
|
|
1596
|
+
return pulumi.get(self, "enabled")
|
|
1597
|
+
|
|
1598
|
+
@enabled.setter
|
|
1599
|
+
def enabled(self, value: Optional[pulumi.Input[bool]]):
|
|
1600
|
+
pulumi.set(self, "enabled", value)
|
|
1601
|
+
|
|
1602
|
+
@property
|
|
1603
|
+
@pulumi.getter
|
|
1604
|
+
def expires(self) -> Optional[pulumi.Input[int]]:
|
|
1605
|
+
"""
|
|
1606
|
+
Expiry date in seconds since 1970-01-01T00:00:00Z.
|
|
1607
|
+
"""
|
|
1608
|
+
return pulumi.get(self, "expires")
|
|
1609
|
+
|
|
1610
|
+
@expires.setter
|
|
1611
|
+
def expires(self, value: Optional[pulumi.Input[int]]):
|
|
1612
|
+
pulumi.set(self, "expires", value)
|
|
1613
|
+
|
|
1614
|
+
@property
|
|
1615
|
+
@pulumi.getter(name="notBefore")
|
|
1616
|
+
def not_before(self) -> Optional[pulumi.Input[int]]:
|
|
1617
|
+
"""
|
|
1618
|
+
Not before date in seconds since 1970-01-01T00:00:00Z.
|
|
1619
|
+
"""
|
|
1620
|
+
return pulumi.get(self, "not_before")
|
|
1621
|
+
|
|
1622
|
+
@not_before.setter
|
|
1623
|
+
def not_before(self, value: Optional[pulumi.Input[int]]):
|
|
1624
|
+
pulumi.set(self, "not_before", value)
|
|
1625
|
+
|
|
1626
|
+
|
|
1627
|
+
if not MYPY:
|
|
1628
|
+
class SecretPropertiesArgsDict(TypedDict):
|
|
1629
|
+
"""
|
|
1630
|
+
Properties of the secret
|
|
1631
|
+
"""
|
|
1632
|
+
attributes: NotRequired[pulumi.Input['SecretAttributesArgsDict']]
|
|
1633
|
+
"""
|
|
1634
|
+
The attributes of the secret.
|
|
1635
|
+
"""
|
|
1636
|
+
content_type: NotRequired[pulumi.Input[str]]
|
|
1637
|
+
"""
|
|
1638
|
+
The content type of the secret.
|
|
1639
|
+
"""
|
|
1640
|
+
value: NotRequired[pulumi.Input[str]]
|
|
1641
|
+
"""
|
|
1642
|
+
The value of the secret. NOTE: 'value' will never be returned from the service, as APIs using this model are is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
|
|
1643
|
+
"""
|
|
1644
|
+
elif False:
|
|
1645
|
+
SecretPropertiesArgsDict: TypeAlias = Mapping[str, Any]
|
|
1646
|
+
|
|
1647
|
+
@pulumi.input_type
|
|
1648
|
+
class SecretPropertiesArgs:
|
|
1649
|
+
def __init__(__self__, *,
|
|
1650
|
+
attributes: Optional[pulumi.Input['SecretAttributesArgs']] = None,
|
|
1651
|
+
content_type: Optional[pulumi.Input[str]] = None,
|
|
1652
|
+
value: Optional[pulumi.Input[str]] = None):
|
|
1653
|
+
"""
|
|
1654
|
+
Properties of the secret
|
|
1655
|
+
:param pulumi.Input['SecretAttributesArgs'] attributes: The attributes of the secret.
|
|
1656
|
+
:param pulumi.Input[str] content_type: The content type of the secret.
|
|
1657
|
+
:param pulumi.Input[str] value: The value of the secret. NOTE: 'value' will never be returned from the service, as APIs using this model are is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
|
|
1658
|
+
"""
|
|
1659
|
+
if attributes is not None:
|
|
1660
|
+
pulumi.set(__self__, "attributes", attributes)
|
|
1661
|
+
if content_type is not None:
|
|
1662
|
+
pulumi.set(__self__, "content_type", content_type)
|
|
1663
|
+
if value is not None:
|
|
1664
|
+
pulumi.set(__self__, "value", value)
|
|
1665
|
+
|
|
1666
|
+
@property
|
|
1667
|
+
@pulumi.getter
|
|
1668
|
+
def attributes(self) -> Optional[pulumi.Input['SecretAttributesArgs']]:
|
|
1669
|
+
"""
|
|
1670
|
+
The attributes of the secret.
|
|
1671
|
+
"""
|
|
1672
|
+
return pulumi.get(self, "attributes")
|
|
1673
|
+
|
|
1674
|
+
@attributes.setter
|
|
1675
|
+
def attributes(self, value: Optional[pulumi.Input['SecretAttributesArgs']]):
|
|
1676
|
+
pulumi.set(self, "attributes", value)
|
|
1677
|
+
|
|
1678
|
+
@property
|
|
1679
|
+
@pulumi.getter(name="contentType")
|
|
1680
|
+
def content_type(self) -> Optional[pulumi.Input[str]]:
|
|
1681
|
+
"""
|
|
1682
|
+
The content type of the secret.
|
|
1683
|
+
"""
|
|
1684
|
+
return pulumi.get(self, "content_type")
|
|
1685
|
+
|
|
1686
|
+
@content_type.setter
|
|
1687
|
+
def content_type(self, value: Optional[pulumi.Input[str]]):
|
|
1688
|
+
pulumi.set(self, "content_type", value)
|
|
1689
|
+
|
|
1690
|
+
@property
|
|
1691
|
+
@pulumi.getter
|
|
1692
|
+
def value(self) -> Optional[pulumi.Input[str]]:
|
|
1693
|
+
"""
|
|
1694
|
+
The value of the secret. NOTE: 'value' will never be returned from the service, as APIs using this model are is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
|
|
1695
|
+
"""
|
|
1696
|
+
return pulumi.get(self, "value")
|
|
1697
|
+
|
|
1698
|
+
@value.setter
|
|
1699
|
+
def value(self, value: Optional[pulumi.Input[str]]):
|
|
1700
|
+
pulumi.set(self, "value", value)
|
|
1701
|
+
|
|
1702
|
+
|
|
1703
|
+
if not MYPY:
|
|
1704
|
+
class SkuArgsDict(TypedDict):
|
|
1705
|
+
"""
|
|
1706
|
+
SKU details
|
|
1707
|
+
"""
|
|
1708
|
+
family: pulumi.Input[Union[str, 'SkuFamily']]
|
|
1709
|
+
"""
|
|
1710
|
+
SKU family name
|
|
1711
|
+
"""
|
|
1712
|
+
name: pulumi.Input['SkuName']
|
|
1713
|
+
"""
|
|
1714
|
+
SKU name to specify whether the key vault is a standard vault or a premium vault.
|
|
1715
|
+
"""
|
|
1716
|
+
elif False:
|
|
1717
|
+
SkuArgsDict: TypeAlias = Mapping[str, Any]
|
|
1718
|
+
|
|
1719
|
+
@pulumi.input_type
|
|
1720
|
+
class SkuArgs:
|
|
1721
|
+
def __init__(__self__, *,
|
|
1722
|
+
family: pulumi.Input[Union[str, 'SkuFamily']],
|
|
1723
|
+
name: pulumi.Input['SkuName']):
|
|
1724
|
+
"""
|
|
1725
|
+
SKU details
|
|
1726
|
+
:param pulumi.Input[Union[str, 'SkuFamily']] family: SKU family name
|
|
1727
|
+
:param pulumi.Input['SkuName'] name: SKU name to specify whether the key vault is a standard vault or a premium vault.
|
|
1728
|
+
"""
|
|
1729
|
+
pulumi.set(__self__, "family", family)
|
|
1730
|
+
pulumi.set(__self__, "name", name)
|
|
1731
|
+
|
|
1732
|
+
@property
|
|
1733
|
+
@pulumi.getter
|
|
1734
|
+
def family(self) -> pulumi.Input[Union[str, 'SkuFamily']]:
|
|
1735
|
+
"""
|
|
1736
|
+
SKU family name
|
|
1737
|
+
"""
|
|
1738
|
+
return pulumi.get(self, "family")
|
|
1739
|
+
|
|
1740
|
+
@family.setter
|
|
1741
|
+
def family(self, value: pulumi.Input[Union[str, 'SkuFamily']]):
|
|
1742
|
+
pulumi.set(self, "family", value)
|
|
1743
|
+
|
|
1744
|
+
@property
|
|
1745
|
+
@pulumi.getter
|
|
1746
|
+
def name(self) -> pulumi.Input['SkuName']:
|
|
1747
|
+
"""
|
|
1748
|
+
SKU name to specify whether the key vault is a standard vault or a premium vault.
|
|
1749
|
+
"""
|
|
1750
|
+
return pulumi.get(self, "name")
|
|
1751
|
+
|
|
1752
|
+
@name.setter
|
|
1753
|
+
def name(self, value: pulumi.Input['SkuName']):
|
|
1754
|
+
pulumi.set(self, "name", value)
|
|
1755
|
+
|
|
1756
|
+
|
|
1757
|
+
if not MYPY:
|
|
1758
|
+
class TriggerArgsDict(TypedDict):
|
|
1759
|
+
time_after_create: NotRequired[pulumi.Input[str]]
|
|
1760
|
+
"""
|
|
1761
|
+
The time duration after key creation to rotate the key. It only applies to rotate. It will be in ISO 8601 duration format. Eg: 'P90D', 'P1Y'.
|
|
1762
|
+
"""
|
|
1763
|
+
time_before_expiry: NotRequired[pulumi.Input[str]]
|
|
1764
|
+
"""
|
|
1765
|
+
The time duration before key expiring to rotate or notify. It will be in ISO 8601 duration format. Eg: 'P90D', 'P1Y'.
|
|
1766
|
+
"""
|
|
1767
|
+
elif False:
|
|
1768
|
+
TriggerArgsDict: TypeAlias = Mapping[str, Any]
|
|
1769
|
+
|
|
1770
|
+
@pulumi.input_type
|
|
1771
|
+
class TriggerArgs:
|
|
1772
|
+
def __init__(__self__, *,
|
|
1773
|
+
time_after_create: Optional[pulumi.Input[str]] = None,
|
|
1774
|
+
time_before_expiry: Optional[pulumi.Input[str]] = None):
|
|
1775
|
+
"""
|
|
1776
|
+
:param pulumi.Input[str] time_after_create: The time duration after key creation to rotate the key. It only applies to rotate. It will be in ISO 8601 duration format. Eg: 'P90D', 'P1Y'.
|
|
1777
|
+
:param pulumi.Input[str] time_before_expiry: The time duration before key expiring to rotate or notify. It will be in ISO 8601 duration format. Eg: 'P90D', 'P1Y'.
|
|
1778
|
+
"""
|
|
1779
|
+
if time_after_create is not None:
|
|
1780
|
+
pulumi.set(__self__, "time_after_create", time_after_create)
|
|
1781
|
+
if time_before_expiry is not None:
|
|
1782
|
+
pulumi.set(__self__, "time_before_expiry", time_before_expiry)
|
|
1783
|
+
|
|
1784
|
+
@property
|
|
1785
|
+
@pulumi.getter(name="timeAfterCreate")
|
|
1786
|
+
def time_after_create(self) -> Optional[pulumi.Input[str]]:
|
|
1787
|
+
"""
|
|
1788
|
+
The time duration after key creation to rotate the key. It only applies to rotate. It will be in ISO 8601 duration format. Eg: 'P90D', 'P1Y'.
|
|
1789
|
+
"""
|
|
1790
|
+
return pulumi.get(self, "time_after_create")
|
|
1791
|
+
|
|
1792
|
+
@time_after_create.setter
|
|
1793
|
+
def time_after_create(self, value: Optional[pulumi.Input[str]]):
|
|
1794
|
+
pulumi.set(self, "time_after_create", value)
|
|
1795
|
+
|
|
1796
|
+
@property
|
|
1797
|
+
@pulumi.getter(name="timeBeforeExpiry")
|
|
1798
|
+
def time_before_expiry(self) -> Optional[pulumi.Input[str]]:
|
|
1799
|
+
"""
|
|
1800
|
+
The time duration before key expiring to rotate or notify. It will be in ISO 8601 duration format. Eg: 'P90D', 'P1Y'.
|
|
1801
|
+
"""
|
|
1802
|
+
return pulumi.get(self, "time_before_expiry")
|
|
1803
|
+
|
|
1804
|
+
@time_before_expiry.setter
|
|
1805
|
+
def time_before_expiry(self, value: Optional[pulumi.Input[str]]):
|
|
1806
|
+
pulumi.set(self, "time_before_expiry", value)
|
|
1807
|
+
|
|
1808
|
+
|
|
1809
|
+
if not MYPY:
|
|
1810
|
+
class VaultPropertiesArgsDict(TypedDict):
|
|
1811
|
+
"""
|
|
1812
|
+
Properties of the vault
|
|
1813
|
+
"""
|
|
1814
|
+
sku: pulumi.Input['SkuArgsDict']
|
|
1815
|
+
"""
|
|
1816
|
+
SKU details
|
|
1817
|
+
"""
|
|
1818
|
+
tenant_id: pulumi.Input[str]
|
|
1819
|
+
"""
|
|
1820
|
+
The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1821
|
+
"""
|
|
1822
|
+
access_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgsDict']]]]
|
|
1823
|
+
"""
|
|
1824
|
+
An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1825
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1826
|
+
"""
|
|
1827
|
+
create_mode: NotRequired[pulumi.Input['CreateMode']]
|
|
1828
|
+
"""
|
|
1829
|
+
The vault's create mode to indicate whether the vault need to be recovered or not.
|
|
1830
|
+
"""
|
|
1831
|
+
enable_purge_protection: NotRequired[pulumi.Input[bool]]
|
|
1832
|
+
"""
|
|
1833
|
+
Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
1834
|
+
"""
|
|
1835
|
+
enable_rbac_authorization: NotRequired[pulumi.Input[bool]]
|
|
1836
|
+
"""
|
|
1837
|
+
Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
1838
|
+
"""
|
|
1839
|
+
enable_soft_delete: NotRequired[pulumi.Input[bool]]
|
|
1840
|
+
"""
|
|
1841
|
+
Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
|
|
1842
|
+
"""
|
|
1843
|
+
enabled_for_deployment: NotRequired[pulumi.Input[bool]]
|
|
1844
|
+
"""
|
|
1845
|
+
Property to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
|
|
1846
|
+
"""
|
|
1847
|
+
enabled_for_disk_encryption: NotRequired[pulumi.Input[bool]]
|
|
1848
|
+
"""
|
|
1849
|
+
Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
1850
|
+
"""
|
|
1851
|
+
enabled_for_template_deployment: NotRequired[pulumi.Input[bool]]
|
|
1852
|
+
"""
|
|
1853
|
+
Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
1854
|
+
"""
|
|
1855
|
+
network_acls: NotRequired[pulumi.Input['NetworkRuleSetArgsDict']]
|
|
1856
|
+
"""
|
|
1857
|
+
Rules governing the accessibility of the key vault from specific network locations.
|
|
1858
|
+
"""
|
|
1859
|
+
provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
|
|
1860
|
+
"""
|
|
1861
|
+
Provisioning state of the vault.
|
|
1862
|
+
"""
|
|
1863
|
+
public_network_access: NotRequired[pulumi.Input[str]]
|
|
1864
|
+
"""
|
|
1865
|
+
Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
1866
|
+
"""
|
|
1867
|
+
soft_delete_retention_in_days: NotRequired[pulumi.Input[int]]
|
|
1868
|
+
"""
|
|
1869
|
+
softDelete data retention days. It accepts >=7 and <=90.
|
|
1870
|
+
"""
|
|
1871
|
+
vault_uri: NotRequired[pulumi.Input[str]]
|
|
1872
|
+
"""
|
|
1873
|
+
The URI of the vault for performing operations on keys and secrets.
|
|
1874
|
+
"""
|
|
1875
|
+
elif False:
|
|
1876
|
+
VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
|
|
1877
|
+
|
|
1878
|
+
@pulumi.input_type
|
|
1879
|
+
class VaultPropertiesArgs:
|
|
1880
|
+
def __init__(__self__, *,
|
|
1881
|
+
sku: pulumi.Input['SkuArgs'],
|
|
1882
|
+
tenant_id: pulumi.Input[str],
|
|
1883
|
+
access_policies: Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]] = None,
|
|
1884
|
+
create_mode: Optional[pulumi.Input['CreateMode']] = None,
|
|
1885
|
+
enable_purge_protection: Optional[pulumi.Input[bool]] = None,
|
|
1886
|
+
enable_rbac_authorization: Optional[pulumi.Input[bool]] = None,
|
|
1887
|
+
enable_soft_delete: Optional[pulumi.Input[bool]] = None,
|
|
1888
|
+
enabled_for_deployment: Optional[pulumi.Input[bool]] = None,
|
|
1889
|
+
enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
|
|
1890
|
+
enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
|
|
1891
|
+
network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
|
|
1892
|
+
provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
|
|
1893
|
+
public_network_access: Optional[pulumi.Input[str]] = None,
|
|
1894
|
+
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None,
|
|
1895
|
+
vault_uri: Optional[pulumi.Input[str]] = None):
|
|
1896
|
+
"""
|
|
1897
|
+
Properties of the vault
|
|
1898
|
+
:param pulumi.Input['SkuArgs'] sku: SKU details
|
|
1899
|
+
:param pulumi.Input[str] tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1900
|
+
:param pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1901
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1902
|
+
:param pulumi.Input['CreateMode'] create_mode: The vault's create mode to indicate whether the vault need to be recovered or not.
|
|
1903
|
+
:param pulumi.Input[bool] enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
1904
|
+
:param pulumi.Input[bool] enable_rbac_authorization: Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
1905
|
+
:param pulumi.Input[bool] enable_soft_delete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
|
|
1906
|
+
:param pulumi.Input[bool] enabled_for_deployment: Property to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
|
|
1907
|
+
:param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
1908
|
+
:param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
1909
|
+
:param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
1910
|
+
:param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
|
|
1911
|
+
:param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
1912
|
+
:param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
1913
|
+
:param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
1914
|
+
"""
|
|
1915
|
+
pulumi.set(__self__, "sku", sku)
|
|
1916
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
1917
|
+
if access_policies is not None:
|
|
1918
|
+
pulumi.set(__self__, "access_policies", access_policies)
|
|
1919
|
+
if create_mode is not None:
|
|
1920
|
+
pulumi.set(__self__, "create_mode", create_mode)
|
|
1921
|
+
if enable_purge_protection is not None:
|
|
1922
|
+
pulumi.set(__self__, "enable_purge_protection", enable_purge_protection)
|
|
1923
|
+
if enable_rbac_authorization is None:
|
|
1924
|
+
enable_rbac_authorization = False
|
|
1925
|
+
if enable_rbac_authorization is not None:
|
|
1926
|
+
pulumi.set(__self__, "enable_rbac_authorization", enable_rbac_authorization)
|
|
1927
|
+
if enable_soft_delete is None:
|
|
1928
|
+
enable_soft_delete = True
|
|
1929
|
+
if enable_soft_delete is not None:
|
|
1930
|
+
pulumi.set(__self__, "enable_soft_delete", enable_soft_delete)
|
|
1931
|
+
if enabled_for_deployment is None:
|
|
1932
|
+
enabled_for_deployment = False
|
|
1933
|
+
if enabled_for_deployment is not None:
|
|
1934
|
+
pulumi.set(__self__, "enabled_for_deployment", enabled_for_deployment)
|
|
1935
|
+
if enabled_for_disk_encryption is None:
|
|
1936
|
+
enabled_for_disk_encryption = False
|
|
1937
|
+
if enabled_for_disk_encryption is not None:
|
|
1938
|
+
pulumi.set(__self__, "enabled_for_disk_encryption", enabled_for_disk_encryption)
|
|
1939
|
+
if enabled_for_template_deployment is None:
|
|
1940
|
+
enabled_for_template_deployment = False
|
|
1941
|
+
if enabled_for_template_deployment is not None:
|
|
1942
|
+
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
1943
|
+
if network_acls is not None:
|
|
1944
|
+
pulumi.set(__self__, "network_acls", network_acls)
|
|
1945
|
+
if provisioning_state is not None:
|
|
1946
|
+
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
1947
|
+
if public_network_access is None:
|
|
1948
|
+
public_network_access = 'enabled'
|
|
1949
|
+
if public_network_access is not None:
|
|
1950
|
+
pulumi.set(__self__, "public_network_access", public_network_access)
|
|
1951
|
+
if soft_delete_retention_in_days is None:
|
|
1952
|
+
soft_delete_retention_in_days = 90
|
|
1953
|
+
if soft_delete_retention_in_days is not None:
|
|
1954
|
+
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
1955
|
+
if vault_uri is not None:
|
|
1956
|
+
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
1957
|
+
|
|
1958
|
+
@property
|
|
1959
|
+
@pulumi.getter
|
|
1960
|
+
def sku(self) -> pulumi.Input['SkuArgs']:
|
|
1961
|
+
"""
|
|
1962
|
+
SKU details
|
|
1963
|
+
"""
|
|
1964
|
+
return pulumi.get(self, "sku")
|
|
1965
|
+
|
|
1966
|
+
@sku.setter
|
|
1967
|
+
def sku(self, value: pulumi.Input['SkuArgs']):
|
|
1968
|
+
pulumi.set(self, "sku", value)
|
|
1969
|
+
|
|
1970
|
+
@property
|
|
1971
|
+
@pulumi.getter(name="tenantId")
|
|
1972
|
+
def tenant_id(self) -> pulumi.Input[str]:
|
|
1973
|
+
"""
|
|
1974
|
+
The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1975
|
+
"""
|
|
1976
|
+
return pulumi.get(self, "tenant_id")
|
|
1977
|
+
|
|
1978
|
+
@tenant_id.setter
|
|
1979
|
+
def tenant_id(self, value: pulumi.Input[str]):
|
|
1980
|
+
pulumi.set(self, "tenant_id", value)
|
|
1981
|
+
|
|
1982
|
+
@property
|
|
1983
|
+
@pulumi.getter(name="accessPolicies")
|
|
1984
|
+
def access_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]]:
|
|
1985
|
+
"""
|
|
1986
|
+
An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1987
|
+
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1988
|
+
"""
|
|
1989
|
+
return pulumi.get(self, "access_policies")
|
|
1990
|
+
|
|
1991
|
+
@access_policies.setter
|
|
1992
|
+
def access_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AccessPolicyEntryArgs']]]]):
|
|
1993
|
+
pulumi.set(self, "access_policies", value)
|
|
1994
|
+
|
|
1995
|
+
@property
|
|
1996
|
+
@pulumi.getter(name="createMode")
|
|
1997
|
+
def create_mode(self) -> Optional[pulumi.Input['CreateMode']]:
|
|
1998
|
+
"""
|
|
1999
|
+
The vault's create mode to indicate whether the vault need to be recovered or not.
|
|
2000
|
+
"""
|
|
2001
|
+
return pulumi.get(self, "create_mode")
|
|
2002
|
+
|
|
2003
|
+
@create_mode.setter
|
|
2004
|
+
def create_mode(self, value: Optional[pulumi.Input['CreateMode']]):
|
|
2005
|
+
pulumi.set(self, "create_mode", value)
|
|
2006
|
+
|
|
2007
|
+
@property
|
|
2008
|
+
@pulumi.getter(name="enablePurgeProtection")
|
|
2009
|
+
def enable_purge_protection(self) -> Optional[pulumi.Input[bool]]:
|
|
2010
|
+
"""
|
|
2011
|
+
Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
2012
|
+
"""
|
|
2013
|
+
return pulumi.get(self, "enable_purge_protection")
|
|
2014
|
+
|
|
2015
|
+
@enable_purge_protection.setter
|
|
2016
|
+
def enable_purge_protection(self, value: Optional[pulumi.Input[bool]]):
|
|
2017
|
+
pulumi.set(self, "enable_purge_protection", value)
|
|
2018
|
+
|
|
2019
|
+
@property
|
|
2020
|
+
@pulumi.getter(name="enableRbacAuthorization")
|
|
2021
|
+
def enable_rbac_authorization(self) -> Optional[pulumi.Input[bool]]:
|
|
2022
|
+
"""
|
|
2023
|
+
Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
|
|
2024
|
+
"""
|
|
2025
|
+
return pulumi.get(self, "enable_rbac_authorization")
|
|
2026
|
+
|
|
2027
|
+
@enable_rbac_authorization.setter
|
|
2028
|
+
def enable_rbac_authorization(self, value: Optional[pulumi.Input[bool]]):
|
|
2029
|
+
pulumi.set(self, "enable_rbac_authorization", value)
|
|
2030
|
+
|
|
2031
|
+
@property
|
|
2032
|
+
@pulumi.getter(name="enableSoftDelete")
|
|
2033
|
+
def enable_soft_delete(self) -> Optional[pulumi.Input[bool]]:
|
|
2034
|
+
"""
|
|
2035
|
+
Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
|
|
2036
|
+
"""
|
|
2037
|
+
return pulumi.get(self, "enable_soft_delete")
|
|
2038
|
+
|
|
2039
|
+
@enable_soft_delete.setter
|
|
2040
|
+
def enable_soft_delete(self, value: Optional[pulumi.Input[bool]]):
|
|
2041
|
+
pulumi.set(self, "enable_soft_delete", value)
|
|
2042
|
+
|
|
2043
|
+
@property
|
|
2044
|
+
@pulumi.getter(name="enabledForDeployment")
|
|
2045
|
+
def enabled_for_deployment(self) -> Optional[pulumi.Input[bool]]:
|
|
2046
|
+
"""
|
|
2047
|
+
Property to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
|
|
2048
|
+
"""
|
|
2049
|
+
return pulumi.get(self, "enabled_for_deployment")
|
|
2050
|
+
|
|
2051
|
+
@enabled_for_deployment.setter
|
|
2052
|
+
def enabled_for_deployment(self, value: Optional[pulumi.Input[bool]]):
|
|
2053
|
+
pulumi.set(self, "enabled_for_deployment", value)
|
|
2054
|
+
|
|
2055
|
+
@property
|
|
2056
|
+
@pulumi.getter(name="enabledForDiskEncryption")
|
|
2057
|
+
def enabled_for_disk_encryption(self) -> Optional[pulumi.Input[bool]]:
|
|
2058
|
+
"""
|
|
2059
|
+
Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
2060
|
+
"""
|
|
2061
|
+
return pulumi.get(self, "enabled_for_disk_encryption")
|
|
2062
|
+
|
|
2063
|
+
@enabled_for_disk_encryption.setter
|
|
2064
|
+
def enabled_for_disk_encryption(self, value: Optional[pulumi.Input[bool]]):
|
|
2065
|
+
pulumi.set(self, "enabled_for_disk_encryption", value)
|
|
2066
|
+
|
|
2067
|
+
@property
|
|
2068
|
+
@pulumi.getter(name="enabledForTemplateDeployment")
|
|
2069
|
+
def enabled_for_template_deployment(self) -> Optional[pulumi.Input[bool]]:
|
|
2070
|
+
"""
|
|
2071
|
+
Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
2072
|
+
"""
|
|
2073
|
+
return pulumi.get(self, "enabled_for_template_deployment")
|
|
2074
|
+
|
|
2075
|
+
@enabled_for_template_deployment.setter
|
|
2076
|
+
def enabled_for_template_deployment(self, value: Optional[pulumi.Input[bool]]):
|
|
2077
|
+
pulumi.set(self, "enabled_for_template_deployment", value)
|
|
2078
|
+
|
|
2079
|
+
@property
|
|
2080
|
+
@pulumi.getter(name="networkAcls")
|
|
2081
|
+
def network_acls(self) -> Optional[pulumi.Input['NetworkRuleSetArgs']]:
|
|
2082
|
+
"""
|
|
2083
|
+
Rules governing the accessibility of the key vault from specific network locations.
|
|
2084
|
+
"""
|
|
2085
|
+
return pulumi.get(self, "network_acls")
|
|
2086
|
+
|
|
2087
|
+
@network_acls.setter
|
|
2088
|
+
def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
|
|
2089
|
+
pulumi.set(self, "network_acls", value)
|
|
2090
|
+
|
|
2091
|
+
@property
|
|
2092
|
+
@pulumi.getter(name="provisioningState")
|
|
2093
|
+
def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
|
|
2094
|
+
"""
|
|
2095
|
+
Provisioning state of the vault.
|
|
2096
|
+
"""
|
|
2097
|
+
return pulumi.get(self, "provisioning_state")
|
|
2098
|
+
|
|
2099
|
+
@provisioning_state.setter
|
|
2100
|
+
def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
|
|
2101
|
+
pulumi.set(self, "provisioning_state", value)
|
|
2102
|
+
|
|
2103
|
+
@property
|
|
2104
|
+
@pulumi.getter(name="publicNetworkAccess")
|
|
2105
|
+
def public_network_access(self) -> Optional[pulumi.Input[str]]:
|
|
2106
|
+
"""
|
|
2107
|
+
Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
2108
|
+
"""
|
|
2109
|
+
return pulumi.get(self, "public_network_access")
|
|
2110
|
+
|
|
2111
|
+
@public_network_access.setter
|
|
2112
|
+
def public_network_access(self, value: Optional[pulumi.Input[str]]):
|
|
2113
|
+
pulumi.set(self, "public_network_access", value)
|
|
2114
|
+
|
|
2115
|
+
@property
|
|
2116
|
+
@pulumi.getter(name="softDeleteRetentionInDays")
|
|
2117
|
+
def soft_delete_retention_in_days(self) -> Optional[pulumi.Input[int]]:
|
|
2118
|
+
"""
|
|
2119
|
+
softDelete data retention days. It accepts >=7 and <=90.
|
|
2120
|
+
"""
|
|
2121
|
+
return pulumi.get(self, "soft_delete_retention_in_days")
|
|
2122
|
+
|
|
2123
|
+
@soft_delete_retention_in_days.setter
|
|
2124
|
+
def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
|
|
2125
|
+
pulumi.set(self, "soft_delete_retention_in_days", value)
|
|
2126
|
+
|
|
2127
|
+
@property
|
|
2128
|
+
@pulumi.getter(name="vaultUri")
|
|
2129
|
+
def vault_uri(self) -> Optional[pulumi.Input[str]]:
|
|
2130
|
+
"""
|
|
2131
|
+
The URI of the vault for performing operations on keys and secrets.
|
|
2132
|
+
"""
|
|
2133
|
+
return pulumi.get(self, "vault_uri")
|
|
2134
|
+
|
|
2135
|
+
@vault_uri.setter
|
|
2136
|
+
def vault_uri(self, value: Optional[pulumi.Input[str]]):
|
|
2137
|
+
pulumi.set(self, "vault_uri", value)
|
|
2138
|
+
|
|
2139
|
+
|
|
2140
|
+
if not MYPY:
|
|
2141
|
+
class VirtualNetworkRuleArgsDict(TypedDict):
|
|
2142
|
+
"""
|
|
2143
|
+
A rule governing the accessibility of a vault from a specific virtual network.
|
|
2144
|
+
"""
|
|
2145
|
+
id: pulumi.Input[str]
|
|
2146
|
+
"""
|
|
2147
|
+
Full resource id of a vnet subnet, such as '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'.
|
|
2148
|
+
"""
|
|
2149
|
+
ignore_missing_vnet_service_endpoint: NotRequired[pulumi.Input[bool]]
|
|
2150
|
+
"""
|
|
2151
|
+
Property to specify whether NRP will ignore the check if parent subnet has serviceEndpoints configured.
|
|
2152
|
+
"""
|
|
2153
|
+
elif False:
|
|
2154
|
+
VirtualNetworkRuleArgsDict: TypeAlias = Mapping[str, Any]
|
|
2155
|
+
|
|
2156
|
+
@pulumi.input_type
|
|
2157
|
+
class VirtualNetworkRuleArgs:
|
|
2158
|
+
def __init__(__self__, *,
|
|
2159
|
+
id: pulumi.Input[str],
|
|
2160
|
+
ignore_missing_vnet_service_endpoint: Optional[pulumi.Input[bool]] = None):
|
|
2161
|
+
"""
|
|
2162
|
+
A rule governing the accessibility of a vault from a specific virtual network.
|
|
2163
|
+
:param pulumi.Input[str] id: Full resource id of a vnet subnet, such as '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'.
|
|
2164
|
+
:param pulumi.Input[bool] ignore_missing_vnet_service_endpoint: Property to specify whether NRP will ignore the check if parent subnet has serviceEndpoints configured.
|
|
2165
|
+
"""
|
|
2166
|
+
pulumi.set(__self__, "id", id)
|
|
2167
|
+
if ignore_missing_vnet_service_endpoint is not None:
|
|
2168
|
+
pulumi.set(__self__, "ignore_missing_vnet_service_endpoint", ignore_missing_vnet_service_endpoint)
|
|
2169
|
+
|
|
2170
|
+
@property
|
|
2171
|
+
@pulumi.getter
|
|
2172
|
+
def id(self) -> pulumi.Input[str]:
|
|
2173
|
+
"""
|
|
2174
|
+
Full resource id of a vnet subnet, such as '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'.
|
|
2175
|
+
"""
|
|
2176
|
+
return pulumi.get(self, "id")
|
|
2177
|
+
|
|
2178
|
+
@id.setter
|
|
2179
|
+
def id(self, value: pulumi.Input[str]):
|
|
2180
|
+
pulumi.set(self, "id", value)
|
|
2181
|
+
|
|
2182
|
+
@property
|
|
2183
|
+
@pulumi.getter(name="ignoreMissingVnetServiceEndpoint")
|
|
2184
|
+
def ignore_missing_vnet_service_endpoint(self) -> Optional[pulumi.Input[bool]]:
|
|
2185
|
+
"""
|
|
2186
|
+
Property to specify whether NRP will ignore the check if parent subnet has serviceEndpoints configured.
|
|
2187
|
+
"""
|
|
2188
|
+
return pulumi.get(self, "ignore_missing_vnet_service_endpoint")
|
|
2189
|
+
|
|
2190
|
+
@ignore_missing_vnet_service_endpoint.setter
|
|
2191
|
+
def ignore_missing_vnet_service_endpoint(self, value: Optional[pulumi.Input[bool]]):
|
|
2192
|
+
pulumi.set(self, "ignore_missing_vnet_service_endpoint", value)
|
|
2193
|
+
|
|
2194
|
+
|